Articles about Q&A

Is multi-cloud architecture just a fad? [Q&A]

cloud

Enterprises often find themselves working with more than one cloud provider. This multi-cloud approach is a lot like hybrid cloud, yet many companies today may not consider this type of environment. If they have, they are more than likely wondering how to manage and govern the data held in separate clouds. They want to know how to find the best use of different architectures in a multi-cloud world.

We spoke to Lief Morin, CEO of infrastructure solutions and managed services company Key Information Systems, to discuss what he's hearing from his clients on multi-cloud strategies and when organizations should skip this type of approach altogether.

Continue reading

How secure operating systems can help protect endpoints [Q&A]

endpoint security

Endpoints are often the weakest links in any IT system, but protecting them effectively now means much more than simply guarding against malware.

As businesses rely more on the cloud and on web-based applications, the endpoint provides a gateway that can be vulnerable to attack.

Continue reading

How deception-based technology is turning the tables on hackers [Q&A]

Trap

Cyber attacks are constantly evolving and consequently businesses are always seeking new ways of defending themselves. This is as much about understanding the nature of attacks as about preventing them.

One of the latest developments is the use of deception, employing camouflaged traps and tokens to throw the attackers off balance by detecting and understanding the nature of the attack and their plans.

Continue reading

Managing compliance in the hospitality industry [Q&A]

Credit card PCI DSS

Even for businesses in sectors like finance and healthcare where compliance and security is ingrained in the culture, protecting sensitive information is a major challenge.

For other sectors where it's incidental to the main business, compliance can be a major headache. With new payment card security requirements and other regulations like GDPR coming into force, businesses in sectors like hospitality need to up their game. We spoke to Geoff Milton, security strategist at data protection company ShieldQ to find out how the hospitality industry can overcome the headaches associated with compliance.

Continue reading

The Windows 10 update conundrum [Q&A]

Question

Windows 10's growth seems to have stalled for the moment, despite the software giant's best (and worst) efforts to get consumers and businesses to upgrade.

I spoke to Charles Cho, senior Microsoft architect at PCM, Inc., about why this is, and why Microsoft is so desperate to get users to upgrade. He had some interesting insights on the update conundrum.

Continue reading

Solving the puzzle of hybrid cloud [Q&A]

Cloud jigsaw

Many enterprises are moving towards hybrid cloud environments, but they face a challenge when it comes to working out how to control their cloud use effectively.

If they fail to do this and govern their cloud use properly, then any gains in agility they achieve will come with high costs and operational risks. We spoke to Andrew Hillier, CTO of Cirba, the company behind the Densify.com SaaS hybrid capacity analytics software, to find out how enterprises can bridge the gap between cloud hype and reality.

Continue reading

Insights on RCS and how it will replace SMS [Q&A]

Smartphone closeup

Over the past 25 years, SMS text messaging has become the most personal and ubiquitous form of communication in the digital era. In fact, it hasn’t simply held its ground, it’s actually gained momentum -- with global consumers preferring to communicate with businesses through this intuitive channel. As technology continues to bolster SMS capabilities, a new form of mobile messaging known as Rich Communications Services (RCS) is making waves in the mobile revolution.

Leading the charge, OpenMarket has joined forces with Google to help businesses realize the full capabilities of RCS messaging for customer engagement. We caught up with its senior market development manager Oisin Lunny, to learn about the company’s recent partnership with Google and details on what’s fast becoming the next generation of A2P (application to person) texting -- RCS.

Continue reading

Threat hunting and why combating cyber attacks needs a human element [Q&A]

Hidden threat

The threat landscape facing businesses is more complex than ever and it's rapidly changing. No surprise then that traditional approaches to security are struggling to cope.

This has led some security companies to turn to a more dynamic approach of seeking out threats rather than simply responding to attacks.

Continue reading

Modeling and analytics and their role in business [Q&A]

Data analytics

Businesses are collecting more data about their operations and their customers than ever before. But data in itself is only part of the story. For it to be useful it's necessary to spot patterns and gain insights.

At this point most businesses turn to analytics, but this can only tell you what's happened in the past. To predict future trends means using algorithms to build models of what may be complex systems.

Continue reading

Security and the Internet of Things [Q&A]

Internet of things

Last year saw the Mirai botnet harness routers and other IoT devices to launch DDoS attacks against internet services.

Is this type of attack something we’re going to see more of in 2017, and what can companies and individuals do to protect themselves? We spoke to Sam Rehman, chief technology officer at attack prevention specialist Arxan Technologies to find out more about security and the Internet of Things.

Continue reading

How storage can help fight malware [Q&A]

Disk backup recovery

We tend to think of storage as being a target when it comes to malware attacks with cyber criminals seeking to steal data or encrypt it to demand a ransom. But in fact technology can make storage part of the solution.

Hybrid storage specialist Reduxio believes innovative storage can be used to fight and defeat ransomware and malware. We spoke to Reduxio's Jacob Cherian (VP of product strategy) and Mike Grandinetti (chief marketing and corporate strategy officer) to find out how.

Continue reading

Why you need to know who owns your encryption keys [Q&A]

cloud key

As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe.

But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know.

Continue reading

How biometrics are addressing privacy concerns [Q&A]

fingerprint scanner

As traditional password security methods become increasingly discredited, enterprises are turning to other technologies to secure systems and transactions.

Though many of the technologies are still in their infancy, others are becoming mainstream. We spoke to David Gerulski, vice president of fingerprint device specialist Integrated Biometrics to find out more about then latest technologies and how they're being used to address privacy concerns.

Continue reading

The changing face of the enterprise storage market [Q&A]

Servers and Storage

The growth of cloud usage, increasing volumes of information and a switch towards software defined systems based on commodity hardware have all had an impact on the storage market.

About a year ago we spoke to Mark Lewis, Chairman and CEO of storage specialist Formation Data Systems  to get his views on the future of enterprise storage. This week we caught up with Mark again to find out how much the market has changed in just a short time.

Continue reading

Why anti-malware protection isn't a 'thing' you can buy [Q&A]

Ransomware

Threats like ransomware means it’s more important than ever to keep your computers safe both online and off.

Emsisoft has just released Anti Malware 12, the latest version of its respected anti-malware software, and Christian Mairoll, the company’s CEO, took time to speak to me about the ever evolving threat landscape, the best ways to keep your system safe, and the benefits of paid versus free solutions.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.