How automation can help people do their jobs [Q&A]


The past year has seen many changes to the way businesses operate, including a stepping up of digital transformation and more interest in automating processes.
But many people still fear that greater automation could lead to a loss of jobs. We spoke to Yakaira (Kai) Nunez, senior director of research and insights at Salesforce to discover why she thinks enterprises can deploy automation to partner with rather than replace humans.
Securing insurance's new attack surface with crowdsourced cybersecurity [Q&A]


All industries have been affected by the COVID-19 pandemic and the need to shift to new ways of working. This change has also led to an expanded attack surface for cyber criminals.
The insurance sector has been particularly hit in the past year and we spoke to Ashish Gupta, CEO of crowdsourced security company Bugcrowd to find out how businesses have been affected and how they're responding to the challenge.
Applying a hybrid working model to your cloud strategy [Q&A]


The shift brought about by the pandemic has accelerated many companies’ plans to move to the cloud. But all migrations come with some risk and rushing them through may be storing up problems for the future.
A successful hybrid strategy can help in avoiding these issues. We spoke to Arcserve's backup, DR, and ransomware protection evangelist Sam Roguine to find out about the potential risks of rushed cloud migrations -- like security gaps and missing data -- and how IT leaders can address them.
The growing risk from critical infrastructure cyberthreats [Q&A]


The more reliant businesses become on technology the more risk they face from a range of cyberthreats. This is especially true when it comes to critical infrastructure as it's an attractive target for nation state and other attackers.
We spoke to James Carder, chief security officer and vice president of labs at SIEM platform LogRhythm to discover more about critical infrastructure threats and how to guard against them.
How changes to tracking will affect the online world [Q&A]


The Identifier for Advertisers (IDFA) is a random device identifier assigned to a user's device which advertisers use to track data so they can deliver customized advertising.
But Apple is about to replace the iOS IDFA tracking system in iOS 14 with a new App Tracking Transparency (ATT) feature which will allow iPhone users to opt-out of tracking on third-party apps and sites. This, plus Google's crack down on third-party cookies, means privacy is a hot topic currently -- and all signs point to even more shifts in the coming year.
Why email is still the favorite way of delivering cyberattacks [Q&A]


Although business IT has seen many changes over the last year, email remains the main vector for carrying out cyberattacks.
In its latest Global Security Report Zix looks at the trends in email attacks over the last year and the impact they have. We spoke to David Wagner, president and CEO of, Zix to find out more.
Overcoming SaaS platform tech debt [Q&A]


The rapid shift to remote working has accelerated digital transformation and mass-cloud migration across almost every organization -- even those who weren't necessarily ready for it.
As IT professionals settle into long-term planning and management of their SaaS platforms and apps, CoreView's SVP Doug Hazelman believes they must now begin to effectively manage their cloud infrastructure so they can focus on maximizing the value of their investments. We spoke to him to learn more.
Why security and observability are key to software development [Q&A]

Why SASE is vital for the cybersecurity industry [Q&A]


One of the frameworks that has received greater attention since the acceleration of digital transformation is Secure Access Services Edge (SASE).
But what does its adoption mean for the security industry and how can enterprises best take advantage of SASE? We spoke to Mary Blackowiak, senior product marketing manager at AT&T Cybersecurity, to discover more.
How and why the telecoms industry is coming under sustained attack [Q&A]


The trend towards digital transformation and the sudden shift to remote working has seen the telecommunications industry become a prime target for both criminal and state-sponsored attacks.
Threat intelligence specialist IntSights has produced a new report focusing on the threats to the telecoms industry and we spoke to Paul Prudhomme, cyber threat intelligence advisor at the company to find out more.
SaaS applications and what they mean for security management [Q&A]


The move to using SaaS applications has been accelerated by the pandemic, with many businesses turning to the cloud to enable their staff to work remotely.
But this raises new issues around keeping the business secure. We spoke to Shailesh Athalye, vice president of compliance at security and compliance platform Qualys to discover more about the issues and how to approach them.
Why enterprises aren't properly addressing supply chain threats [Q&A]


Supply chain threats like the recent SolarWinds attack are becoming more of a concern as businesses are more reliant on smoothly functioning links with suppliers and customers.
A successful attack can have a devastating effect on an organization and its reputation, but by their very nature these are not easy threats to deal with.
What's wrong with software debugging? [Q&A]


We've seen a tidal wave of developer-enabling technologies over the last ten years. From DevOps, to CI/CD, to containers and microservices -- all of these best practices and technology patterns aim to speed up the process of shipping code fast from the developer into production.
But while software has become increasingly easy to package and deploy, the process of diagnosing and fixing bugs in production has become much more difficult. When services crash in the middle of the night, developers still find themselves in the world of logs, hotfixes and desperation -- but now with much greater surface area to investigate as applications span distributed systems.
The challenges of navigating breach notification rules [Q&A]


New and updated privacy legislation is being launched around the world and a key component of these acts is breach notification requirements, which mean a business is required to notify individuals when their information falls into the hands of an attacker.
We spoke to Ralph Nickl, founder and CEO of Canopy Software to find out what what enterprises and consumers need to know about these laws and the challenges that compliance brings.
Why financial enterprises need to take a more Agile approach [Q&A]


Adopting a more agile approach to development has allowed many businesses to speed up the introduction of new products and services.
But banking and financial organizations have tended to be more conservative in their approach and have consequently come under pressure from faster moving fintech competitors.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.