Articles about Q&A

The Windows 10 update conundrum [Q&A]


Windows 10's growth seems to have stalled for the moment, despite the software giant's best (and worst) efforts to get consumers and businesses to upgrade.

I spoke to Charles Cho, senior Microsoft architect at PCM, Inc., about why this is, and why Microsoft is so desperate to get users to upgrade. He had some interesting insights on the update conundrum.

Continue reading

Solving the puzzle of hybrid cloud [Q&A]

Cloud jigsaw

Many enterprises are moving towards hybrid cloud environments, but they face a challenge when it comes to working out how to control their cloud use effectively.

If they fail to do this and govern their cloud use properly, then any gains in agility they achieve will come with high costs and operational risks. We spoke to Andrew Hillier, CTO of Cirba, the company behind the SaaS hybrid capacity analytics software, to find out how enterprises can bridge the gap between cloud hype and reality.

Continue reading

Insights on RCS and how it will replace SMS [Q&A]

Smartphone closeup

Over the past 25 years, SMS text messaging has become the most personal and ubiquitous form of communication in the digital era. In fact, it hasn’t simply held its ground, it’s actually gained momentum -- with global consumers preferring to communicate with businesses through this intuitive channel. As technology continues to bolster SMS capabilities, a new form of mobile messaging known as Rich Communications Services (RCS) is making waves in the mobile revolution.

Leading the charge, OpenMarket has joined forces with Google to help businesses realize the full capabilities of RCS messaging for customer engagement. We caught up with its senior market development manager Oisin Lunny, to learn about the company’s recent partnership with Google and details on what’s fast becoming the next generation of A2P (application to person) texting -- RCS.

Continue reading

Threat hunting and why combating cyber attacks needs a human element [Q&A]


The threat landscape facing businesses is more complex than ever and it's rapidly changing. No surprise then that traditional approaches to security are struggling to cope.

This has led some security companies to turn to a more dynamic approach of seeking out threats rather than simply responding to attacks.

Continue reading

Modeling and analytics and their role in business [Q&A]

Data analytics

Businesses are collecting more data about their operations and their customers than ever before. But data in itself is only part of the story. For it to be useful it's necessary to spot patterns and gain insights.

At this point most businesses turn to analytics, but this can only tell you what's happened in the past. To predict future trends means using algorithms to build models of what may be complex systems.

Continue reading

Security and the Internet of Things [Q&A]

Internet of things

Last year saw the Mirai botnet harness routers and other IoT devices to launch DDoS attacks against internet services.

Is this type of attack something we’re going to see more of in 2017, and what can companies and individuals do to protect themselves? We spoke to Sam Rehman, chief technology officer at attack prevention specialist Arxan Technologies to find out more about security and the Internet of Things.

Continue reading

How storage can help fight malware [Q&A]

Disk backup recovery

We tend to think of storage as being a target when it comes to malware attacks with cyber criminals seeking to steal data or encrypt it to demand a ransom. But in fact technology can make storage part of the solution.

Hybrid storage specialist Reduxio believes innovative storage can be used to fight and defeat ransomware and malware. We spoke to Reduxio's Jacob Cherian (VP of product strategy) and Mike Grandinetti (chief marketing and corporate strategy officer) to find out how.

Continue reading

Why you need to know who owns your encryption keys [Q&A]

cloud key

As companies move more of their data to the cloud it's not surprising that they’re turning to encryption in order to keep their data safe.

But if you're using a third-party cloud provider, who owns and controls the keys to your encrypted data? Rui Biscaia, director of product management at data classification specialist Watchful Software believes it's vital for companies to know.

Continue reading

How biometrics are addressing privacy concerns [Q&A]

fingerprint scanner

As traditional password security methods become increasingly discredited, enterprises are turning to other technologies to secure systems and transactions.

Though many of the technologies are still in their infancy, others are becoming mainstream. We spoke to David Gerulski, vice president of fingerprint device specialist Integrated Biometrics to find out more about then latest technologies and how they're being used to address privacy concerns.

Continue reading

The changing face of the enterprise storage market [Q&A]

Servers and Storage

The growth of cloud usage, increasing volumes of information and a switch towards software defined systems based on commodity hardware have all had an impact on the storage market.

About a year ago we spoke to Mark Lewis, Chairman and CEO of storage specialist Formation Data Systems  to get his views on the future of enterprise storage. This week we caught up with Mark again to find out how much the market has changed in just a short time.

Continue reading

Why anti-malware protection isn't a 'thing' you can buy [Q&A]


Threats like ransomware means it’s more important than ever to keep your computers safe both online and off.

Emsisoft has just released Anti Malware 12, the latest version of its respected anti-malware software, and Christian Mairoll, the company’s CEO, took time to speak to me about the ever evolving threat landscape, the best ways to keep your system safe, and the benefits of paid versus free solutions.

Continue reading

How behavioral biometrics can enhance security [Q&A]


Traditional authentication methods are struggling to keep up with the expansion of online services. Yet additional systems like two-factor authentication can prove to be cumbersome.

The answer may lie in analysis of behavioral biometrics which can be used to determine wether credentials are being used legitimately. We spoke to Neil Costigan CEO of Swedish company BehavioSec to find out more about where it’s already being used and how it could change the way we access banking and other services.

Continue reading

How ransomware threatens government agencies [Q&A]


Ransomware is an increasingly severe threat to all organizations and government agencies are not exempt. The Federal Trade Commission recently labeled ransomware as "among the most troubling cyberthreats".

But why are government agencies such an attractive target and what can they do to combat the threat? We spoke to Andrew Hay, chief information security officer of data security specialist DataGravity to find out.

Continue reading

The security risks of migrating legacy applications to the cloud [Q&A]

cloud migrate

Enterprise use of the public cloud is taking off in a big way and it's estimated that by 2018, half of the applications running in public cloud environments will be considered mission-critical by the organizations that use them.

But migrating legacy applications to the cloud can lead to new security risks as how the application is used and hosted could differ from the original deployment.

Continue reading

The growing security risks in enterprise Windows environments [Q&A]

why question mark

ManageEngine recently announced the results of its global Active Directory and Windows Server Security -- Trends and Practices Survey for 2016, which found that 70 percent of IT administrators across the globe agree that their Windows environments are not immune to malicious attacks.

To delve a bit deeper, we spoke to Derek Melber, a technical evangelist for ManageEngine.

Continue reading

© 1998-2017 BetaNews, Inc. All Rights Reserved. Privacy Policy.