Articles about Q&A

Implementing runtime security for the cloud [Q&A]

Cloud security lock

Cloud-native platforms are built for speed with ephemeral workloads, rapid deployments, and plenty of third-party app dependencies.

This poses a real challenge to the deployment of runtime security tools. We talked to Bob Tinker, founder and CEO of BlueRock.io, to discuss how organizations can protect their cloud systems effectively.

Continue reading

Life after DevOps -- the new initiatives challenging the status quo [Q&A]

DevOps Agile development concept on virtual screen.

The concept of DevOps has been around since the late 1980s and has been mainstream for the last 15 years or so. But there has recently been discussion around whether open-source platforms like System Initiative are challenging DevOps’ dominance.

We talked to Pablo Gerboles Parrilla, the founder and CEO of Alive DevOps, about what needs to change in how teams build and deploy software, and perhaps more importantly about what shouldn’t.

Continue reading

Job automation -- could AI replace your CEO? [Q&A]

AI robot CEO

Many people worry that AI and automation will lead to people losing their jobs and that this could be true even at senior levels.

We spoke to Alex Walsh, CEO and co-founder of agentic AI platform Oraion, who believes that, instead of destroying jobs, AI can actually enhance them.

Continue reading

Generalist teams vs specialist tools -- the enterprise IT paradox [Q&A]

Enterprise technology

With hyperscalers better able to attract the best talent and headcount tight across the board, most enterprises are leaning heavily on generalist IT teams to manage their environments.

But in many cases the tools they’re expected to use were designed for specialists. Legacy tools like ConnectWise, Device42, or ServiceNow often require deep expertise, complex integrations, or expensive customization making them unsuitable for generalist teams.

Continue reading

How enterprise developers are moving from fragmented tools to unified platforms [Q&A]

Software architecture development

Across large organizations, developers and DevOps teams rely on an ever-growing collection of specialized tools. But while these offer valuable flexibility, they can also create significant pain points.

We spoke to Chintana Wilamuna, VP of solutions architecture at WSO2, about how the landscape is changing from fragmented, purpose-built development tools toward comprehensive, unified platforms.

Continue reading

How AI is driving email phishing and how to beat the threat [Q&A]

Phishing key

Among all of the various forms of cyberattack phishing attempts delivered by email are still one of the most common.

What’s more AI is making these attacks more effective, because you can no longer rely on looking out for dodgy grammar or other signs that a message may not be what it seems.

Continue reading

Recovering and rebuilding trust after a cyberattack [Q&A]

Recovery Backup Restoration Data Storage Security Concept

However good your defenses, cyberattacks can still happen. However, in many cases, the aftermath can be worse than the attack itself, as enterprises struggle to calm nerves and reassure staff, customers, and shareholders.

We spoke with Daniel Tobok, CEO of incident response specialist CYPFER, to discuss how organizations can recover from a cyberattack and why the leadership's response is vital.

Continue reading

Infrastructure is having a moment -- why it’s finally getting the spotlight [Q&A]

Corridor of  server room with server racks in datacenter. 3d ill

AI, automation, seamless collaboration. These are the technologies that dominate headlines and drive business strategy. But beneath all the buzz, there’s a quiet but powerful shift happening: infrastructure is back in the spotlight.

Just look at Alphabet -- Google’s parent company -- which recently surprised investors by announcing it’s planning to spend a jaw-dropping $85 billion in 2025. That’s $10 billion more than they originally expected. And what’s fueling that massive investment? Nearly two-thirds of it is going toward the nuts and bolts of tech infrastructure like data centers, servers, and everything needed to power AI, the cloud, and our increasingly real-time digital world.

Continue reading

The rise of voice -- is typing holding developers back? [Q&A]

Developer voice microphone

Voice is in the process of replacing the keyboard in ways that could shake the foundations of how developers work, collaborate, and even think.

We spoke with Natalie Rutgers, VP of product at Deepgram, to find out how voice-first development tools are gaining traction and why companies that fail to adapt risk losing their edge -- and their top talent.

Continue reading

Is artificial intelligence about to steal your job? [Q&A]

AI search for jobs

With artificial intelligence becoming more powerful and completing more complex tasks, the natural question being asked in the industry is if and when AI will steal human jobs.

Myths abound about AI working autonomously and eliminating the human workforce, starting with entry-level jobs. In reality, however, AI makes workers better and it works best when paired with humans -- their strategic thinking, specialized judgment, and adaptability remain irreplaceable.

Continue reading

Premium target -- why insurance companies are so attractive to hackers [Q&A]

Insurance spotlight

The Scattered Spider group seems to have switched from high-profile attacks on UK retailers to new campaigns targeting the insurance sector. The group has recently been linked to ransomware incidents affecting US-based Philadelphia Insurance and Erie Insurance, which operates in both the UK and the US.

We spoke to Danny Howett, technical director at global cybersecurity consultancy CyXcel, to discuss why insurance is such an attractive target and some practical steps insurers can take to shore up their defences against increasingly organised cybercriminals.

Continue reading

Why data lineage is a business strategy, not a technical feature [Q&A]

Data analytics graphs

Modern enterprises are more than ever reliant on data. But that makes understanding how that data is generated, transmitted, changed and used over time -- its lineage, vitally important.

We spoke to Saurabh Gupta, chief of strategy, revenue and growth at The Modern Data Company, to discuss how proactive, context-rich systems of record enable organizations to accelerate, maintain trust, and strategically utilize data.

Continue reading

Cryptographic debt and quantum readiness [Q&A]

Post Quantum Cryptography and Quantum Resistant Cryptography - P

As White House Executive Orders, NIST mandates, and international deadlines accelerate the push toward post-quantum encryption, the clock is ticking for organizations still grappling with cryptographic debt.

We spoke to Dave Krauthamer, co-founder and field CTO at QuSecure, to learn more about emerging threats, compliance mandates, and mitigation frameworks for organizations looking to get ahead of the coming disruption.

Continue reading

Bridging the gap between boardroom and SOC demands [Q&A]

Boardroom CISO

It’s inevitable that different parts of the enterprise will pull in different directions. This is particularly true when it comes to the IT world where operational teams like the SOC tend to focus on operational resilience while management and the boardroom worry about compliance.

We talked to Kyle Wickert, field chief technology officer of AlgoSec, about how IT pros can balance the compliance demands of the C-suite while maintaining security across sprawling hybrid environments.

Continue reading

System integrations -- strategic phasing or waterfall implementation? [Q&A]

integration jigsaw

As organizations continue to navigate complex system integrations, one critical decision that arises is whether to embrace strategic phasing or waterfall implementation. The choice of approach can shape the success or failure of projects, particularly when dealing with large-scale ERP consolidations and replacements.

We spoke with Scott Maggiolo, SVP of information technology at Ribbon Communications to understand the pros and cons of each and how the decision is not one-size-fits-all.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.