Building trust in telemetry data [Q&A]


With the increasing importance of observability in digital operations, businesses need to ensure the reliability and relevance of their telemetry data in order to maintain system and application performance, debug, troubleshoot, respond to incidents and keep their systems secure.
We spoke to Tucker Callaway, CEO of Mezmo, to discuss the strategic considerations and concerns enterprises face in managing and optimizing their telemetry data.
The future of managed file transfer (MFT) in the era of digital transformation [Q&A]


In a time when there's a greater need than ever for remote and online collaboration, the secure transfer of information and digitized records is a non-negotiable essential.
As more enterprise employees create and share increasing amounts of sensitive content, organizations need to be able to manage all of their sensitive data transfers between partners, customers, users and systems, have complete visibility and control over where data goes and ensure the highest levels of security.
How business function mapping can help align IT and cybersecurity with business priorities [Q&A]


In the modern business world, organizations face the ongoing challenge of aligning their IT and cybersecurity efforts with their business priorities.
The difficulty lies in understanding how your infrastructure supports your business's core functions. Without this understanding, prioritizing cybersecurity initiatives, managing vulnerabilities, and ensuring business continuity remains an uphill battle.
The race against AI web scrapers: effective strategies to protect your data [Q&A]


A surge in artificial intelligence (AI), generative AI (GenAI), and machine learning (ML) technologies is creating a massive online appetite for data. These tools are hungry for training data, this has boosted AI web scraping, which sits in a legal gray zone. Sometimes it's legal, sometimes it's not, but what's clear is that it's having ripple effects across online businesses.
We talked to Nick Rieniets, field CTO of Kasada, to learn more about the impact of web scraping and what companies can do to protect their content.
Why it's time for a reset of security metrics [Q&A]


Historically, security metrics have focused on measuring how many attacks are successful and how long it takes for a successful attack to be detected. This is perhaps unsurprising since the bulk of the industry has focused on building tools to detect adversaries.
We spoke to Nicko van Someren, chief technology officer at Absolute Security, to learn why companies focusing purely on defense can create more risk for their organizations, and why instead of focusing on 'time to detection,' it's time to reset security metrics to focus on 'time to recovery.'
How useful is GenAI in software development? [Q&A]


Generative AI (GenAI) holds a lot of promise for software developers: an ability to help them ship code faster, improve productivity, and reduce time spent on menial and repetitive tasks. But how much of that promise are GenAI coding tools actually delivering -- and how much is hype?
We spoke with Matt Hoffman, product manager and data analyst at Uplevel, an engineering intelligence platform that uses data from across developer tools and collaboration platforms to help engineering leaders drive organizational improvements. Uplevel's data science team, Uplevel Data Labs, recently studied the impact of Copilot usage on developer productivity.
Managing the shift to machine-to-machine communication [Q&A]


As AI continues to evolve, it will enable machines to communicate in new, dynamic, autonomous ways without human intervention.
This machine-to-machine growth has a huge potential to impact industries from smart factories to energy. We spoke to John Kim, CEO of API communication specialist Sendbird, to discuss these changes and how they will affect business.
The crucial role of data pipelines in building strong GenAI apps [Q&A]


For GenAI to live up to its promise reliable flow of data is key. AI models are only as good as the data pipeline connections bringing in quality data.
Outdated connections mean more hallucinations and untrustworthy results with data engineers hopelessly trying to manually integrate hundreds of AI data feeds. We spoke to Rivery co-founder and CEO Itamar Ben Hemo to discuss why good data pipelines are key to success.
Cyber exposure management in today's enterprise landscape [Q&A]


The cybersecurity landscape is more complex than ever and that means enterprises need to have a real-time picture of their exposure.
We spoke to Nadir Izrael, CTO and co-founder of Armis, to learn what this should look like and how security teams can evaluate and evolve their security programs to achieve more control over their asset landscape.
Addressing AI challenges for the enterprise [Q&A]


With more and more businesses keen to benefit from the possibilities that AI offers it seems like everyone is jumping on the bandwagon. But this raises a number of implementation and management challenges, especially now as enterprise AI workloads begin to scale.
We spoke to Tzvika Zaiffer, solutions director at Spot by NetApp, to discuss how these challenges can be addressed and the best practices that are emerging to ensure that implementations go smoothly.
How RISC-V standards are changing the world [Q&A]


You may have heard of RISC-V -- usually pronounced 'risk-five' -- it's an instruction set architecture originally designed to support computer architecture research and education but which has evolved to become a standard open architecture for industry.
We spoke to Calista Redmond, CEO of standards body RISC-V International to find out more about the latest developments.
The future of facilities management software [Q&A]


The facilities management sector is in the midst of a digital evolution, driven by trends such as sustainability and smart buildings, and there are also increased regulatory demands in the mix.
We spoke to Phil Meyers, CEO of mpro5, to discuss what this means for facilities management software providers.
How enterprises can maximize the value of automation [Q&A]


The idea of automating processes has of course been around since the industrial revolution. But even though we've moved on from the Spinning Jenny to artificial intelligence, automation has lost none of its importance.
So how can enterprises ensure that get the most from their automation in today’s complex world? Devin Gharibian-Saki, SVP of strategic automation at Redwood Software, believes that part of the key is to have an automation fabric. We talked to him to learn more.
The challenge of encrypted traffic for network defenders [Q&A]


When it comes to protecting sensitive information like financial data, personal information, and intellectual property, encryption has become a must. By scrambling data through the use of algorithms, only those with access to decryption keys are able to read what's being secured.
Encrypted traffic has fulfilled its intended mission: to lock down data. But, could it simultaneously be helping bad actors slip by undetected? And could encrypted traffic actually make it harder for network defenders to spot threats before it's too late?
Mitigating third-party risk in today's cyber ecosystem [Q&A]


As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing.
We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.