It's easy to think of data breaches as being someone else's problem, until you're affected by one yourself. Because breaches can involve large volumes of data, dealing with one can be a lot of work.
Can new techniques in capturing and storing data help to ease the burden on IT teams and even help prevent breaches in the first place? We spoke to Perry Dickau, director of product management from data-aware storage provider DataGravity to find out.
Selecting software is one of the most crucial decisions that many enterprises have to make. The right choice can make all of the difference between success and failure.
However, finding impartial advice on the pros and cons of various business packages can be difficult. Could crowd sourcing of opinions provide an answer? The people behind software review platform G2 Crowd definitely think so. We spoke to company president Tim Handorf to find out more.
[BetaNews Recommended Reading] Companies today have access to more information about their customers than ever before. This gives them the opportunity to effectively personalize their marketing messages, but are they failing to take advantage of the opportunities this offers? And with large volumes of often unstructured data available how difficult is it to find and use the right information?
We spoke to Sara Vera, data scientist at CRM specialist Insightly to find out more about the challenges enterprises face in adapting to a personalized world.
Organizations are increasingly under pressure to respond to security incidents quickly in order to minimise damage and losses. Yet conventional security approaches don't always provide enough information, or make it accessible enough, for this to happen.
Is it time for businesses to take a more forensic approach to securing their networks? And won’t this involve time-consuming trawls through masses of raw packet data? We spoke to Uriel Cohen, head of marketing at network forensics specialist WireX Systems to find out.
Anybody can develop a mobile app, but making money out of it is another matter. Accepting adversing is a popular route but it involves linking the app to a specific network and that means making code changes if you decide to switch at a later date.
Estonian company MoneyTap is aiming to change that and put the developer in control. We spoke to the company's business development manager Pavel Goryakin to find out how.
Industrial control systems like those used to run the electricity distribution grid are vital to the economic well being of any country. But protecting those systems needs a different approach from normal enterprise security.
In the US the North American Electric Reliability Corporation (NERC) is the body charged with ensuring grid reliability. But the NERC's critical infrastructure protection (CIP) standards call for only standard firewall use. Is this putting the grid at risk from hackers or terrorists? We spoke to Andrew Ginter, vice president of industrial security at Waterfall Security Solutions to find out more.
Spending on Platform-as-a-Service (Paas), Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) is forecast to reach $118 billion this year, and it's clear the cloud is now big business. Companies are fighting to enter the space with new industry- and marketing-specific offerings. But what effect will this have and will it worry the big players like Amazon Web Services?
We spoke to Scott Swartz, VP, CTO Enterprise and Cloud Billing at Ericsson and founder of MetraTech, an enterprise billing specialist recently acquired by Ericsson, to find out more about the state of the IaaS space.
With more and more companies storing apps in the cloud and others remaining in-house, security can become something of a headache. On-site security tools are ineffective against web attacks leaving organizations with multiple protection solutions in place.
The launch of hybrid cloud solutions such as Radware's WAF (Web Application Firewall) means it’s possible to protect all systems with just one application but what implications does this have for the enterprise? We spoke to Carl Herberger, VP of Security Solutions at application delivery and security specialist Radware to find out more about the benefits of hybrid WAF solutions and how they can be implemented.
Most security researchers now acknowledge that it is only a matter of time before a business suffers some form of compromise as the bad guys follow the money and conventional security tools struggle to keep pace. A recent report from Gartner stresses the need for apps to become self protecting rather than rely on security tools.
But how easy is it to produce a self-protecting app and how effective are they against malware? We spoke to Gordon Young, UK Sales Director of security specialist Promon to find out more.
Most of the hype around online marketing these days seems to revolve around using social media, big data and other tools to predict what the customer wants.
It would be easy to assume that outbound marketing techniques like email campaigns have become a bit last century, but Victoria Godfrey, chief marketing officer at B2B data provider Avention thinks otherwise. We spoke to her to find out why.
More and more businesses are moving their data to the cloud and adopting SaaS delivery models for software. In making this switch many assume that they're shifting the responsibility for looking after their data to someone else.
But companies still need to take charge of looking after their information. We spoke to Rob May, senior vice president of business development for Datto to find out more about how enterprises can protect themselves.
Data leaks due to security flaws and hacker activity constantly make the news, but they're not the only ones that businesses have to worry about. Leaks can stem from employee or industrial espionage activity too and of course there's always government snooping.
Whilst larger businesses with sensitive data or intellectual property to protect often check for old-style surveillance they may not be as aware of the potential for PCs and other gadgets to gather intelligence as well as leak data. We spoke to Andre Ross, Director of Australian digital forensics and information security company Elvidence to find out how businesses may be at risk and what they can do to combat it.
Microsoft’s HoloLens, and the Google-backed Magic Leap might be touted as the future of augmented reality wearables, but electronics giant Epson has beaten both firms to the punch. Its own AR smart glasses are already on the market and finding an appreciative audience among gamers, movie watchers, businesses, and even the registered blind.
I spoke with Valerie Riffaud-Cangelosi. Epson’s New Market Development Manager, about the Japanese firm’s venture into augmented reality, and its plans for the future.
The Apple Watch was announced just a couple of days ago, and the focus has been very much on the hardware so far. But battery life and the amount of storage aside, this is an Apple product, and that means apps are central to its success. Just like the iPhone and iPad, the Apple Watch is a platform on which developers can work their magic.
One such developer is Christoph Burgdorfer, the man behind -- amongst other things -- WhereAreYou App (Locate a friend), a free app that does very much what it says on the tin. It started life as an iPhone and Android app, but the emergence of Apple Watch opens up another possibility. I caught up with Christoph to chat about what it was like to develop for an unreleased product, and whether Apple got it right with the Apple Watch.
It feels as if everything is turning to a subscription or "... as-a-service" business model. Just last week I was told about an app that offers (and I kid you not) "Laundry-as-a-Service". To help you and I understand the trend and figure out how your business can take advantage of it I got in contact with Louis Hall, CEO of Cerillion.
In this interview Louis and I get to the bottom of how and why businesses can and should take advantage of the subscription model and exactly why it’s become so popular.