Articles about Q&A

Bridging the gap between boardroom and SOC demands [Q&A]

Boardroom CISO

It’s inevitable that different parts of the enterprise will pull in different directions. This is particularly true when it comes to the IT world where operational teams like the SOC tend to focus on operational resilience while management and the boardroom worry about compliance.

We talked to Kyle Wickert, field chief technology officer of AlgoSec, about how IT pros can balance the compliance demands of the C-suite while maintaining security across sprawling hybrid environments.

Continue reading

System integrations -- strategic phasing or waterfall implementation? [Q&A]

integration jigsaw

As organizations continue to navigate complex system integrations, one critical decision that arises is whether to embrace strategic phasing or waterfall implementation. The choice of approach can shape the success or failure of projects, particularly when dealing with large-scale ERP consolidations and replacements.

We spoke with Scott Maggiolo, SVP of information technology at Ribbon Communications to understand the pros and cons of each and how the decision is not one-size-fits-all.

Continue reading

AI is an even playing field -- how secure by design can tip the scale [Q&A]

Secure by design

Vibe coding is currently all the rage, with more than 97 percent of respondents to a survey earlier this year reporting having used AI coding tools at work.

The adoption of these tools only continues to grow but it comes with a catch, attackers are also employing the same techniques. We spoke to Pieter Danhieux, co-founder and CEO of Secure Code Warrior, to discuss how vibe coding is redefining the software development landscape, how malicious actors are also leveraging this technology and the need for organizations to implement secure by design strategies from the outset.

Continue reading

Why the cybersecurity industry needs to be more accessible [Q&A]

Cloud vulnerability lock

The proliferation of different cybersecurity tools has created an operational crisis for organizations, with companies struggling to manage an increasing array of defensive technologies.

Organizations today are forced to juggle multiple tools, each with unique UI, costs, and maintenance headaches. They’re also often not able to buy the tools they need, because they are either too expensive or don't exist in the specific capacity they need.

Continue reading

Agentic AI and its impact on the healthcare sector [Q&A]

AI-healthcare

Agentic AI is changing healthcare workflows by moving from passive data analysis to active orchestration of decisions.

But with this come risk. We spoke to Rajan Kohli, CEO of CitiusTech, to discuss how AI is changing healthcare and how organizations can prepare for its impact.

Continue reading

Why the retail industry needs to rethink identity [Q&A]

identity individual crowd

The retail industry continues to be a top target for cyber criminals, retailers rely heavily on digital infrastructure to manage consumer data and operations so they remain an attractive target for attackers seeking financial or operational disruption.

The cyberattacks earlier this year hitting UK retail (Marks & Spencer, Co-op, Harrods) are the latest reminder that identity is still one of the weakest links.

Continue reading

Dirty data and why it’s a problem for business [Q&A]

Laptop data analytics

Organizations are sitting on troves of information yet struggle to leverage this data for quick decision-making. The challenge isn't just about having data, but working with it in its natural state -- which often includes ‘dirty data' not cleaned of typos or errors.

We spoke to CEO of analytics company WisdomAI, Soham Mazumdar, to find out more about this challenge and how businesses can deal with it.

Continue reading

How ‘confidential computing’ can add trust to AI [Q&A]

AI PC

Artificial intelligence is finding its way into more and more areas of our lives. But while there are concerns around the use of the technology itself, there are much greater ones over how we secure it.

We spoke to Anand Kashyap, CEO and founder of Fortanix, to discuss confidential computing, a technology backed by Microsoft, Intel, Arm, AMD and Nvidia, which encrypts data while it's being processed, even by AI systems.

Continue reading

Responding to the challenge of deepfakes [Q&A]

Deepfake plan

Recent advancements in publicly available AI models have made it incredibly easy to generate deepfakes -- so much so that attackers don’t need to be technical experts to pull off convincing deception campaigns.

Attackers can scrape public content to recreate someone's voice or face, and inject that fake identity into virtual meetings, phone calls, or even training videos.

Continue reading

The challenge of syncing virtual economies across platforms [Q&A]

Web development and coding. Cross platform development website. Adaptive layout internet page or web interface on screen laptop, tablet and phone. Isometric concept illustration.

As people increasingly demand seamless experiences across platforms, developers face growing complexity in managing unified virtual economies.

In the games sector in particular companies need to leverage distributed architecture, virtual currencies, and real-time inventory reconciliation to ensure consistent user experiences and secure transaction flows.

Continue reading

Rethinking AppSec for the AI era [Q&A]

AI robot security

The application security landscape has always been a complex one and can lead to teams spending too much time hunting down vulnerabilities. With AI becoming more popular there are even greater risks to consider.

We spoke to Yossi Pik, co-founder and CTO at Backslash Security, to discuss how AppSec needs to adapt to the greater use of AI.

Continue reading

Securing Kubernetes in the enterprise [Q&A]

Secure by design

As more organizations scale up containerized workloads they’re also facing increasing security and compliance challenges.

Kim McMahon part of the leadership team at Sidero Labs to discuss the vulnerabilities enterprises are encountering when scaling up Kubernetes on traditional operating systems and what they can do to counter them.

Continue reading

Why one-time security assessments are no longer sufficient [Q&A]

Observability magnifier code

With cyber threats becoming more numerous and ever more sophisticated, it’s becoming more critical than ever for organizations to prioritize targeted threats, optimize their existing defensive capabilities and proactively reduce their exposure.

One-time security assessments are looking increasingly inadequate. We spoke to CyberProof CEO Tony Velleca to discuss how organizations can effectively implement a Continuous Threat Exposure Management (CTEM) strategy to improve their protection.

Continue reading

Why the traditional SOC model needs to evolve [Q&A]

Data Security

The security operations center (SOC) has long relied on traditional SOAR platforms to manage incidents, but today’s threat landscape is moving too fast for rigid, static approaches. As attackers use AI to evolve their tactics, security teams need smarter, more adaptive systems to keep up.

We spoke to Tom Findling, co-founder and CEO of Conifers.ai, about how AI-powered SOC platforms are helping organizations scale their defenses, improve threat detection, and move from reactive alert management to proactive risk reduction.

Continue reading

How do you know if you’re dealing with a human or a bot? [Q&A]

robot hand shake with human

If you’ve seen ‘Blade Runner’ you’ll know how difficult it can be to determine if someone is human or not. While that was fiction it’s worth remembering that it was set in 2019.

In 2025 and in the real world it’s becoming increasingly difficult to tell humans from bots in the online world. AI-powered bots, nearly indistinguishable from humans, are multiplying rapidly. This presents a growing nightmare for headhunters, security officers and more. We spoke to Terence Kwok, founder and CEO of blockchain identity platform Humanity Protocol, about the challenge of verifying humanity online.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.