Articles about Q&A

The EU Digital Markets Act and what it means for business [Q&A]

The Digital Markets Act (DMA) is aimed at ensuring a higher degree of competition in European digital markets. It seeks to prevent big companies from abusing their market power and allow new players to enter the market.

We spoke to Chris Hewish, chief strategy officer at video games commerce company Xsolla, to discuss the implications the DMA has on game developers and publishers, particularly in the context of digital distribution platforms, app stores, and online marketplaces.

Continue reading

Combating information overload with different data sources [Q&A]

The majority of teams today are contending with too much data which means they struggle to generate meaningful insights from their information, and can become overwhelmed by the sheer volume.

We spoke to CallMiner CMO Eric Williamson who believes sourcing customer feedback from different sources might help solve the problem.

Continue reading

The challenges of securing Active Directory [Q&A]

Microsoft Active Directory is used by a majority of the world’s organizations. But Cyberattacks and misconfigurations targeting AD have surged in recent years, leading to critical outages and data loss.

We spoke to Bob Bobel, CEO of Cayosoft, about how to address critical weaknesses in enterprise infrastructure associated with Microsoft Directory services.

Continue reading

Why automation isn't the answer to zero-day attacks [Q&A]

Zero Day

Last year saw almost 100 zero-day attacks, putting a strain on security teams and becoming known as the 'Hot Zero-Day Summer.'

In response to these attacks, the first instinct of many organizations has been to turn to automation. But Marc Rubbinaccio, manager, compliance at Secureframe, doesn't believe that this is the right approach. We spoke to him to find out more.

Continue reading

How are CISOs coping with developer gatekeeping? [Q&A]

CISOs are under the microscope to prove they can reduce vulnerabilities in the software development life cycle -- particularly, that they can do so from the start of code creation. As such, CISOs are searching for the most effective way to ensure the security awareness of their developers before they take on the responsibility of writing and introducing code.

Secure Code Warrior's co-founder and CTO, Matias Madou, believes that a 'gatekeeping' standard -- where developers are incrementally given access to more sensitive projects -- is the key to building a strong foundation for secure coding processes.

Continue reading

Why a 'Swiss cheese' approach is needed to combat deepfakes [Q&A]

Deepfakes are becoming more and more sophisticated, earlier this year a finance worker in Hong Kong was tricked out of millions following a deepfake call.

With the deepfake fast becoming a weapon of choice for cybercriminals, we spoke to Bridget Pruzin, senior manager -- compliance and risk investigations and analysis at Convera, to learn why she believes a 'Swiss cheese' approach, layering controls like unique on-call verification steps and involving in-person verification, is crucial to effectively defend against these scams.

Continue reading

The emerging trends that security teams need to address [Q&A]

The world's critical national infrastructure remains on high alert. The National Cyber Security Centre in the UK and agencies in the US, Australia, Canada and New Zealand have all detailed how threat actors have been exploiting native tools and processes built into computer systems to gain persistent access and avoid detection.

We spoke to Chase Richardson, lead principal for cybersecurity and data privacy at Bridewell to discuss the critical trends and emerging dangers that cyber teams need to continue to watch out for?

Continue reading

Dealing with digital certificate vulnerabilities [Q&A]

Magnified certificare

While digital certificates are an essential part of day-to-day security they also present challenges. They can expire or be revoked, or even forged.

We spoke to Bert Kashyap, CEO of passwordless security platform SecureW2, to learn more about certificate-related vulnerabilities and what IT and security teams can do to deal with them effectively.

Continue reading

How GenAI is changing business and society [Q&A]

Generative AI started out as a bit of a novelty, allowing you to create writing or artwork based on simple prompts. But increasingly it's having an impact on many areas of the world, from writing code to composing music and aiding research.

In a new book, Generative AI in Practice: 100+ Amazing Ways Generative Artificial Intelligence is Changing Business and Society, futurist and thought leader Bernard Marr takes a closer look at the impact of GenAI. We talked to him to find out more.

Continue reading

The essential role of an open data stack in building an open lakehouse [Q&A]

There is a movement underway to bring about a set of intelligent data apps that will require a new type of modern data platform to support them. TheCube Research identifies this as the 'Sixth Data Platform' -- an open, multi-vendor, modular platform.

We spoke to Justin Borgman, co-founder and CEO of Starburst, who believes an Icehouse architecture is the ideal foundation for building an open data lakehouse, underpinned by flexibility and open technologies.

Continue reading

Why we need to change how we understand cyber risk [Q&A]

Cybersecurity is a high priority for organizations, yet often they're unsure if they're focusing their effort in the right places, and spending too much or too little on protecting themselves.

Robin Oldham, CEO of Cydea, believes current methods of understanding cyber risk are outdated and misrepresent risk and lead to misunderstandings that only promote fear, uncertainty and doubt. We spoke to him to find out what can be done to change this mindset and approach.

Continue reading

Using DMARC with Office 365 and G Suite [Q&A]

New email rules from major providers mean that businesses need to adopt the DMARC standard in order to ensure that their emails get delivered.

But while the new rules have received a good deal of publicity there hasn't been much attention paid to those not running their own mail server and relying on a third-party mail services.

Continue reading

How AI is transforming sport [Q&A]

A new survey from IBM and Morning Consult polled over 18,000 global sports fans to discover the ways in which people follow and engage with their favorite sports are evolving

It finds a growing generational shift in preferences -- including embracing technologies like AI in areas such as augmented reality, recruiting, and fan engagement.

Continue reading

Facing the security challenge of quantum computing [Q&A]

Now that we're beginning to overcome the obstacles to creating a commercially viable quantum computer it's important to consider the security threat that these vastly more powerful machines will pose.

Not least of these is the threat to encryption which puts everyone's online security at risk. We spoke to Nils Gerhardt, chief technology officer and head of product for Utimaco, to explore what a post-quantum future may look like.

Continue reading

2024 Paris Olympics -- cybersecurity risks and top tips to keep data safe [Q&A]

In recent years, mobile devices have taken center stage and we've become mobile-first users, where mobile devices are our first choice for how we communicate, navigate, work, bank, take photos, shop and stay informed about the world around us. Our increased reliance on mobile phones is not without its risks.

According to Zimperium's Global Mobile Threat Report 2023, 43 percent of all compromised devices were fully exploited (not jailbroken or rooted), an increase of 187 percent year-over-year, a shocking number.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.