Articles about Q&A

Optimizing tech spend to drive value through economic turbulence [Q&A]

Sustained economic volatility has forced organizations of all sizes to make difficult decisions. Whether it's reducing headcount, lowering operational overhead, or cutting costs in other areas, business leaders are looking to increase agility, efficiency, and flexibility ahead of a looming recession.

Global business leaders are facing a unique set of challenges, and many are looking at their tech spend as an area for cost savings. We spoke to Ryan Newsome, chief technology officer at Motus, about how enterprise decision makers can evaluate tech spend through the lens of value creation rather than simply reducing costs.

Continue reading

How an IT asset checklist can set up CISOs for success [Q&A]

The Great Resignation and tech layoffs have pushed staff turnover to an all-time high. And with every personnel change, years of institutional knowledge are lost in the transition. That information can be critically important for security executives, like CISOs, who must be the ultimate stewards of organizational security across an ever-changing attack surface.

Organizational environments today are increasingly complex and constantly evolving, making it challenging to understand exactly what is at risk at any given moment. For CISOs joining an organization, it is vital to understand exactly what is on their environment to effectively secure it.

Continue reading

The evolution of AI in the enterprise [Q&A]

Artificial intelligence

In the last year or so, AI has suddenly been the thing that everyone's talking about, thanks largely to ChatGPT. There's a good deal of discussion around where AI is headed in the future and the opportunities and threats it presents.

We spoke to Josh Tobin, CEO of Gantry, an AI observability tool for platform models, about the evolution of AI in the enterprise and how businesses can make sure they don't get left behind.

Continue reading

Beating the headache of SaaS sprawl [Q&A]

SaaS

Moving to the cloud has always presented something of a challenge, but the pandemic made things even more difficult because of the need to manage more applications across a distributed workforce.

Add in the issue of shadow IT, and enterprises are increasingly struggling with SaaS sprawl. We spoke to BetterCloud CTO, Jamie Tischart to learn more about the problem and how to deal with it.

Continue reading

The problem of unstructured data in foundation models [Q&A]

Data Stream

Artificial intelligence is only as good as the data that it has to work with and that means that large volumes of information are needed to train the software in order to get the best results.

Ensuring the quality of data therefore is a key task in any AI implementation. We talked to the CEO of Snorkel AI, Alex Ratner, to find out more about the issues involved and how organizations can overcome them.

Continue reading

Why AI still needs human intervention [Q&A]

machine learning AI

There have been a number of instances lately where the line between artificial intelligence and artificial stupidity has been a pretty thin one. Microsoft's Bing insisting that we're still in 2022, or Google's Bard serving up factual errors, for example.

These problems show that human intervention is still key to getting the best from AI/ML models. We spoke to chief product officer at Tamr, Anthony Deighton, to discuss how organizations can leverage AI/ML while also keeping the key human component of the process.

Continue reading

Are you planning ahead for the MySQL 5.7 end of life? [Q&A]

Business database

The popular database MySQL version 5.7 hits end of life status on the 31st of October 2023, just a few months away.

This means organizations that are running MySQL 5.7 will have to plan ahead on their options for the future. Dave Stokes, technology evangelist at Percona, spoke to us about some of the choices that will need to be made as well as how to get started on the process.

Continue reading

How DevSecOps can mitigate the cyber risks of emerging technologies [Q&A]

The technology world never stands still for very long and as new technologies emerge so too do new threats. With things like quantum computing on the verge of becoming mainstream it's important to understand their security implications.

We spoke to Archie Agarwal, founder and CEO of ThreatModeler to discuss how DevSecOps can help to identify and mitigate these new threats to cloud services.

Continue reading

Is this the year we take quantum threats seriously? [Q&A]

quantum computing

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

Continue reading

The rise of biometrics for identity verification [Q&A]

Biometric scan

As the world increasingly moves away from relying solely on passwords for identity verification, the focus is on alternative technologies. Whether that is passkeys, biometrics or other options, each has its own advantages and adherents.

Ricardo Amper, CEO and founder of next-generation identity verification solution provider Incode, sees biometrics as the key to eliminating discrimination and to creating a world of greater trust. We spoke to him to find out more.

Continue reading

Combating phishing and social engineering threats [Q&A]

Social Engineering

The majority of cyberattacks are made possible by some degree of human error. Phishing emails and social engineering continue to dominate as the most common delivery systems for an attack.

We spoke to Mika Aalto, CEO and co-founder at Hoxhunt, about why a human-focused cyber-strategy is the key to success in combating attacks, about the initiatives that organizations can implement to establish this and how he expects human-related cyber-attacks to evolve.

Continue reading

Should IT chiefs be wary of vendor lock-in when moving to the cloud? [Q&A]

In the dash to move systems to the cloud it's easy to become dependent on the services of a specific vendor, making it time-consuming or costly to move to an alternative at a later date.

We spoke to Cooper Lutz, chief architect, digital solutions at AHEAD, to get his advice for IT teams making their way to the cloud on the best practices to mitigate vendor lock-in.

Continue reading

Why customers are reluctant to share data online and what you can do about it [Q&A]

Brands are increasingly focussed on providing a good digital experience for their customers, yet many people remain reluctant to share their information with websites.

What are the reasons behind this reluctance? And what can enterprises do to overcome it? We talked to Josh Koenig, co-founder and chief strategy officer at SaaS web platform Pantheon, to find out.

Continue reading

Connecting the world: the role of technology in providing humanitarian aid [Q&A]

When a crisis occurs, telecommunications infrastructure can be partially or entirely destroyed, severing the ties between crisis victims and the outside world, and in some cases disconnecting them entirely from their loved ones.

We underestimate the importance of technology until it is taken away, and providing connectivity to affected communities as quickly as possible in times of crisis is extremely important.

Continue reading

Meeting the challenges of the digital workspace [Q&A]

home working security

Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.

Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.