Low code

Balancing risk and reward with low-code and no-code platforms [Q&A]

In recent years, enterprises have increasingly turned to low-code and no-code platforms in order to streamline their development processes.

With the introduction of AI, this sector is evolving even faster and Wing To, general manager of Intelligent DevOps at Digital.ai, believes this needs organizations to develop a cautious approach. We spoke to him to find out why.

By Ian Barker -
Internet AI law concept

How AI is set to transform the legal sector [Q&A]

The use of generative AI is becoming common across many industries, but while it undoubtedly offers benefits it can lead to problems too.

Legal firms in particular can fall foul of poor results, one firm was fined $5,000 after a court found that one of its lawyers had used ChatGPT to write a court brief which included false citations.

By Ian Barker -
Artificial Intelligence Bias

Who will win the battle of open vs closed AI? [Q&A]

Closed AI products like Bard and ChatGPT (ironically from OpenAI) have already delivered a practical, powerful chatbot experience and are being employed by many businesses.

Open AI by contrast is still in its early stages and has not seen wide adoption. We spoke to Mike Finley, CTO and co-founder of AnswerRocket, to find out the differences between the two and how they're set to develop.

By Ian Barker -
Passwordless authentication - Inscription on Blue Keyboard Key.

Ditching passwords in favor of passwordless, phishing-resistant authentication [Q&A]

According to the FIDO (Fast Identity Online) Alliance, passwords are the root cause of more than 80 percent of data breaches. And yet, many organizations -- both big and small -- continue to use this antiquated approach to authentication. In fact, recent research from Yubico, which surveyed more than 16,000 employees across eight countries, found 59 percent of respondents still rely on usernames and passwords as their primary method of authentication.

Why do we continue to see the same old same old, especially when the authentication industry has made such significant strides in not only passwordless but also phishing-resistant authentication? We spoke with Axiad founder and co-CEO Bassam Al-Khalidi to get an answer to this question and find out how companies can make the move to a passwordless, phishing-resistant future. Read on to hear what he had to say.

By Ian Barker -
SMB laptop

How SMBs are tailoring their cybersecurity programs [Q&A]

The uncertain economic climate has led to many smaller businesses cutting their budgets over the last year. But where cybersecurity spend is concerned this can be a risky move.

We spoke to Geoff Bibby, senior vice president at OpenText Cybersecurity to discuss how SMBs and managed security providers (MSPs) can adapt their security plans while still remaining protected.

By Ian Barker -
intelligence

Why not all AI is created equal and how the wrong choice could be hurting your business [Q&A]

AI seems to be everywhere at the moment. But despite the fact that it has become ubiquitous, it isn't all the same.

Steve Benton, VP of threat research for Anomali, talked to us about why not all AI is equal and what businesses need to consider to ensure they get the most from the technology.

By Ian Barker -
Future-network

Why enterprise networks need to move to an as-a-service model [Q&A]

For years, the enterprise has built bespoke networks to connect all company resources. These networks were slow to build, but once built did not change much.

That's changing as networks become more complex and dynamic. Workers are highly distributed, edge computing has grown, most enterprises now connect to multiple clouds, and connecting to partners and customers is increasingly common.

By Ian Barker -
digital pioneer

Navigating generative AI adoption to minimize risks and maximize benefits in the workplace [Q&A]

Numerous businesses have embraced generative AI technology to enhance their operational efficiency, boost productivity and foster innovative ideas.

However, it is important to be aware of the potential legal and financial consequences associated with the use of ChatGPT and similar AI systems. We spoke to Sujay Rao, CPO at Sirion to find out more.

By Ian Barker -
Open-Source

The evolution of open source in the enterprise [Q&A]

Open source software has been around for decades, it's thriving, effective and disrupting in the enterprise more than ever.

We talked to, Cédric Gégout, VP product management at Canonical, to discuss the evolution of open source in the enterprise and protecting its fundamentals for continued success.

By Ian Barker -
Risk dial

How companies can respond better to security risks [Q&A]

One of the biggest issues when dealing with security risks is the time that it takes to address problems when they come to light.

We spoke to Yoran Sirkis, CEO of remediation operations specialist Seemplicity, to discuss why there's an issue and how workflow problems around responding to risks can be improved.

By Ian Barker -
Firewall

External attack surface management [Q&A]

The external attack surface -- those assets which face the internet -- is attracting a lot of attention at the moment, with Gartner naming it as a top security risk.

To find out more about external attack surface management (EASM) and why organizations need to take it seriously, we spoke to Rickard Carlsson, CEO of Detectify.

By Ian Barker -
Web development and coding. Cross platform development website. Adaptive layout internet page or web interface on screen laptop, tablet and phone. Isometric concept illustration.

Why traditional CMS are an innovation bottleneck and federated content platforms are the future [Q&A]

Traditional content management systems (CMS) developed at a time when all that was needed was to post some text and a few images. But as consumer and business needs have evolved they can prove to be a bottleneck when it comes to innovating and improving a web presence.

Michael Lukaszczyk, the CEO and co-founder of content platform Hygraph, argues that enterprises need a future-proof solution. We talked to him to find out more.

By Ian Barker -
trust keyboard

What is open source silicon root of trust? [Q&A]

You may have come across the term 'root of trust', it’s a source, such as a hardware module, that can always be trusted within a cryptographic system. The system trusts the keys and other cryptographic information it receives from the root of trust module as always authentic and authorized.

Mostly this involves being tied into a specific vendor, but OpenTitan has developed an open source silicon root of trust for use in for use in data center servers, storage, peripherals, and more.

By Ian Barker -
Data Lakehouse - Inscription on Blue Keyboard Key.

How to build a successful data lakehouse strategy [Q&A]

The data lakehouse has captured the imagination of modern enterprises looking to streamline their architectures, reduce cost and assist in the governance of self-service analytics.

From data mesh support to providing a unified access layer for analytics and data modernisation for the hybrid cloud, it offers plenty of business cases, but many organizations are unsure where to start building one.

By Ian Barker -
Enterprise technology

Why open source is key to modernizing the enterprise -- without ditching the mainframe [Q&A]

Many large enterprises still rely heavily on mainframes to offer a reliable and secure basis for their systems.

But as digital transformation efforts gain pace, developers are eyeing frameworks that can boost their modernization efforts. We spoke to Phil Buckellew, president of infrastructure modernization at Rocket Software, to find out how open source software can bridge the divide between modern applications and mission-critical mainframe infrastructure.

By Ian Barker -
Load More Articles