Articles about Q&A

When is an IT risk a cyber risk? And why the difference matters [Q&A]

risk jigsaw piece

There tends to be some confusion about where cyber risk ends and where IT risk starts and the terms are often used interchangeably.

We spoke to Gary Lynam, head of ERM advisory at risk management specialist Protecht, to find out more about understanding and managing the different types of risk that enterprises face.

Continue reading

Uncovering the security gaps that expose hybrid identity systems to attackers [Q&A]

Hybrid computing environments, which combine on-premises and cloud-based technologies, have become increasingly common in recent years. This shift has created new security challenges for IT leaders, particularly when it comes to managing the security of identity environments.

We spoke with Ran Harel, associate vice president of security products at Semperis, to find out more about the changing risk landscape and how it can be addressed.

Continue reading

How object storage can contribute to cybersecurity analytics [Q&A]

Data volumes are growing exponentially year after year, this means huge amounts of log data that security teams are struggling to collect, analyze and act on in a timely manner.

As a result, security teams are inundated with data that is fragmented across locations and platforms. We spoke to CTO of MinIO Ugur Tigli to discuss how modern object storage can be used to build automated cybersecurity analytics pipelines to break down these barriers and enable security teams to quickly take action on the information stored in log files.

Continue reading

How do you know what's real and what's AI? [Q&A]

robot call center

The world is increasingly buzzing with stories about AI generated content. Today when you contact a business you might equally well be talking to a bot as a human, but is it possible to spot AI generated content and should we be worried about it?

We spoke to Gaurav Kachhawa, chief product officer of conversational messaging platform Gupshup, to find out how to distinguish AI-generated content, as well as the ethics that surround its use.

Continue reading

The top drivers of wasted IT spend in a hybrid-first environment [Q&A]

From rising collaboration expenses to a need for more devices per employee, hybrid work models have driven a need for new investments in workplace technology.

However, a significant portion of IT spend is wasted in a hybrid-first environment, often due to a reliance on manual processes that don't provide much-needed visibility into organizational endpoints.

Continue reading

The importance of blockchain security in an interconnected world [Q&A]

Blockchain

Blockchain is best known for its application in securing cryptocurrency. But in recent years it's expanded to drive emerging business in other sectors such as healthcare, real estate, smart contracts, and more.

Because blockchain ensures a tamper-proof ledger of the distributed transactions, it's sometimes used for high-risk transactions and exchanges. But this presents high stakes opportunities for adversaries to steal money and sensitive information.

Continue reading

Optimizing tech spend to drive value through economic turbulence [Q&A]

Sustained economic volatility has forced organizations of all sizes to make difficult decisions. Whether it's reducing headcount, lowering operational overhead, or cutting costs in other areas, business leaders are looking to increase agility, efficiency, and flexibility ahead of a looming recession.

Global business leaders are facing a unique set of challenges, and many are looking at their tech spend as an area for cost savings. We spoke to Ryan Newsome, chief technology officer at Motus, about how enterprise decision makers can evaluate tech spend through the lens of value creation rather than simply reducing costs.

Continue reading

How an IT asset checklist can set up CISOs for success [Q&A]

The Great Resignation and tech layoffs have pushed staff turnover to an all-time high. And with every personnel change, years of institutional knowledge are lost in the transition. That information can be critically important for security executives, like CISOs, who must be the ultimate stewards of organizational security across an ever-changing attack surface.

Organizational environments today are increasingly complex and constantly evolving, making it challenging to understand exactly what is at risk at any given moment. For CISOs joining an organization, it is vital to understand exactly what is on their environment to effectively secure it.

Continue reading

The evolution of AI in the enterprise [Q&A]

Artificial intelligence

In the last year or so, AI has suddenly been the thing that everyone's talking about, thanks largely to ChatGPT. There's a good deal of discussion around where AI is headed in the future and the opportunities and threats it presents.

We spoke to Josh Tobin, CEO of Gantry, an AI observability tool for platform models, about the evolution of AI in the enterprise and how businesses can make sure they don't get left behind.

Continue reading

Beating the headache of SaaS sprawl [Q&A]

SaaS

Moving to the cloud has always presented something of a challenge, but the pandemic made things even more difficult because of the need to manage more applications across a distributed workforce.

Add in the issue of shadow IT, and enterprises are increasingly struggling with SaaS sprawl. We spoke to BetterCloud CTO, Jamie Tischart to learn more about the problem and how to deal with it.

Continue reading

The problem of unstructured data in foundation models [Q&A]

Data Stream

Artificial intelligence is only as good as the data that it has to work with and that means that large volumes of information are needed to train the software in order to get the best results.

Ensuring the quality of data therefore is a key task in any AI implementation. We talked to the CEO of Snorkel AI, Alex Ratner, to find out more about the issues involved and how organizations can overcome them.

Continue reading

Why AI still needs human intervention [Q&A]

machine learning AI

There have been a number of instances lately where the line between artificial intelligence and artificial stupidity has been a pretty thin one. Microsoft's Bing insisting that we're still in 2022, or Google's Bard serving up factual errors, for example.

These problems show that human intervention is still key to getting the best from AI/ML models. We spoke to chief product officer at Tamr, Anthony Deighton, to discuss how organizations can leverage AI/ML while also keeping the key human component of the process.

Continue reading

Are you planning ahead for the MySQL 5.7 end of life? [Q&A]

Business database

The popular database MySQL version 5.7 hits end of life status on the 31st of October 2023, just a few months away.

This means organizations that are running MySQL 5.7 will have to plan ahead on their options for the future. Dave Stokes, technology evangelist at Percona, spoke to us about some of the choices that will need to be made as well as how to get started on the process.

Continue reading

How DevSecOps can mitigate the cyber risks of emerging technologies [Q&A]

The technology world never stands still for very long and as new technologies emerge so too do new threats. With things like quantum computing on the verge of becoming mainstream it's important to understand their security implications.

We spoke to Archie Agarwal, founder and CEO of ThreatModeler to discuss how DevSecOps can help to identify and mitigate these new threats to cloud services.

Continue reading

Is this the year we take quantum threats seriously? [Q&A]

quantum computing

Quantum computing is something that seems to have been hovering just out of reach for a decade or so -- in fact research into the concept first began back in the 1980s.

More recently quantum has come closer to a commercial reality, with big players like IBM publishing a road map with a clear, detailed plan to scale quantum processors and build the hardware necessary to take advantage of the technology and other big players like Google, Amazon, and Microsoft having since followed suit.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.