Articles about Q&A

The changing face of fraud and how artificial intelligence is helping to counter it [Q&A]

Robot hacker

Financial crime is on the increase and attackers must be stopped in their tracks. Financial service organizations new and old need to ensure they have the right technology in place to predict, detect and deter fraud, whilst ensuring minimal disruption to the customer journey.

We spoke to Martin Rehak, CEO of Resistant AI to find out how sophisticated artificial intelligence can detect known criminal practices and more importantly, predict the unknown emerging patterns of financial crime.

Continue reading

The impact of DDoS attacks on the enterprise [Q&A]

DDoS attacks

With the UK and US being amongst the top four most targeted nations for network DDoS attacks during the first half of 2021, this is clearly a problem that hasn't gone away amid all the pandemic-related news.

We spoke to David Elmaleh, senior product manager, Edge Services at Imperva. to discuss the impact DDoS attacks can have and why it's essential for organizations to monitor for anomalies relating to unexplained traffic spikes.

Continue reading

How banks are strengthening their cybersecurity posture [Q&A]

online banking

Cyberattacks and data breaches affect all kinds of organizations, but banks and financial services firms are at particular risk.

The shift to using mobile devices to carry out financial transactions has changed the threat landscape in recent years too. We spoke to Will LaSala, director of security solutions and security evangelist at OneSpan to find out more about what banks can do to bolster their security.

Continue reading

SIEM, SOAR and their role in improving cloud security [Q&A]

Cloud data security

It's increasingly common for enterprise systems to be in the cloud rather than in-house, but that throws up a whole range of new challenges when it comes to securing them.

We spoke to Dario Forte, vice president and general manager, security orchestration, at cloud management specialist Sumo Logic to find out more about what's involved in cloud security and how automation can help.

Continue reading

Why quantum computing is a security threat and how to defend against it [Q&A]

quantum computing

Quantum computing offers incredible computing power and is set to transform many areas such as research. However, it also represents a threat to current security systems as cracking passwords and encryption keys becomes much easier.

So quantum is a security threat, but is there a solution to making systems safer? We spoke to David Williams, CEO of symmetric encryption specialist Arqit, to find out.

Continue reading

Why SaaS security needs to have a higher profile [Q&A]

SaaS

Increasing numbers of apps are moving to an SaaS model and containers, but the security of these applications doesn't always get much attention.

We spoke to BetterCloud CEO, David Politis who believes that SaaS security is an area that businesses need to take much more seriously.

Continue reading

The business case for zero trust network access [Q&A]

Network security

As the business network landscape has become more complex, many organizations are turning to zero trust network access (ZTNA) in order to boost their security. It's also replacing or supplementing older technologies like VPN.

We spoke to Kurt Glazemakers, CTO at secure access specialist Appgate who believes that there is a solid business case for ZTNA as well as a security one.

Continue reading

Data privacy and consent in the age of CCPA, GDPR and impending federal privacy law [Q&A]

privacy key

When it comes to consent and data privacy, the rise of regulations like the General Data Protection Regulation (GDPR), along with increased consumer awareness of data infractions and breaches, has raised the stakes.

When the California Consumer Privacy Act (CCPA) passed in 2018, many states began following California's lead. Currently, more than 30 states have comprehensive privacy bills that are close to passing or in early stages of being drafted.

Continue reading

Why changing legislation means companies need to rethink their data protection [Q&A]

Data protection

Businesses have embraced the use of data to drive decisions and digital transformation. In many cases consumers are happy to have their details captured too, as long as they benefit from it.

But as more and more countries introduce privacy and data protection legislation, and as California clarifies some of its cookie-based tracking definitions, and increases enforcement of both intentional and unintentional violations under CCPA, enterprises need to tighten up their data handling.

Continue reading

The threat of ransomware through Active Directory [Q&A]

ransomware key

Ransomware has hit the headlines in recent months with attacks on infrastructure and supply chains closing down operations. But ransomware has the potential to be even more devastating if it’s spread via Active Directory, as demonstrated by the SolarWinds attack.

We talked to Derek Melber, chief technology and security strategist of Tenable to find out more about AD attacks and how to combat them.

Continue reading

Why enterprises need to make the shift to DevSecOps now [Q&A]

DevSecOps

Many enterprises have adopted DevOps practices in order to streamline their development. But security is all too often treated as an afterthought.

There is of course a way around this which is to integrate security into the DevOps pipeline, in other words move to DevSecOps.

Continue reading

Adopting best practice approaches for hybrid working [Q&A]

home working

More and more businesses are moving to a hybrid work model. But while this approach can offer improved value along with the tools to drive the business forward, it can also present a number of challenges.

So what does it take to succeed with a hybrid approach? We spoke to Cisco Webex's Lorrissa Horton to find out.

Continue reading

Digital forensics in modern cloud environments [Q&A]

Deep Data Search digital forensics

Increasingly applications and infrastructure are moving to the cloud and containers. But although this offers convenience and cost savings it introduces challenges when security incidents occur.

We spoke to James Campbell, CEO and co-founder of Cado Security to find out about the importance of digital forensics when dealing with cloud system breaches.

Continue reading

How technical debt is harming API security [Q&A]

api

APIs allow the easy exchange of information between apps, microservices and containers. They've become an essential part of the way our digital infrastructure operates.

But the very ubiquity of APIs means developers are under pressure to produce them quickly and that can lead to 'technical debt' because corners are cut. We spoke to Tom Hudson, security research tech lead at app vulnerability scanner Detectify to find out more about why APIs are vulnerable in this way and how they can be secured.

Continue reading

Why supply chain security blind spots put enterprises at risk [Q&A]

supply chain

Many recent cyberattacks have focused on the software supply chain, with SolarWinds being perhaps the most high profile example.

Businesses can often have a blind spot when it comes to the supply chain and this can have catastrophic consequences. We spoke to Todd Carroll, CISO of CybelAngel to learn more about the problem and what companies can do to keep themselves safe.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.