Is it time to rethink legacy firewalls? [Q&A]


A new report from Guardicore and the Ponemon Institute reveals that more than 60 percent of organizations believe that legacy firewalls are ineffective in preventing damaging cyberattacks against applications, data centers, and data in the cloud.
We spoke to Dave Burton, VP marketing at Guardicore to find out more.
MACH and what it means for development [Q&A]


Launched in June of this year, the MACH Alliance (MACH standing for Microservices based, API-first, Cloud-native SaaS and Headless) is a non-profit group of tech leaders advocating for a new, open and best-of-breed enterprise technology ecosystem.
The Alliance aims to help enterprise organizations navigate the complex modern technology landscape with the belief that competitive advantage doesn't come from owning the stack, but rather from being free to select the best available resources for the moment.
Dealing with the security risks of unstructured data [Q&A]


Businesses are increasingly reliant on data. In the past that's generally been in a structured form but, thanks to increasing amounts of customer information gleaned via the IoT and channels like social media, unstructured data has taken on a new importance.
Yet unstructured data also introduces new risks. AI-based solutions specialist Concentric is launching a new data access governance solution that addresses the challenge of unstructured data security. We spoke to Karthik Krishnan, CEO at Concentric, to find out more.
The rise of the shopping bot and what it means for security teams [Q&A]


If you've ever tried to order a recently released tech product, like a new game console or the latest hot graphics card only to find it's sold out, you've no doubt felt frustrated. It's even more frustrating when the product then appears on secondary market sites at many times the original price.
What you're seeing here is probably the action of automated shopping bots that scoop up products for resale at a profit. Is this a form of cyber attack or is it just rather shady commercial activity? We spoke to Ameya Talwalker, co-founder of Cequence Security, to find out more about the behavior of these bots and what can be done to curb their activity.
Getting real about ransomware [Q&A]


For every high-profile ransomware incident in the headlines, there are many more that never get reported. Particularly among small- and medium-sized businesses, often with small IT and cybersecurity teams, a ransomware attack can be an existential problem.
To understand how companies should respond when they discover they're in the grip of a ransomware threat actor, we spoke with Kurtis Minder, CEO and co-founder of GroupSense, which helps companies navigate through these attacks to get their businesses back online.
How AI can help enterprises stay on top of data governance [Q&A]


Security breaches and privacy violations can cost businesses dearly. not only in financial penalties but also by causing damage to their reputation.
Keeping tabs on your data and how it's used is an essential part of staying in control and it's an area where AI can help. We spoke to Amar Kanagaraj, founder and CEO of AI-powered data protection and data governance specialist oneDPO to find out more.
How the pandemic has reinvigorated Emotet [Q&A]


The US Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has recently put out a warning concerning a surge in activity from the group behind the Emotet trojan.
Emotet has been around for some time and has mostly been associated with banking trojans, but this year’s upsurge in activity has seen it branch out into other areas.
SASE will top the cybersecurity priority list in 2021 [Q&A]


COVID-19 has caused many industries to experience an economic downturn, but cybersecurity isn't one of them.
Rather, cybersecurity is taking on newfound or heightened importance within many companies, as cybercriminals continue to exploit the global health crisis and associated business disruption to prey on unsuspecting work-from-home employees.
The evolution of cloud native -- Kubernetes and beyond [Q&A]


Enterprises are expanding their view of 'cloud native' to be much more than simply deploying containers on Kubernetes in the Cloud.
A new report -- Cloud Native Adoption Trends 2020-2021 -- from Lightbend, the company behind the Scala programming language, sheds light on this trend. We spoke with Mark Brewer, CEO of the company to learn more about how developers and business leaders alike are looking higher up the stack, at the application layer.
The challenge of effectively securing collaboration tools [Q&A]


The COVID-19 pandemic has forced many more organizations to adopt remote working. This in turn has led to a boom in the use of tools like Teams and Zoom to help employees communicate.
Securing those tools though presents some serious challenges ensuring that, for example, they aren't used, inadvertently or on purpose, to leak sensitive information.
Developer productivity in the remote era [Q&A]


Many more people are now working remotely and developers are no exception. But how does this shift in working patterns affect their productivity?
We spoke to Manish Gupta, CEO and founder of code analysis specialist ShiftLeft to find out more about the challenges of development in a remote world.
Vulnerabilities in eCommerce platforms make for holiday season risks [Q&A]


As we head towards a COVID Christmas it's likely that many more people will be doing their holiday shopping online.
But while this is good news for online retailers it's also an opportunity for fraudsters. This year has already seen a surge in attacks on eCommerce sites and there are certain to be more to come. We spoke to Satnam Narang, staff research engineer at Tenable to find out more about the latest vulnerabilities and how businesses can protect themselves.
How SASE is transforming enterprise network security [Q&A]


Securing enterprise networks used to be a matter of simply defending the perimeter, but in the new normal world of much higher levels of remote access, things have become more complicated.
One of the technologies being used increasingly by businesses is Secure Access Service Edge (SASE). We spoke to Mike Wood, chief marketing officer of Versa Networks, to discover more about SASE and what it can deliver.
Why businesses need to maintain GDPR compliance during remote working [Q&A]


The General Data Protection Regulation (GDPR) came into force in the EU in May 2018 with the aim of giving individuals greater protection over how businesses use their data.
But the COVID-19 pandemic has thrown up new challenges and remaining compliant with the regulations in an age of remote working is one of them. We spoke to Brendan Kiely, managing director and co-founder of secure remote working specialist ThinScale Technology to discuss the implications of GDPR and the 'new normal'.
Delivering stronger security for enterprise data [Q&A]


Data is among an enterprise's most valuable assets, no matter where or how it's stored, having visibility and unified access control is essential.
Mohit Tiwari, CEO at Data Store and Object Security (DSOS) company Symmetry Systems, left a professorship at the University of Texas in Austin to start the business and develop a new approach to data security in the form of Symmetry DataGuard which maintains authority over data even when all else fails. We spoke to him to find out more.
Recent Headlines
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.