Articles about QandA

How storage can help fight malware [Q&A]

Disk backup recovery

We tend to think of storage as being a target when it comes to malware attacks with cyber criminals seeking to steal data or encrypt it to demand a ransom. But in fact technology can make storage part of the solution.

Hybrid storage specialist Reduxio believes innovative storage can be used to fight and defeat ransomware and malware. We spoke to Reduxio's Jacob Cherian (VP of product strategy) and Mike Grandinetti (chief marketing and corporate strategy officer) to find out how.

Continue reading

Why you need to know who owns your encryption keys [Q&A]

cloud key

As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe.

But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know.

Continue reading

How biometrics are addressing privacy concerns [Q&A]

fingerprint scanner

As traditional password security methods become increasingly discredited, enterprises are turning to other technologies to secure systems and transactions.

Though many of the technologies are still in their infancy, others are becoming mainstream. We spoke to David Gerulski, vice president of fingerprint device specialist Integrated Biometrics to find out more about then latest technologies and how they're being used to address privacy concerns.

Continue reading

The changing face of the enterprise storage market [Q&A]

Servers and Storage

The growth of cloud usage, increasing volumes of information and a switch towards software defined systems based on commodity hardware have all had an impact on the storage market.

About a year ago we spoke to Mark Lewis, Chairman and CEO of storage specialist Formation Data Systems  to get his views on the future of enterprise storage. This week we caught up with Mark again to find out how much the market has changed in just a short time.

Continue reading

Why anti-malware protection isn't a 'thing' you can buy [Q&A]

Ransomware

Threats like ransomware means it’s more important than ever to keep your computers safe both online and off.

Emsisoft has just released Anti Malware 12, the latest version of its respected anti-malware software, and Christian Mairoll, the company’s CEO, took time to speak to me about the ever evolving threat landscape, the best ways to keep your system safe, and the benefits of paid versus free solutions.

Continue reading

How behavioral biometrics can enhance security [Q&A]

Biometrics

Traditional authentication methods are struggling to keep up with the expansion of online services. Yet additional systems like two-factor authentication can prove to be cumbersome.

The answer may lie in analysis of behavioral biometrics which can be used to determine wether credentials are being used legitimately. We spoke to Neil Costigan CEO of Swedish company BehavioSec to find out more about where it’s already being used and how it could change the way we access banking and other services.

Continue reading

How ransomware threatens government agencies [Q&A]

ransomware_keyboard_button_dollar

Ransomware is an increasingly severe threat to all organizations and government agencies are not exempt. The Federal Trade Commission recently labeled ransomware as "among the most troubling cyberthreats".

But why are government agencies such an attractive target and what can they do to combat the threat? We spoke to Andrew Hay, chief information security officer of data security specialist DataGravity to find out.

Continue reading

The security risks of migrating legacy applications to the cloud [Q&A]

cloud migrate

Enterprise use of the public cloud is taking off in a big way and it's estimated that by 2018, half of the applications running in public cloud environments will be considered mission-critical by the organizations that use them.

But migrating legacy applications to the cloud can lead to new security risks as how the application is used and hosted could differ from the original deployment.

Continue reading

The growing security risks in enterprise Windows environments [Q&A]

why question mark

ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.

To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.

Continue reading

What enterprise workloads are right for the cloud? [Q&A]

businessman cloud

The question many businesses are asking themselves is, 'should we be moving to the cloud?' The public cloud is clearly a success, as shown by the significant adoption of Amazon Web Services (AWS). Companies are benefiting from the pay-as-go nature of the cloud, as well as from the ability to turn up services as needed without the traditional hardware spend. Gartner recently reported that cloud computing will affect more than $1 trillion in IT spending by 2020.

But even with this growing popularity, corporate IT departments are still struggling with how to integrate public clouds into their data center initiatives. One of the main reasons for this hesitation is the uncertainty around maintaining workload performance once the data gets to the cloud. This is a valid concern, but one that can be overcome. We spoke to Len Rosenthal, chief marketing officer for infrastructure performance specialist Virtual Instruments, to discuss how workload analysis and modeling is the first step for any cloud migration initiative.

Continue reading

Why encryption is essential for everyone [Q&A]

Data Encryption

If your laptop or smartphone gets lost or stolen, there’s the danger of its contents being accessed, which could prove a nightmare. If the device is encrypted, however, you can rest easy… Or can you?

Ebba Blitz, CEO of laptop encryption company Alertsec (and former host of Sweden's Shark Tank), chatted with me about the benefits and potential pitfalls of encryption, and revealed her top tips for keeping your data secure.

Continue reading

How HP has changed after the split [Q&A]

Question

We recently sat down with George Brasher, the managing director for UK and Ireland at HP, to discuss his approach to business and how the company has changed since the split from HP Enterprise.

You can read the Q&A below.

Continue reading

Responding to the changing threat landscape facing enterprises [Q&A]

Tightrope sharks threat

Not so many years ago corporate IT security involved installing a firewall and antivirus solution. But the threat landscape has now become much more complicated and is changing faster than ever.

Companies need to be aware of these changes and make sure their security arrangements can keep up. We spoke to Shai Gabay, the chief innovation officer of security operations and advanced threat detection specialist CYBERBIT, to find out more about the risks and solutions.

Continue reading

The increasing role of AI in cyber security [Q&A]

artificial intelligence

As attacks become more frequent and sophisticated, conventional security techniques and human analysis struggle to keep pace.

As a result many companies are turning to artificial intelligence methods to help them defend their systems effectively. We spoke to Peter Gyongyosi product manager of security intelligence specialist Balabit to find out more about how AI is increasingly the future of cyber security.

Continue reading

The benefits of a DevOps culture [Q&A]

developer laptop

Many IT teams are looking for a way out of the quagmire of delayed projects, questionable quality, and missed deliveries in which they often find themselves without writing blank cheques. The concept of DevOps has taken the IT world by storm, but has the day-to-day practice caught up?

Brian Dawson, DevOps expert, CloudBees discusses how this new approach can help these IT projects can progress and transform businesses.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.