Articles about Q&A

Why 5G/LTE network security needs a different approach [Q&A]

5G circuit board

The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.

Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.

Continue reading

How analytics can boost the supply chain [Q&A]

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

Continue reading

Meeting the challenge of protecting data in a changing world [Q&A]

As a report last year showed, the change to working habits over the last few years has gone hand-in-hand with a rise in the theft of data.

We spoke to Cyberhaven CSO, Chris Hodson, to find out how enterprise CISOs can meet this challenge and keep their data safe.

Continue reading

Smart communities and how they're changing the world [Q&A]

smart city

Smart communities and smart cities are set to deliver a number of benefits, including environmental sustainability, reducing the digital divide, and improving people's lives with smarter, personalized and more intuitive services and experiences.

But making them work involves a good deal of technology such as 5G, small cells and distributed antenna systems (DAS), as well as needing partnerships between governments and businesses. We spoke to Brendan O'Reilly, group chief technology officer at BAI Communications to find out more about smart communities and what makes them work.

Continue reading

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]

Risk dial

Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.

Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.

Continue reading

Why workplace engagement and collaboration are the true benefits of the metaverse [Q&A]

Collaboration

The trend towards hybrid work has meant that face-to-face meetings have been widely supplanted by collaboration tools like Zoom, Teams and Slack.

With the advent of the metaverse, virtual interaction is set to become even more common. We spoke to Martin Bodley, director of emerging business at Bose Work to find out more about how this new world might look and how it can draw on expertise gained from video games.

Continue reading

Why have cloud when you can have supercloud? [Q&A]

There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?

We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.

Continue reading

Data mobility -- why it's a must and how to achieve it [Q&A]

Data is still essential for enterprises, but the rise of hybrid working and the adoption of multi-cloud environments has made data mobility and migration a hot topic.

We spoke to Mark Greenlaw, VP of product strategy for Cirrus Data, to discuss data mobility, what's driving it and how organizations need to adapt.

Continue reading

Is ChatGPT AI the next Superman or humanity's Kryptonite? [Q&A]

ChatGPT

Now that the dust has settled on the hype around ChatGPT, it may be a good time to unpack the full implications of this technology. While it might help sleep-deprived college students ace term papers and give copywriters a creative boost, it has a potentially dark underbelly.

We talked to David Carvalho, CEO and co-founder of Naoris Protocol, to unpack some of the not so pretty aspects of emerging AI technology and its potential to wreak havoc for businesses globally.

Continue reading

Guarding against supply chain attacks [Q&A]

Broken chain

In recent years supply chain attacks have become much more commonplace, targeting vulnerabilities and getting legitimate apps to distribute malware.

We spoke to Nir Valtman, CEO and founder at Arnica, to discuss the issues these attacks raise and how organizations can defend against them.

Continue reading

Guarding against attacks targeting hybrid Active Directory environments [Q&A]

Active Directory (AD) is used by 90 percent of enterprises as the primary source of trust for identity and access. But it can also be a weak link, exploited in many modern cyberattacks.

We spoke to Ran Harel, senior director of product management at Semperis, to explore the challenges in securing a hybrid AD environment and how organizations can best defend this expanded attack surface.

Continue reading

Why cyber insurance policies may be in jeopardy [Q&A]

insurance key

Cyber insurance has often been seen by business leaders as a monetary guarantee that even if hackers do break into their networks and steal their data, they can still escape financially unscathed.

Yet this premise was recently rocked after Lloyd's of London, the world's biggest insurance syndicate, redefined its policies to no longer cover for nation-state cyberattacks. There are other challenges facing the cyber insurance sector in the year ahead too.

Continue reading

Beyond the smoke and mirrors of zero trust security [Q&A]

Enterprises are faced with a barrage of new threats and entry points and as a result need to deploy, scale, enforce and maintain zero trust security policies to keep pace.

Access control needs to be at the core of any successful zero trust model but this too presents challenges. We spoke to Denny LeCompte, CEO of Portnox, to discover how organizations can overcome zero trust barriers.

Continue reading

Getting the most value out of your data [Q&A]

folder stack

The past few years have seen a boom in digital transformation as enterprises have sought to modernize their operations to take advantage of a new, more flexible world of work.

But this change has often led to unwieldy data structures that are difficult to manage, which means that extracting value from the data is harder than it should be.

Continue reading

Integrating security into the development process [Q&A]

DevSecOps

Historically, security has been treated as something as an afterthought in the IT industry. In more recent years though there has been pressure to introduce 'security by design' to ensure that products are developed with best practices in mind.

We spoke to David Melamed CTO of Jit to find out about integrating security and how security tools can be used by developers not just security professionals.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.