In an era where accessibility is key, companies are increasingly turning to no-code platforms to simplify complex technical processes.
But what fundamental principles should organizations adopt when striving to make intricate technical workflows accessible to a broader audience via no-code? To find out we spoke to Michal Koor, CEO and co-founder of of no-code platform Vectary.
Many organizations are embracing the benefits of digital transformation to improve efficiency and customer experience.
Historically the public sector has often lagged behind when it comes to new technology, but digital transformation can have a significant effect in delivering better value and services. We spoke to Praveen Karadiguddi, CEO at Scrumconnect Consulting, to find out more about how transformation projects can work in the public sector.
Amid a tumultuous 2023 marked by economic anxieties and rising geopolitical tensions, threat actors seized the opportunity to weaponize fear and uncertainty. While ransomware trends had previously ebbed and flowed, experiencing a 23 percent decrease in just the first half of 2022, they took a shocking turn in 2023, skyrocketing by a staggering 95 percent.
We spoke with Andrew Costis, chapter leader of the Adversary Research Team at AttackIQ, to discuss why ransomware has taken headlines by storm and how the industry can empower security teams with the tools to fight back.
Moving to the cloud offers many benefits for businesses, but it doesn't remove the need to keep your systems secure. The tools that make the cloud fast and attractive for business can also be used by attackers.
We spoke to Anna Belak, director, Office of Cybersecurity at Sysdig to discuss the pain points that she sees security teams dealing with today, where those problems come from, and how to address them around process and skills rather than just looking at the tech side.
Despite Apple and Linux gaining ground in recent years Windows still commands over 50 percent of the endpoint desktop market.
This means that Windows device management is a key priority for enterprises. We spoke to Apu Pavithran, founder and CEO of Hexnode, to learn more about device management and how it can be used effectively.
As we move away from passwords to other forms of authentication, there's increasing reliance being placed on technologies like biometrics.
But there's growing evidence that this technology could be flawed, with facial recognition exhibiting higher error rates for those with darker skin for example. We spoke to Dr. Mohamed Lazzouni, CTO of Aware, to discuss the ethical issue of bias in biometrics and what needs to be done to prevent it.
Artificial intelligence is making its way into many areas of the tech industry, with the introduction of large language models making it much more accessible.
One of the areas where it's having a big impact is software testing, where it allows companies to provide better support to existing software teams and refocus their efforts on development.
There's a lot of talk at the moment about how the use of AI opens up businesses to additional risk. But is AI itself the issue or is it the way in which it's integrated with other applications?
We talked to Ran Senderovitz, chief operating officer of Wing Security, to discuss how enterprises need to re-prioritize their security to address the real attack surface, the SaaS apps that leverage AI.
Zero trust is no longer a 'nice to have' for cybersecurity leaders. As organizations embrace hybrid and remote workforces, the volume of cyberattacks and data breaches involving unauthorized access to networks, applications and systems has surged.
In response, cybersecurity leaders are striving to adopt a zero trust approach to security to reduce the risk of data breaches, ransomware and insider threats. However, the success of these efforts are being undermined by a variety of factors.
The rise of generative AI platforms like ChatGPT has brought us a step closer to a 'conversational web' where it's possible to find information and access services without needing an app.
This could potentially mean the end of app stores from the likes of Apple and Google and disrupt the whole app ecosystem.
The development community has been quick to embrace generative AI for its productivity potential. But at the same time it raises concerns for enterprises around IP/ownership, security, compliance and more.
We talked to Steve Martinelli, director of developer advocacy and community at Equinix, to discuss the similarities between GenAI and open-source software's acceptance journey, and how we might tackle the unique challenges it presents.
With their ability to provide access to websites, enable mobile payments, and retrieve data, QR (quick-response) codes have become a ubiquitous part of our daily lives. In fact, In 2022, approximately 89 million smartphone users in the United States scanned a QR code on their mobile devices, a 26 percent increase compared to 2020.
However, cybercriminals are also using this trend to distribute malware, steal personal information, and conduct phishing attacks, which can then be leveraged to access your confidential corporate data. As consumers and even large enterprises continue to use QR codes as a means to streamline operations, it's important to be aware of the fast-growing attack surface that bad actors are jumping on.
Conversational AI has seen great advances and a massive increase in adoption in the last year or so such that it’s increasingly finding its way into our everyday lives.
We spoke to voice AI industry expert PolyAI's co-founder and CEO, Nikola Mrkšić, to discuss how the technology is shaping customer service and reducing costs, as well as where generative AI tools fit into the picture.
A lot of time, attention, and investment is spent on creating strong perimeters and endpoint defenses to prevent malicious actors from gaining access to corporate networks.
While this is important, organizations also need a network security strategy -- because if attackers do infiltrate a network, the race is on to uncover the malicious activity and quickly resolve the incident.
As widely available quantum computing draws closer, organizations need to consider the extent to which their supply chain presents risks and start building in post quantum readiness to their risk assessments.
To do this, it's critical for businesses to understand the origin and authenticity of all the components that are in the supply chain (both hardware and software). This is especially true for IoT devices, which rely on systems and subsystems created by multiple partners and vendors bringing their solutions together to make a fully functioning connected product/system.