Articles about Q&A

How automation can help people do their jobs [Q&A]

Automation

The past year has seen many changes to the way businesses operate, including a stepping up of digital transformation and more interest in automating processes.

But many people still fear that greater automation could lead to a loss of jobs. We spoke to Yakaira (Kai) Nunez, senior director of research and insights at Salesforce to discover why she thinks enterprises can deploy automation to partner with rather than replace humans.

Continue reading

Securing insurance's new attack surface with crowdsourced cybersecurity [Q&A]

business security

All industries have been affected by the COVID-19 pandemic and the need to shift to new ways of working. This change has also led to an expanded attack surface for cyber criminals.

The insurance sector has been particularly hit in the past year and we spoke to Ashish Gupta, CEO of crowdsourced security company Bugcrowd to find out how businesses have been affected and how they're responding to the challenge.

Continue reading

Applying a hybrid working model to your cloud strategy [Q&A]

Cloud

The shift brought about by the pandemic has accelerated many companies’ plans to move to the cloud. But all migrations come with some risk and rushing them through may be storing up problems for the future.

A successful hybrid strategy can help in avoiding these issues. We spoke to Arcserve's backup, DR, and ransomware protection evangelist Sam Roguine to find out about the potential risks of rushed cloud migrations -- like security gaps and missing data -- and how IT leaders can address them.

Continue reading

The growing risk from critical infrastructure cyberthreats [Q&A]

Industrial computer system

The more reliant businesses become on technology the more risk they face from a range of cyberthreats. This is especially true when it comes to critical infrastructure as it's an attractive target for nation state and other attackers.

We spoke to James Carder, chief security officer and vice president of labs at SIEM platform LogRhythm to discover more about critical infrastructure threats and how to guard against them.

Continue reading

How changes to tracking will affect the online world [Q&A]

surveillance tracking

The Identifier for Advertisers (IDFA) is a random device identifier assigned to a user's device which advertisers use to track data so they can deliver customized advertising.

But Apple is about to replace the iOS IDFA tracking system in iOS 14 with a new App Tracking Transparency (ATT) feature which will allow iPhone users to opt-out of tracking on third-party apps and sites. This, plus Google's crack down on third-party cookies, means privacy is a hot topic currently -- and all signs point to even more shifts in the coming year.

Continue reading

Why email is still the favorite way of delivering cyberattacks [Q&A]

Email attack

Although business IT has seen many changes over the last year, email remains the main vector for carrying out cyberattacks.

In its latest Global Security Report Zix looks at the trends in email attacks over the last year and the impact they have. We spoke to David Wagner, president and CEO of, Zix to find out more.

Continue reading

Overcoming SaaS platform tech debt [Q&A]

SaaS

The rapid shift to remote working has accelerated digital transformation and mass-cloud migration across almost every organization -- even those who weren't necessarily ready for it.

As IT professionals settle into long-term planning and management of their SaaS platforms and apps, CoreView's SVP Doug Hazelman believes they must now begin to effectively manage their cloud infrastructure so they can focus on maximizing the value of their investments. We spoke to him to learn more.

Continue reading

Why security and observability are key to software development [Q&A]

software development

Developers are under increasing pressure to create real-time products that make the most of a wide range of digital resources.

This means that DevOps teams have to cope with information drawn from all sorts of different sources. But how can they ensure they are getting an accurate picture?

Continue reading

Why SASE is vital for the cybersecurity industry [Q&A]

Network security

One of the frameworks that has received greater attention since the acceleration of digital transformation is Secure Access Services Edge (SASE).

But what does its adoption mean for the security industry and how can enterprises best take advantage of SASE? We spoke to Mary Blackowiak, senior product marketing manager at AT&T Cybersecurity, to discover more.

Continue reading

How and why the telecoms industry is coming under sustained attack [Q&A]

Shocked man looking at phone

The trend towards digital transformation and the sudden shift to remote working has seen the telecommunications industry become a prime target for both criminal and state-sponsored attacks.

Threat intelligence specialist IntSights has produced a new report focusing on the threats to the telecoms industry and we spoke to Paul Prudhomme, cyber threat intelligence advisor at the company to find out more.

Continue reading

SaaS applications and what they mean for security management [Q&A]

SaaS

The move to using SaaS applications has been accelerated by the pandemic, with many businesses turning to the cloud to enable their staff to work remotely.

But this raises new issues around keeping the business secure. We spoke to Shailesh Athalye, vice president of compliance at security and compliance platform Qualys to discover more about the issues and how to approach them.

Continue reading

Why enterprises aren't properly addressing supply chain threats [Q&A]

supply chain

Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.

A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.

Continue reading

What's wrong with software debugging? [Q&A]

code

We've seen a tidal wave of developer-enabling technologies over the last ten years. From DevOps, to CI/CD, to containers and microservices -- all of these best practices and technology patterns aim to speed up the process of shipping code fast from the developer into production.

But while software has become increasingly easy to package and deploy, the process of diagnosing and fixing bugs in production has become much more difficult. When services crash in the middle of the night, developers still find themselves in the world of logs, hotfixes and desperation -- but now with much greater surface area to investigate as applications span distributed systems.

Continue reading

The challenges of navigating breach notification rules [Q&A]

Data breach

New and updated privacy legislation is being launched around the world and a key component of these acts is breach notification requirements, which mean a business is required to notify individuals when their information falls into the hands of an attacker.

We spoke to Ralph Nickl, founder and CEO of Canopy Software to find out what what enterprises and consumers need to know about these laws and the challenges that compliance brings.

Continue reading

Why financial enterprises need to take a more Agile approach [Q&A]

Agile development

Adopting a more agile approach to development has allowed many businesses to speed up the introduction of new products and services.

But banking and financial organizations have tended to be more conservative in their approach and have consequently come under pressure from faster moving fintech competitors.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.