Articles about Q&A

Getting the most value out of your data [Q&A]

folder stack

The past few years have seen a boom in digital transformation as enterprises have sought to modernize their operations to take advantage of a new, more flexible world of work.

But this change has often led to unwieldy data structures that are difficult to manage, which means that extracting value from the data is harder than it should be.

Continue reading

Integrating security into the development process [Q&A]

DevSecOps

Historically, security has been treated as something as an afterthought in the IT industry. In more recent years though there has been pressure to introduce 'security by design' to ensure that products are developed with best practices in mind.

We spoke to David Melamed CTO of Jit to find out about integrating security and how security tools can be used by developers not just security professionals.

Continue reading

How artificial intelligence is transforming banking [Q&A]

Robot Bitcoin Pink Piggy Bank

Banking is a key industry, playing a major role in the economy, historically though it's been one that's slow to adapt to technological advances.

That's starting to change though, partly down to the arrival of more agile fintech companies. We spoke to co-founder of Iterate.ai, Brian Sathianathan, to find out more about how AI and machine learning can help transform the banking sector.

Continue reading

The role of service mesh in application security [Q&A]

Cyber Security lock icon Information Privacy Data Protection internet and Technology

As organizations embrace cloud-native development, they are building new types of applications and microservices that are easier to scale and add more business value.

But the growing adoption of microservices has introduced new security risks because microservices and modern applications contain more 'pieces' that increase the attack surface.

Continue reading

Why a bigger budget isn't necessarily the key to good cybersecurity [Q&A]

budget keyboard

Cyberattacks are expected to reach historic levels this year, in both volume and sophistication, yet many organizations are reducing their 2023 cybersecurity budgets.

We spoke to Steve Benton, VP of threat research at intelligence-driven cybersecurity specialist Anomali, to discover how a different approach might offer strong protection without breaking the bank.

Continue reading

The challenge of securing APIs [Q&A]

api

Technology continues to advance at an unprecedented rate. The development and use of Application Programming Interfaces (APIs) being a particularly notable example.

The latest Salt Labs State of API Security report found that overall API traffic increased 168 percent over 12 months, with API attack traffic increasing by 117 percent in the same time period. Perhaps understandably, many CISOs are struggling to keep up.

Continue reading

How software pricing strategy is evolving [Q&A]

Price software tablet

Buying software used to be relatively simple. You either paid a one-off fee, or an ongoing license, or sometimes a combination of both.

With the advent of cloud and SaaS, however, things have become rather more complicated. Usage based pricing is more common, plus in a difficult economic climate there's a spotlight on software costs.

Continue reading

The rise of hardware-based security and why it matters [Q&A]

firewall_security

Cybersecurity is usually viewed as something to be addressed via software. In recent years though we've seen a hardware element start to creep in -- Windows 11's requirement for TPM capability for example.

Can we expect to see more hardware-based security measures? And what benefits do these offer? We spoke to Ed Maste, senior director of technology at the FreeBSD Foundation (the non-profit organization supporting the open source FreeBSD operating system) to find out.

Continue reading

Tackling cloud costs and multicloud networking in a bad economy [Q&A]

cloud cost

It's become common for businesses to use more than one cloud, however, service providers have no incentive to offer unified management tools as they want to keep customers for themselves.

This means enterprises end up relying on multiple tools as their cloud footprint expands which is not only inefficient but can be costly. We spoke to Rod Stuhlmuller, VP of solutions marketing at Aviatrix, to find out how organizations can monitor and control their cloud usage and costs at a time when budgets are coming under increased pressure.

Continue reading

Deploying at scale -- what does it mean and why does it matter? [Q&A]

Concept of agile software development

One of the popular buzzwords in development circles in recent years has been 'deployment at scale'. Now, while it's nice to have a universally recognized term, opinions about what deployment at scale actually means tend to vary.

So what exactly does 'at scale' mean in the development community and how can companies define their own approach? We spoke to Adam Frank, VP, product and marketing at Armory.io, to find out.

Continue reading

Generative AI -- what it is and why there's no rush to adopt it [Q&A]

intelligence

Generative AI has been getting attention recently for its novelty, unique applications and potential impact on the business world.

But, like any new invention, there's some confusion around what it actually is and what it can do. We spoke to Scott Varho, chief evangelist of 3Pillar Global, who argues that companies shouldn't be rushing to adopt generative AI without considering their needs and potential value.

Continue reading

Ethical web scraping and data rights [Q&A]

streaming from the deep

Web scraping, automatically harvesting and extracting data from websites, can be a useful tool for businesses to learn about their customers.

But it's easy to fall into the trap of harvesting data just because it's there, leading to information overload not to mention privacy concerns for the consumer. To find out more about web scraping and how it can be used in an ethical way we spoke to founder and CEO of Rayobyte, Neil Emeigh.

Continue reading

Why SBOMs have become a vital element of supply chain risk management [Q&A]

SBOM Software Bill of Materials

In recent years, the software bill of materials (SBOM) has become a key element of software security and software supply chain risk management.

We spoke to Tim Mackey, head of software supply chain risk strategy at Synopsys to find out more about the benefits and challenges of SBOMs.

Continue reading

Protecting the software supply chain [Q&A]

supply chain

As developers come under increasing pressure to deliver projects quickly, there's a rising level of conflict between development and security teams. And attackers are taking advantage of this conflict in order to target software supply chains.

So, what kind of threats do enterprises face and what can they do to protect themselves? We spoke to Pete Morgan, co-founder and CSO of supply chain security company Phylum to find out.

Continue reading

Prioritizing privacy and making social media 'social' again [Q&A]

Young woman using social media on her smartphone

While social media sites like Facebook remain popular, many people have worries about how their data is is being collected and used by the companies behind them.

Bret Cox is founder and CEO of True, a social network which doesn't monetize user information and focuses on people you really know. We talked him to find out more.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.