The internet has changed the way that most people shop and increasingly we want to get the things we've ordered fast.
This has given rise to on-demand commerce, with deliveries supported by armies of gig workers. But it's also driven rapid technological innovation in the logistics sector. We spoke to Kashyap Deorah, founder and CEO of logistics app specialist HyperTrack, to learn more about the new the phenomenon of 'instant commerce' and what it means for both enterprises and consumers.
A ransomware attack can be devastating for businesses. But while in the aftermath of an attack the focus will be on recovery, it's also important to look at how the attack happened and what information can be gleaned to help prevent future incidents.
We spoke to Joseph Carson, chief security scientist at privileged access management specialist Delinea, to talk through the analysis of a typical attack and what lessons can be learned.
The popularity of Kubernetes has led to its rapid adoption, but as with any advanced technology, the benefits come alongside challenges.
Being able to take full advantage of the technology means understanding what it can offer and how it fits with other developments like artificial intelligence. We spoke to Tobi Knaup, CEO of independent Kubernetes platform D2iQ, to find out about the current state of Kubernetes and what it promises for the future.
The short-term costs of a cyberattack are significant. Investigating and containing a breach, rebuilding IT systems and implementing new security controls, as well as the loss of productivity, can all cause severe financial strain.
However, the long-term costs of a breach are often even more damaging. Enterprises that do not handle an attack well can suffer a number of further consequences, including reputational damage, a loss of customer loyalty and a drop in share prices.
Cybersecurity is a priority for all enterprises. We regularly see news of data breaches across a wide range of industries, and as workforces increasingly move to a hybrid model the issue becomes more acute.
As businesses undergo digital transformation they need to update not only their tools but also their attitude toward keeping systems secure. We spoke to Pravin Kothari, executive vice president, product and strategy at cloud security company Lookout to find out why in a cloud-native world security needs a different approach.
Every year, thousands of code vulnerabilities are discovered, patched and publicly disclosed to improve security for current and potential users.
But many of these vulnerabilities share common features, so what can developers do to write better code that prevents vulnerabilities from entering their apps and services in the first place? We talked to Johannes Dahse, head of R&D at clean code specialist SonarSource, to find out.
Data has become increasingly important for modern businesses and they increasingly expect it to help them improve their delivery to customers and ultimately their bottom line.
We spoke to Dom Couldwell, head of field engineering, EMEA at DataStax to discuss how companies can use data and how they need to adapt their approach to do so effectively.
With the decline of the traditional enterprise network perimeter, more and more organizations are turning to a zero trust approach to securing their systems.
This not only reduces the attack surface, it ensures that if an attack does succeed it's much less likely to spread laterally within the network. We talked to Tim Silverline, VP of security at network automation specialist Gluware, to find out more about what implementing zero trust means.
The rise of online retail coupled with the pandemic have brought about some unprecedented changes to the retail landscape in recent years.
But as consumers now start to venture back into stores, how can retailers make use of technology to effectively compete with their online counterparts and with other brick-and-mortar businesses?
For many years the database has been at the heart of enterprise IT. But the shift to the cloud has led to massive challenges with migrations proving both slow and expensive.
A different way to approach this is to use virtualization, allowing existing applications to run on any modern cloud platform without being rewritten or replaced. We spoke to Mike Waas founder and CEO of Datometry, a SaaS database virtualization platform, to find out more.
The use of IT systems is vital to the success of any business, but if employees aren't properly instructed in the use of these systems it can prevent them from performing well.
This applies particularly to certain groups like older workers, returning parents and contractors. So, what can businesses do to ensure they properly harness the skills, knowledge and expertise held by these groups?
In recent years, many businesses have embraced digital transformation to boost productivity and streamline operations in an attempt to create competitive advantages. But in the process of migrating critical operations to the cloud, they have exposed themselves to new risks.
With cloud apps accessible from anywhere, it not only helps your users get their work done, it also provides attackers with new vectors to exploit.
Detecting threats today isn't just about deciding which methods to use, but also which data. Endpoint server and workstation logs are a start, but major blind spots still exist unless threat detection visibility extends to network and cloud as well.
In order to be effective, security teams need to look at what data to use, what the science says can be done with the data, and what to expect. We spoke to Andrew Hollister, CISO at LogRhythm to find out more.
Spending on cloud services is showing no sign of slowing down, but IT and security leaders are realizing that applications need to have high availability and strong performance in order to be effective.
Application experience management is therefore becoming a key element of enterprise strategy. We spoke to Jason Dover, VP product strategy at Progress, to find out why.
A record 59.1 million tonnes (53.6 million tons) of e-waste was generated by homes and businesses in 2019, but only 17.4 percent of it was correctly recycled, the rest ending up in landfill or other disposal routes.
With the amount of e-waste expected to grow further, it's still the case that many people simply don't know where or how to properly recycle their obsolete devices.