Articles about QandA

How spam and botnets have become big business [Q&A]


Botnets are not a new problem, but they remain a key part of the cyber criminal's armoury. The Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), a global industry forum dedicated to promoting best practices in cyber security, has issued its first report looking at the level of botnet infection. Based on information provided by ISPs covering over 43 million subscribers in the US and Europe it concludes that around one percent of consumers are infected by a bot. The good news is that notification rates are high with between 94 and 99.82 percent of those infected being notified of the problem by their ISP.

Even on those numbers botnets are a major problem. We spoke to Ken Simpson CEO of outbound traffic security company MailChannels and co-chair of M3AAWG's Botnet Subcommittee to find out about how botnets and spam have become big business.

Continue reading

Predictive Analytics and Customer Intelligence: The benefits and challenges facing organizations today [Q&A]


The level of accuracy in predictive analytics relies heavily on the quality of data. However, it is often overlooked that the quality of data relies on an organization’s ability to seamlessly integrate with the various systems that collect unique customer data, as well as the ability to analyze the data in context. Predictive analytics can come up short if the data remains in silos across the organization (the web team sees website analytics, loyalty teams see membership levels, marketing team sees email conversions, etc.).

I spoke to Dominik Dahlem, Senior Data Scientist at Boxever -- a customer intelligence and predictive marketing company for airlines and travel retailers -- about the past, present, and future of predictive analytics.

Continue reading

Trends and opportunities in enterprise storage [Q&A]

Servers and Storage

The enterprise storage market has undergone significant change in recent years. In particular it's seen the rise of flash and the consequent decline of disk as a storage medium.

But what effect are these changes having on business? And what trends can we expect to see in the future? We spoke to Arun Agarwal, CEO of storage specialist Infinio, to find out his view of the market.

Continue reading

Addressing the IT security talent gap [Q&A]

Vacant chair

October is National Cybersecurity Awareness Month in the US and the Department of Homeland security is calling for more attention to be paid to securing systems.

But whilst cybersecurity is a growing industry we risk a developing skills gap where workers aren't qualified or prepared for jobs in the field. We spoke to Andrew von Ramin Mapp, CEO of Data Analyzers, a cyber security and digital forensic firm, to get his view on how the industry can address this.

Continue reading

Who's looking at your screen and how can you stop them? [Q&A]

Screen snooping

We can all remember seeing kids at school hunched over their desks to prevent anyone seeing what they were writing on their test papers. But when it comes to hiding sensitive information on your screen things aren’t that easy.

How big a problem is eavesdropping in this way and what can be done to guard against it? To find out, we spoke to Dr Bill Anderson, Chief Product Officer of technology company OptioLabs which has just announced a collaboration with AMD to help solve the issue.

Continue reading

How the mobile security landscape is changing [Q&A]

Tablet mobile security

As our mobile phones become increasingly central to both our personal and working lives, securing them and the data they hold has become paramount. The nature of the mobile space means that threats are more dispersed and change fast, so traditional security solutions are struggling to cope.

How does this change in the security landscape affect businesses who may be faced with supporting a range of different devices and operating systems thanks to BYOD policies? We spoke to Gert-Jan Schenk, VP for EMEA at mobile security specialist Lookout, to get his view.

Continue reading

Securing the Internet of Things [Q&A]

Internet of things

The Internet of things is set to worm its way into many areas of our lives, but as our cars and domestic appliances become connected how can we be certain that they're secure? We've already seen issues with cars being hacked and do you really want to be installing security software on your fridge?

We spoke to Lev Lesokhin, Executive Vice President, Strategy and analytics, of software analysis and measurement specialist CAST to find out how developers of IoT products can keep them secure and retain consumer confidence.

Continue reading

The state of Android security [Q&A]

Android malware

In recent times Android has come under increasing threat from malware which has led to more people looking to install security software on their phones and tablets.

Mobile security specialist 360 Security recently announced that it had gained 11 places on the Android download charts in August, indicating a renewed interest in protecting devices.

Continue reading

Minority Report could one day be real, thanks to big data and predictive analytics [Q&A]

minority report

Everyday humans create 2.5 quintillion bytes of data, according to IBM. This data comes from virtually everywhere -- sensors used to gather environmental information, posts to social media sites, cell phone signals and more. In order to best determine how to put this data to use in meaningful ways, the science of analytics has changed (think: the amount of data that can be analyzed, the tools and methodologies that enable us to do so, etc.). Most importantly, companies can now be predictive based on data analytics, enabling them to better forecast demands and proactively prevent certain issues.

I spoke to Murali Nadarajah, Global Head of Big Data Analytics for Xchanging, a publicly listed multi-national business technology and services provider, about how organizations today are using predictive analytics, and how the ability to be predictive has -- and will continue -- to change the business landscape enabling the development of new approaches and products.

Continue reading

The importance of education in combating phishing attacks [Q&A]

Phishing magnified

It's usually the case that the weakest link in any security system is the human element. That's particularly true when it comes to phishing attacks. Hackers have become more creative in the social engineering methods they use to gain access to sensitive information.

A new service called LUCY, aims to educate people and identify vulnerable endpoints by allowing businesses or individuals to simulate phishing attacks. We spoke to LUCY founder Oliver Muenchow to find out more about this approach.

Continue reading

How mobile can improve capture and analysis of retail sales data [Q&A]

Geo-location marketing shopping

Modern organizations collect large amounts of data across multiple platforms, but they can find it hard to extract useful, actionable insights from the raw information.

San Francisco-based Zenput provides real-time data capture and analysis to retail, restaurant and consumer goods companies to help them centralize operations and support more informed decision-making. How much difference can this technology make to businesses? We talked to Zenput CEO Vladik Rikhter to find out.

Continue reading

How do you know if the cloud is right for your business? [Q&A]


The rapid growth in cloud adoption might suggest that every workload businesses currently have on-premise is destined for some sort of cloud-based service. The reality is that, other than for small companies, that's probably not the case.

Entrusting key applications to a third party requires intelligent planning in many areas such as management, portability, security and support requirements. What can IT organizations do to reduce risks, tame the complexity and increase their potential for success? We spoke to Jerry McLeod, vice president of business development at hybrid cloud management provider HotLink to find out.

Continue reading

Solving the enterprise storage management problem [Q&A]

Cloud Datacenter Virtualization

Many companies would like to use the cloud as a new approach to storage management, but it isn't without problems. High latency, unpredictable performance of internet transport and fear of data breaches may make the public cloud services unsuitable for many production applications.

We spoke to Ellen Rubin, CEO and founder of enterprise storage startup ClearSky Data to find out how enterprises can address these issues and get their cloud storage projects moving.

Continue reading

How can businesses get the best from remote working? [Q&A]

Hotel wi-fi business

The days of spending all of your working hours in a single office location are increasingly behind us. Both employers and staff are demanding more flexible solutions. Add to this a new generation of millennial workers demanding a better work/life balance and it’s clear that enterprises need to deliver on new ways of working,

But how can they do this and what effect does the change have on corporate culture? We spoke to Rickard Hansson, founder and CEO of enterprise collaboration specialist Incentive, to find out.

Continue reading

Monetizing mobile apps without harming the user experience [Q&A]

Mobile graph

In the past making money from a mobile app has usually involved signing up to an advertisement network and allowing the app to display banner ads.

The problem with this is that it doesn't make for a particularly good user experience and may actually turn people off using the app. For some time now the buzz around the industry has been about 'native' ads within apps. But exactly what is a native ad and what are the benefits? We spoke to Yannis Dosios, VP of Yahoo Publisher Services to find out.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.