Articles about Q&A

Recovering and rebuilding trust after a cyberattack [Q&A]

Recovery Backup Restoration Data Storage Security Concept

However good your defenses, cyberattacks can still happen. However, in many cases, the aftermath can be worse than the attack itself, as enterprises struggle to calm nerves and reassure staff, customers, and shareholders.

We spoke with Daniel Tobok, CEO of incident response specialist CYPFER, to discuss how organizations can recover from a cyberattack and why the leadership's response is vital.

Continue reading

Infrastructure is having a moment -- why it’s finally getting the spotlight [Q&A]

Corridor of  server room with server racks in datacenter. 3d ill

AI, automation, seamless collaboration. These are the technologies that dominate headlines and drive business strategy. But beneath all the buzz, there’s a quiet but powerful shift happening: infrastructure is back in the spotlight.

Just look at Alphabet -- Google’s parent company -- which recently surprised investors by announcing it’s planning to spend a jaw-dropping $85 billion in 2025. That’s $10 billion more than they originally expected. And what’s fueling that massive investment? Nearly two-thirds of it is going toward the nuts and bolts of tech infrastructure like data centers, servers, and everything needed to power AI, the cloud, and our increasingly real-time digital world.

Continue reading

The rise of voice -- is typing holding developers back? [Q&A]

Developer voice microphone

Voice is in the process of replacing the keyboard in ways that could shake the foundations of how developers work, collaborate, and even think.

We spoke with Natalie Rutgers, VP of product at Deepgram, to find out how voice-first development tools are gaining traction and why companies that fail to adapt risk losing their edge -- and their top talent.

Continue reading

Is artificial intelligence about to steal your job? [Q&A]

AI search for jobs

With artificial intelligence becoming more powerful and completing more complex tasks, the natural question being asked in the industry is if and when AI will steal human jobs.

Myths abound about AI working autonomously and eliminating the human workforce, starting with entry-level jobs. In reality, however, AI makes workers better and it works best when paired with humans -- their strategic thinking, specialized judgment, and adaptability remain irreplaceable.

Continue reading

Premium target -- why insurance companies are so attractive to hackers [Q&A]

Insurance spotlight

The Scattered Spider group seems to have switched from high-profile attacks on UK retailers to new campaigns targeting the insurance sector. The group has recently been linked to ransomware incidents affecting US-based Philadelphia Insurance and Erie Insurance, which operates in both the UK and the US.

We spoke to Danny Howett, technical director at global cybersecurity consultancy CyXcel, to discuss why insurance is such an attractive target and some practical steps insurers can take to shore up their defences against increasingly organised cybercriminals.

Continue reading

Why data lineage is a business strategy, not a technical feature [Q&A]

Data analytics graphs

Modern enterprises are more than ever reliant on data. But that makes understanding how that data is generated, transmitted, changed and used over time -- its lineage, vitally important.

We spoke to Saurabh Gupta, chief of strategy, revenue and growth at The Modern Data Company, to discuss how proactive, context-rich systems of record enable organizations to accelerate, maintain trust, and strategically utilize data.

Continue reading

Cryptographic debt and quantum readiness [Q&A]

Post Quantum Cryptography and Quantum Resistant Cryptography - P

As White House Executive Orders, NIST mandates, and international deadlines accelerate the push toward post-quantum encryption, the clock is ticking for organizations still grappling with cryptographic debt.

We spoke to Dave Krauthamer, co-founder and field CTO at QuSecure, to learn more about emerging threats, compliance mandates, and mitigation frameworks for organizations looking to get ahead of the coming disruption.

Continue reading

Bridging the gap between boardroom and SOC demands [Q&A]

Boardroom CISO

It’s inevitable that different parts of the enterprise will pull in different directions. This is particularly true when it comes to the IT world where operational teams like the SOC tend to focus on operational resilience while management and the boardroom worry about compliance.

We talked to Kyle Wickert, field chief technology officer of AlgoSec, about how IT pros can balance the compliance demands of the C-suite while maintaining security across sprawling hybrid environments.

Continue reading

System integrations -- strategic phasing or waterfall implementation? [Q&A]

integration jigsaw

As organizations continue to navigate complex system integrations, one critical decision that arises is whether to embrace strategic phasing or waterfall implementation. The choice of approach can shape the success or failure of projects, particularly when dealing with large-scale ERP consolidations and replacements.

We spoke with Scott Maggiolo, SVP of information technology at Ribbon Communications to understand the pros and cons of each and how the decision is not one-size-fits-all.

Continue reading

AI is an even playing field -- how secure by design can tip the scale [Q&A]

Secure by design

Vibe coding is currently all the rage, with more than 97 percent of respondents to a survey earlier this year reporting having used AI coding tools at work.

The adoption of these tools only continues to grow but it comes with a catch, attackers are also employing the same techniques. We spoke to Pieter Danhieux, co-founder and CEO of Secure Code Warrior, to discuss how vibe coding is redefining the software development landscape, how malicious actors are also leveraging this technology and the need for organizations to implement secure by design strategies from the outset.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Agentic AI and its impact on the healthcare sector [Q&A]

AI-healthcare

Agentic AI is changing healthcare workflows by moving from passive data analysis to active orchestration of decisions.

But with this come risk. We spoke to Rajan Kohli, CEO of CitiusTech, to discuss how AI is changing healthcare and how organizations can prepare for its impact.

Continue reading

Why the retail industry needs to rethink identity [Q&A]

identity individual crowd

The retail industry continues to be a top target for cyber criminals, retailers rely heavily on digital infrastructure to manage consumer data and operations so they remain an attractive target for attackers seeking financial or operational disruption.

The cyberattacks earlier this year hitting UK retail (Marks & Spencer, Co-op, Harrods) are the latest reminder that identity is still one of the weakest links.

Continue reading

Dirty data and why it’s a problem for business [Q&A]

Laptop data analytics

Organizations are sitting on troves of information yet struggle to leverage this data for quick decision-making. The challenge isn't just about having data, but working with it in its natural state -- which often includes ‘dirty data' not cleaned of typos or errors.

We spoke to CEO of analytics company WisdomAI, Soham Mazumdar, to find out more about this challenge and how businesses can deal with it.

Continue reading

How ‘confidential computing’ can add trust to AI [Q&A]

AI PC

Artificial intelligence is finding its way into more and more areas of our lives. But while there are concerns around the use of the technology itself, there are much greater ones over how we secure it.

We spoke to Anand Kashyap, CEO and founder of Fortanix, to discuss confidential computing, a technology backed by Microsoft, Intel, Arm, AMD and Nvidia, which encrypts data while it's being processed, even by AI systems.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.