Why lack of training can put cybersecurity at risk [Q&A]

Laptop protect security

One of the effects of the pandemic and the shift to remote and hybrid working has been that organizations have become increasingly reliant on messaging tools like Teams and Slack.

But new research from CybSafe shows that 47 percent of workers have received no training in the use of these platforms and could be putting themselves and their employers at risk.

Continue reading

How AI can help secure the software supply chain [Q&A]

Blockchain

Securing the software supply chain presents many challenges. To make the process easier OX Security recently launched OX-GPT, a ChatGPT integration aimed specifically at improving software supply chain security.

We spoke to Neatsun Ziv, co-founder and CEO of OX Security, to discuss how AI can present developers with customized fix recommendations and cut and paste code fixes, allowing for quick remediation of critical security issues across the software supply chain.

Continue reading

Why a new architecture is needed for open banking API platforms [Q&A]

Open banking financial technology fintech

While much literature has been written on best practices for systems architecture, the desired outcomes have been as elusive as they have been sought after. The de-facto standard for enterprise systems that exists in reality is often closer to A Big Ball of Mud.

Very rarely is an organization’s technology (the infrastructure, the software or the set of systems powering the organization) planned as the state in which we see it today. All early systems need to scale, and most companies in the growth phase don't have the bandwidth to deal with this graciously.

Continue reading

How the EU's new AI Act will affect businesses [Q&A]

Three European flags

The European Union first proposed introducing a regulatory framework for AI back in 2021, the wheels of politics inevitably grind slowly, however, and it's still working on legislation to bolster regulations on the development and use of artificial intelligence.

The proposed Artificial Intelligence Act has sparked a good deal of debate in the industry with many worried that it could harm business competitiveness.

Continue reading

Why governments need an effective access management strategy [Q&A]

Identity Threat Detection and Response and Cloud Infrastructure

Governments and data make for a complex relationship. In some cases, agencies are obligated to make information publicly accessible. In others, sensitive data is highly regulated and therefore needs to be protected to keep it out of the public domain.

With key information changing hands internally via various departments and externally via third parties, it's vital that government agencies can access systems and share data securely -- particularly given increases in cyberattacks.

Continue reading

How investing in 'prompt engineering' training can contribute to business success [Q&A]

machine learning

While some might argue that generative AI is eliminating the need for certain jobs, it's also increasing the need for new roles and skills such as 'prompt engineering'.

With many people looking to upskill in this area to produce better results from AI tools like ChatGPT, and some companies creating new roles to stay ahead of AI's fast-paced developments, we spoke to Mike Loukides, vice president of content strategy for O'Reilly Media, to find out more about prompt engineering and why it’s important.

Continue reading

How AppSec can help enterprises make sense of cloud-native development [Q&A]

Cloud maze complexity

Today's application security landscape is complex and can lead to teams spending a lot of time hunting down vulnerabilities. Add in the move to cloud-based development and there's an even higher volume of code to deal with

We spoke to Shahar Man, CEO at Backslash Security, to learn more about what AppSec needs to look like in this world and how it ties in with greater use of the cloud.

Continue reading

Meeting the challenges of API security [Q&A]

api

In today's increasingly digitally-centered organizations, the development of products, services, and solutions increasingly depends on the implementation of Application Programming Interfaces (APIs).

APIs have become the building blocks of modern business applications and are critical to digital transformation -- so much so that API security has become a boardroom issue.

Continue reading

Exploring how AI-powered chatbots are changing the business world [Q&A]

Artificial intelligence

Thanks to high-profile tools like ChatGPT, we've witnessed AI appearing in more and more areas and projects this year. Next week sees the launch of the latest Chatbot Summit, held at ExCel London on October 11-12, bringing together industry experts to share practical skills, knowledge, and insights.

We spoke with Chatbot Summit 2024 founder and executive chairman, Yoav Barel, to discuss the impact of AI technology and how businesses can prepare, as well as what summit attendees can expect from the event.

Continue reading

Why digital transformation is key to managing supplier relationships [Q&A]

Digital transformation

Digital transformation doesn't just affect your own business, it has a major influence on your relationships with suppliers and partners too.

We talked to Dan Amzallag, COO at Ivalua, to discuss the impact of digital transformation on the supplier ecosystem and procurement processes.

Continue reading

The impact of evolving AI in cybercrime [Q&A]

AI hacker

Artificial intelligence (AI) has been an evolving trend at the very center of cybersecurity in recent years. However, the release of a wave of new tools such as ChatGPT and Microsoft's Jasper chatbot have sparked fresh concerns about the potential for cybercriminals to leverage increasingly sophisticated technologies for nefarious purposes.

We spoke to Zach Fleming, principal architect at Integrity360, to explore whether AI can be used to create sophisticated malware and hacking tools capable of bringing down entire networks. We'll consider which concerns are valid by highlighting the current state of AI, and we'll explore how security teams can best combat the use of AI in cybercrime.

Continue reading

What's driving the need for cybersecurity in ESG [Q&A]

ESG

Environmental social and governance (ESG) policy sees businesses seek to implement ethical practices to safeguard, not just the business, but its ecosystem of partners and customers and the wider world.

We spoke to Tim Wallen, regional director for the UK, US and emerging markets at Logpoint, to discuss the reasons why cybersecurity needs to be incorporated into ESG reporting, and how this can be achieved.

Continue reading

Why bad bots and open banking are creating opportunities for cybercriminals [Q&A]

Artificial intelligence banking

We all know that bad bots are, well… Bad. But open banking is supposed to be good, giving consumers more control over their finances. Combine open banking and bad bots though and you have opened up a world of new threats to banks, customers, and their data.

We spoke to Alan Ryan, AVP for UK and Ireland at Imperva, about how open banking has created new opportunities for cybercriminals, and why the traditional siloed approach to security needs re-appraising.

Continue reading

The battle for control of cloud environments [Q&A]

Cloud

Lack of control has long been a pain point for developers in cloud computing, especially with the market dominated -- and controlled -- by a few large providers.

What's likely to happen as developers' desire for control meets the hyperscalers' desire to keep companies locked into their platforms? We spoke to Billy Thompson, solutions engineering manager at Akamai, to find out.

Continue reading

The rise in mobile device security threats and the growing attack surface [Q&A]

Threats from internet, gadget addiction

Both government agencies and corporations are being tasked with developing strategies for protecting mobile devices from an increasing wave of attacks. CISOs and business leaders are asking themselves not only how they can use mobile devices to make employees more productive, but also how to realize the full potential of a mobile-powered business.

As leaders execute their mobile-powered businesses, they will also need to parallel these initiatives with mobile-first security strategies to address the fast-growing attack surfaces that bad actors are increasingly jumping on. We spoke to Shridhar Mittal, CEO of Zimperium to discover more.

Continue reading

Load More Articles