Articles about Q&A

How contact centers have become a prime target for hackers [Q&A]

call center

With growing security threats and compliance being taken seriously, companies are more aware than ever of the need to protect their data.

This means hackers must work harder to try to steal information and contact centers are in the front line. We spoke to Ben Rafferty, chief innovation officer at security and compliance specialist Semafone to find out how contact centers are under threat and what can be done to protect them.

Continue reading

Are 'pop-up' SOCs the answer to protect major events? [Q&A]

business security

Increasingly high profile one-off events like sports tournaments and elections are becoming the target of hackers.

Protecting these is tough because even if the hosts have a sound security infrastructure for day-to-day operations, they often don't have the resources necessary to lock down a large scale, high-profile event which requires additional physical and cybersecurity to protect against disruption, revenue loss or other irreversible damage.

Continue reading

How data is changing the face of marketing [Q&A]

Marketing compass

Thanks to increased ability to collect data in real time, and the use of AI to process and interpret that data, marketers have more opportunity than ever to personalize their offerings to customers.

But what does this mean for enterprises when it comes to spending their marketing budgets and establishing a digital strategy? We spoke to the CEO of DMA | Digital Marketing Agency, Solomon Thimothy to find out how digital marketing can be used to drive business growth.

Continue reading

The benefits of a cloud-based testing regime [Q&A]

Cloud

DevOps teams are under constant pressure to release faster, improve quality and keep costs under control. This means testing increasingly becomes a priority to ensure accelerated releases and many companies are turning to cloud-based testing tools.

However, as with any move to the cloud, there are some challenges that need to be overcome. We spoke to Uzi Eilon, chief technology officer at cloud-based testing platform Perfecto to find out more.

Continue reading

How deception can provide an edge in fighting cyberattacks [Q&A]

Deception man woman

Businesses are starting to recognize that it may be impossible to keep attackers completely out of their networks, so they are starting to look for ways of fighting them more efficiently.

One of the ways of doing this is to use decoys to lure attackers and allow the threat to be dealt with before it affects live systems. We spoke to Carolyn Crandall, chief deception officer at Attivo Networks to find out more about how this deception technology works and what it can do.

Continue reading

Protecting the US voting infrastructure [Q&A]

Ballot box

It's two years since international forces interfered with the security of the US elections. However, with the US midterm elections behind us and the presidential elections ahead, vulnerabilities in the country’s voting infrastructure still remain.

Simply put, it's not hard to hack into US voting systems. Don't believe it? Just ask the 11-year old who hacked a replica of the Florida election website to change results in under 10 minutes. We might not have seen widespread cyberattacks on the day of the midterms, but as we saw multiple opportunities for hacking and disruption in the run up, the presidential elections are already at risk.

Continue reading

A new approach to data protection at the edge [Q&A]

Edge computing

Given the increase in both frequency and complexity of cyberattacks today, it's no surprise that security is coming to the forefront across industries.

While people often view cybersecurity as hackers trying to steal data, threats can impact more than just traditional data loss. With new technologies like edge computing emerging, we need to start thinking about protecting physical infrastructure in addition to data at the edge.

Continue reading

The role of the mainframe in digital transformation [Q&A]

mainframe

When many enterprises think of mainframes, they think of reliable, workhorse technology and legacy applications.

Mobile, windows-based applications are rarely top of mind. However, mainframes still power much of today's digital economy, from mobile banking to online ticket reservations, and still have a place in the enterprise IT stack.

Continue reading

Want to find the biggest cloud security threat? Look in the mirror [Q&A]

mirror image

It seems not a day goes by without a new cloud data breach making headlines. And though the victims change, the attack details remain the same. Why do organizations keep repeating the same cloud security mistakes? And how can we break free from this vicious cycle?

We spoke to Zach Malone, security engineer at security management specialist FireMon, who discusses these issues and tells us why, to identify the biggest threat to cloud security, we need to look in the mirror.

Continue reading

The life of an ethical hacker [Q&A]

Hacker detection

We often hear the term 'ethical hacker', but what exactly does this involve and is it something you can actually make a career out of?

We spoke to Jim O'Gorman president of online penetration testing training provider Offensive Security to find out what being an ethical hacker is all about and what skills you need if you want to become one.

Continue reading

Should businesses prepare for ransomware with a cryptocurrency stash? [Q&A]

ransomware key

An increasing number of enterprises are considering pre-purchasing cryptocurrency in anticipation of potential ransomware attacks. But is this a valid risk-reduction strategy for enterprises?

To get some views on this controversial issue, we spoke with Mike Doran, senior security consultant with the enterprise incident management team at cybersecurity specialist Optiv, and former computer forensics examiner with the St. Louis Metropolitan Police Department.

Continue reading

Why container frameworks risk taking the focus off development [Q&A]

cloud containers

Enterprises often adopt containers as a way to save money. But they can end up spending time, resources and cash building their own container management framework and in the process getting away from their core business objectives.

We spoke to Kieron Sambrook-Smith, chief commercial officer at cloud application specialist Platform.sh, to discuss why enterprises tend to lose sight of business goals in order to manage containers, and the strategies they can implement to stop distracting their developers from doing what they do best, writing code.

Continue reading

The rise of the IoT and artificial intelligence in industry [Q&A]

Industrial IoT

While the consumer IoT has captured the imagination with smart appliances and devices, the industrial Internet of Things (IIoT) is a rapidly growing market. According to Accenture, the IIoT market could add $14.2 trillion to the global economy by 2030.

IIoT is also breathing new life into industries that are in great need of digital transformation, such as manufacturing, oil and gas, and more. As a result, artificial intelligence and machine learning are quickly becoming one of the biggest priorities for companies that want to make the most of their operational data to increase outputs using less energy and costs.

Continue reading

How automation can address the challenge of an aging workforce [Q&A]

older worker

A trend that's already started and will continue for at least the next decade is the loss of skilled workers as older employees start to retire.

The effects are being felt across industries, with Gartner reporting the aging workforce as one of the biggest challenges to the utilities industry. What's more, the skills gap resulting from retiring employees leaving and entry-level employees entering the workforce is causing all industries to look at new solutions to solve the need for experienced and highly skilled workers.

Continue reading

Pulling back the curtain on the dark art of SEO [Q&A]

SEO search engine optimization

Search engine optimization (SEO), making sure that websites appear high in search results, can often seem like it exists in a sort of twilight zone somewhere between science and witchcraft.

So, how does SEO work? What can it do for your business? And if you do any business at all online, can you afford not to do it? We spoke to Chris Rodgers, the founder and CEO of SEO agency Colorado SEO Pros to get answers to these and other questions.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.