Articles about Q&A

Can humans provide a cybersecurity edge? [Q&A]

It's usually the case that cybersecurity is seen as being all about technology and that humans -- making mistakes and falling for social engineering -- are something of a liability.

But are people really just a problem or can they also be part of the solution? Toney Jennings, CEO of DataStone, believes we need to shift our thinking away from the current paradigm to empowering people as a hidden asset in the protection of their organization. We talked to him to find out more.

Continue reading

Tackling the business threat posed by deepfakes [Q&A]

AI has become an undeniable and powerful part of the digital landscape. It makes systems stronger and more automated -- but it also has the potential to present a threat.

Some 80 percent of executives believe deepfakes pose a risk to their business, yet only 29 percent say they have taken steps to combat them. We spoke to Patrick Harding, chief product architect at Ping Identity, to discuss the security threats posed by AI and the need to take steps to properly secure identity by adding additional layers of protection.

Continue reading

Meeting the challenges of enterprise development [Q&A]

The rate of change in both technology and economic conditions can make it hard for CIOs to both innovate and satisfy the needs of the business.

We spoke to Ioan Iacob, founder and CEO of financial application specialist FlowX, to discuss the challenges of developing apps in the enterprise and how they can be addressed.

Continue reading

Generative AI in the legal sector [Q&A]

The use of generative AI isn't just confined to the tech sector, it's appearing in lots of other industries too in order to streamline operations and boost digital transformation efforts.

We spoke to Jay Madheswaran, CEO of Eve, to learn more about how GenAI is being used by legal firms and the challenges that adopting it can present.

Continue reading

Making LLMs safe for use in the enterprise [Q&A]

Large language models (LLMs) in a business setting can create problems since there are many ways to go about fooling them or being fooled by them.

Simbian has developed a TrustedLLM model that uses multiple layers of security controls between the user and the GenAI models in order to create a safer solution.

Continue reading

Navigating AI challenges in the enterprise [Q&A]

As more businesses turn to AI, they face a number of challenges around integrating it effectively and obtaining the best value while still ensuring that their data remains secure. It's also important that they select the right AI provider for their needs.

We spoke to Naren Narendran, chief scientist at database specialist Aerospike, to discuss the strategic considerations and concerns enterprises face as they incorporate AI into their operations.

Continue reading

How to overcome today's intelligence challenges to uncover the threats that matter [Q&A]

Threat intelligence is critical to protection efforts, but businesses often struggle with effective management and correlation of this data to help prioritize their efforts.

We spoke to Richard Struse, chief technology officer and co-founder of Tidal Cyber, to discuss the challenges presented when organizations scramble to update systems that aren’t actually vulnerable or stop threats that would essentially have no impact on their business.

Continue reading

The role of AI in securing identity [Q&A]

Identities are probably the biggest attack surface for organizations in today's world as employees rely more on systems and apps to do their jobs.

Mapping identity and access data from the large, disparate, and often disconnected, mix of on-premise and cloud systems that enterprises use is a major challenge.

Continue reading

What's needed for SBOM success? [Q&A]

Enterprises are increasingly looking to software bills of materials (SBOM) to understand the components inside the tech products they use in order to secure their software supply chain.

But do SBOMs really provide value? And how can they be used more effectively? We talked to Varun Badhwar, CEO and co-founder of Endor Labs, to find out the keys to using SBOMs successfully.

Continue reading

How IT leaders can address online privacy risks [Q&A]

Enterprises are facing a rapidly changing privacy landscape, in which some laws contradict each other, while struggling to reduce costs and gain visibility into their privacy risks.

Indeed there’s been a recent increase in lawsuits against companies for online privacy violations that is putting significant strain on C-level executives and they're looking to their IT leaders to address all of this risk with technology.

Continue reading

The future of data analytics in business intelligence [Q&A]

In a little more than a decade, data analytics has been through several big transformations. First, it became digitized. Second, we witnessed the emergence of 'big data' analytics, driven partly by digitization and partly by massively improved storage and processing capabilities.

Finally, in the last couple of years, analytics has been transformed once again by emerging generative AI models that can analyze data at a previously unseen scale and speed.

Continue reading

The rise of third-party browser script attacks [Q&A]

Third-party browser scripts are the code snippets that organizations put into their websites to run ads, analytics, chatbots, etc -- essentially anything that isn't coded by the organization itself.

Which sounds innocuous enough, but these scripts are increasingly being used as a vector for cyberattacks. We spoke to Simon Wijckmans, CEO of c/side, to understand how these attacks operate and what can be done to defend against them.

Continue reading

The critical gap in zero trust [Q&A]

Zero-Trust

As network boundaries can no longer be relied on to define the limits of cybersecurity, zero trust has become the overarching framework that now guides enterprise security strategies.

However, Zero Trust Network Access (ZTNA) has its limitations, especially in application security, and this can open up risk for organizations heavily reliant on SaaS systems.

Continue reading

How IT leaders can bring their organizations into the next generation of cyber learning and training [Q&A]

The IT world has always been a fast moving one and that means skills need to be kept up to date if you're not going to fall behind.

We spoke to Brett Shively, CEO of ACI Learning a provider of IT, cybersecurity and audit training for organizations around the world, about the importance of training and how a personalized approach can pay off.

Continue reading

The importance of API monitoring across the enterprise [Q&A]

Over the past few years, technology teams have split into smaller work groups with more focused tasks. The rise of the cloud has created the need for DevOps teams, and the gap has grown wider between teams that build products and teams that manage products.

At the same time, applications have become dramatically more complicated. This has given rise to specialized site reliability engineers who are well-versed in monitoring all application components, including APIs. However, focusing API resilience in one team has allowed organizations to treat the symptoms rather than the underlying problem.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.