Articles about Q&A

Connecting the world: the role of technology in providing humanitarian aid [Q&A]

Person Protecting Human Figures Forming Circle

When a crisis occurs, telecommunications infrastructure can be partially or entirely destroyed, severing the ties between crisis victims and the outside world, and in some cases disconnecting them entirely from their loved ones.

We underestimate the importance of technology until it is taken away, and providing connectivity to affected communities as quickly as possible in times of crisis is extremely important.

Continue reading

Meeting the challenges of the digital workspace [Q&A]

home working security

Remote and hybrid teams are increasingly adopting digital tools to get their jobs done. But while this strengthens productivity for workers it risks compromise to the business's security. In turn, this has exacerbated the need for additional layers of supervision and oversight.

Ungoverned connections leave businesses open to supply chain attacks, data breaches and more. We spoke to Astrix Security CEO and co-founder Alon Jackson to discuss these challenges and how to safely and securely manage the new digital workplace.

Continue reading

Why 5G/LTE network security needs a different approach [Q&A]

5G circuit board

The continuing rollout of 5G offers faster mobile networking which will pave the way for new apps and devices connecting to the internet and to corporate networks.

Liron Ben-Horin VP of systems engineering at OneLayer argues that this world of faster connections and more devices will need a new approach to security. We spoke to him to find out more.

Continue reading

How analytics can boost the supply chain [Q&A]

Analyzing data on computer

Whether you're building software or building cars, all businesses rely on some sort of supply chain. For the business to run smoothly the supply chain needs to be as efficient as possible.

We spoke to Fabio Pascali, regional vice president of Cloudera, to find out more about how analytics can contribute to making the supply chain work more efficiently.

Continue reading

Meeting the challenge of protecting data in a changing world [Q&A]

data protection

As a report last year showed, the change to working habits over the last few years has gone hand-in-hand with a rise in the theft of data.

We spoke to Cyberhaven CSO, Chris Hodson, to find out how enterprise CISOs can meet this challenge and keep their data safe.

Continue reading

Smart communities and how they're changing the world [Q&A]

smart city

Smart communities and smart cities are set to deliver a number of benefits, including environmental sustainability, reducing the digital divide, and improving people's lives with smarter, personalized and more intuitive services and experiences.

But making them work involves a good deal of technology such as 5G, small cells and distributed antenna systems (DAS), as well as needing partnerships between governments and businesses. We spoke to Brendan O'Reilly, group chief technology officer at BAI Communications to find out more about smart communities and what makes them work.

Continue reading

How enterprises can stay ahead of risks, threats and potential attacks [Q&A]

Risk dial

Businesses are engaged in a constant cat-and-mouse game with hackers, attackers, and bad actors in order to stay secure.

Dominic Lombardi, VP of security and trust at Kandji believes that in order to stay ahead it's necessary to master basic IT and security hygiene, update and communicate your risk register, and work steadily toward a zero-trust security model. We spoke to him to discover more.

Continue reading

Why workplace engagement and collaboration are the true benefits of the metaverse [Q&A]

Collaboration

The trend towards hybrid work has meant that face-to-face meetings have been widely supplanted by collaboration tools like Zoom, Teams and Slack.

With the advent of the metaverse, virtual interaction is set to become even more common. We spoke to Martin Bodley, director of emerging business at Bose Work to find out more about how this new world might look and how it can draw on expertise gained from video games.

Continue reading

Why have cloud when you can have supercloud? [Q&A]

Cloud staircase light supercloud

There's been a lot of talk about 'supercloud' recently, but what exactly does it mean? And is it the next big thing that's set to disrupt the technology landscape?

We talked to Amir Khan, CEO and co-founder of Alkira, to find out more about supercloud and what it means for the industry.

Continue reading

Data mobility -- why it's a must and how to achieve it [Q&A]

Businessman working with a Cloud Computing diagram

Data is still essential for enterprises, but the rise of hybrid working and the adoption of multi-cloud environments has made data mobility and migration a hot topic.

We spoke to Mark Greenlaw, VP of product strategy for Cirrus Data, to discuss data mobility, what's driving it and how organizations need to adapt.

Continue reading

Is ChatGPT AI the next Superman or humanity's Kryptonite? [Q&A]

ChatGPT

Now that the dust has settled on the hype around ChatGPT, it may be a good time to unpack the full implications of this technology. While it might help sleep-deprived college students ace term papers and give copywriters a creative boost, it has a potentially dark underbelly.

We talked to David Carvalho, CEO and co-founder of Naoris Protocol, to unpack some of the not so pretty aspects of emerging AI technology and its potential to wreak havoc for businesses globally.

Continue reading

Guarding against supply chain attacks [Q&A]

Broken chain

In recent years supply chain attacks have become much more commonplace, targeting vulnerabilities and getting legitimate apps to distribute malware.

We spoke to Nir Valtman, CEO and founder at Arnica, to discuss the issues these attacks raise and how organizations can defend against them.

Continue reading

Guarding against attacks targeting hybrid Active Directory environments [Q&A]

Laptop protect security

Active Directory (AD) is used by 90 percent of enterprises as the primary source of trust for identity and access. But it can also be a weak link, exploited in many modern cyberattacks.

We spoke to Ran Harel, senior director of product management at Semperis, to explore the challenges in securing a hybrid AD environment and how organizations can best defend this expanded attack surface.

Continue reading

Why cyber insurance policies may be in jeopardy [Q&A]

insurance key

Cyber insurance has often been seen by business leaders as a monetary guarantee that even if hackers do break into their networks and steal their data, they can still escape financially unscathed.

Yet this premise was recently rocked after Lloyd's of London, the world's biggest insurance syndicate, redefined its policies to no longer cover for nation-state cyberattacks. There are other challenges facing the cyber insurance sector in the year ahead too.

Continue reading

Beyond the smoke and mirrors of zero trust security [Q&A]

silhouette smoke ghost hand

Enterprises are faced with a barrage of new threats and entry points and as a result need to deploy, scale, enforce and maintain zero trust security policies to keep pace.

Access control needs to be at the core of any successful zero trust model but this too presents challenges. We spoke to Denny LeCompte, CEO of Portnox, to discover how organizations can overcome zero trust barriers.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.