Articles about Q&A

Software architecture in the age of AI [Q&A]

Software architecture development

Does AI impact software architecture? Or does software architecture impact AI? The answer of course is both, but how much of an overlap is there between the two?

To find out we spoke to Mike Loukides, vice president of emerging tech content at O'Reilly, about how software architects can work with AI and avoid its more negative effects.

Continue reading

Can humans provide a cybersecurity edge? [Q&A]

Thoughtful geek hacker

It's usually the case that cybersecurity is seen as being all about technology and that humans -- making mistakes and falling for social engineering -- are something of a liability.

But are people really just a problem or can they also be part of the solution? Toney Jennings, CEO of DataStone, believes we need to shift our thinking away from the current paradigm to empowering people as a hidden asset in the protection of their organization. We talked to him to find out more.

Continue reading

Tackling the business threat posed by deepfakes [Q&A]

Deepfake

AI has become an undeniable and powerful part of the digital landscape. It makes systems stronger and more automated -- but it also has the potential to present a threat.

Some 80 percent of executives believe deepfakes pose a risk to their business, yet only 29 percent say they have taken steps to combat them. We spoke to Patrick Harding, chief product architect at Ping Identity, to discuss the security threats posed by AI and the need to take steps to properly secure identity by adding additional layers of protection.

Continue reading

Meeting the challenges of enterprise development [Q&A]

software development coding

The rate of change in both technology and economic conditions can make it hard for CIOs to both innovate and satisfy the needs of the business.

We spoke to Ioan Iacob, founder and CEO of financial application specialist FlowX, to discuss the challenges of developing apps in the enterprise and how they can be addressed.

Continue reading

Generative AI in the legal sector [Q&A]

Internet AI law concept

The use of generative AI isn't just confined to the tech sector, it's appearing in lots of other industries too in order to streamline operations and boost digital transformation efforts.

We spoke to Jay Madheswaran, CEO of Eve, to learn more about how GenAI is being used by legal firms and the challenges that adopting it can present.

Continue reading

Making LLMs safe for use in the enterprise [Q&A]

LLM

Large language models (LLMs) in a business setting can create problems since there are many ways to go about fooling them or being fooled by them.

Simbian has developed a TrustedLLM model that uses multiple layers of security controls between the user and the GenAI models in order to create a safer solution.

Continue reading

Navigating AI challenges in the enterprise [Q&A]

Double exposure of technology hologram with man working on computer background. Concept of big data.

As more businesses turn to AI, they face a number of challenges around integrating it effectively and obtaining the best value while still ensuring that their data remains secure. It's also important that they select the right AI provider for their needs.

We spoke to Naren Narendran, chief scientist at database specialist Aerospike, to discuss the strategic considerations and concerns enterprises face as they incorporate AI into their operations.

Continue reading

How to overcome today's intelligence challenges to uncover the threats that matter [Q&A]

Cybersecurity threat intelligence

Threat intelligence is critical to protection efforts, but businesses often struggle with effective management and correlation of this data to help prioritize their efforts.

We spoke to Richard Struse, chief technology officer and co-founder of Tidal Cyber, to discuss the challenges presented when organizations scramble to update systems that aren’t actually vulnerable or stop threats that would essentially have no impact on their business.

Continue reading

The role of AI in securing identity [Q&A]

Facial recognition identity AI

Identities are probably the biggest attack surface for organizations in today's world as employees rely more on systems and apps to do their jobs.

Mapping identity and access data from the large, disparate, and often disconnected, mix of on-premise and cloud systems that enterprises use is a major challenge.

Continue reading

What's needed for SBOM success? [Q&A]

SBOM Software Bill of Materials

Enterprises are increasingly looking to software bills of materials (SBOM) to understand the components inside the tech products they use in order to secure their software supply chain.

But do SBOMs really provide value? And how can they be used more effectively? We talked to Varun Badhwar, CEO and co-founder of Endor Labs, to find out the keys to using SBOMs successfully.

Continue reading

How IT leaders can address online privacy risks [Q&A]

Privacy text on keyboard button. Internet privacy concept.

Enterprises are facing a rapidly changing privacy landscape, in which some laws contradict each other, while struggling to reduce costs and gain visibility into their privacy risks.

Indeed there’s been a recent increase in lawsuits against companies for online privacy violations that is putting significant strain on C-level executives and they're looking to their IT leaders to address all of this risk with technology.

Continue reading

The future of data analytics in business intelligence [Q&A]

Data analytics

In a little more than a decade, data analytics has been through several big transformations. First, it became digitized. Second, we witnessed the emergence of 'big data' analytics, driven partly by digitization and partly by massively improved storage and processing capabilities.

Finally, in the last couple of years, analytics has been transformed once again by emerging generative AI models that can analyze data at a previously unseen scale and speed.

Continue reading

The rise of third-party browser script attacks [Q&A]

script-attack

Third-party browser scripts are the code snippets that organizations put into their websites to run ads, analytics, chatbots, etc -- essentially anything that isn't coded by the organization itself.

Which sounds innocuous enough, but these scripts are increasingly being used as a vector for cyberattacks. We spoke to Simon Wijckmans, CEO of c/side, to understand how these attacks operate and what can be done to defend against them.

Continue reading

The critical gap in zero trust [Q&A]

Zero-Trust

As network boundaries can no longer be relied on to define the limits of cybersecurity, zero trust has become the overarching framework that now guides enterprise security strategies.

However, Zero Trust Network Access (ZTNA) has its limitations, especially in application security, and this can open up risk for organizations heavily reliant on SaaS systems.

Continue reading

How IT leaders can bring their organizations into the next generation of cyber learning and training [Q&A]

Virtual training

The IT world has always been a fast moving one and that means skills need to be kept up to date if you're not going to fall behind.

We spoke to Brett Shively, CEO of ACI Learning a provider of IT, cybersecurity and audit training for organizations around the world, about the importance of training and how a personalized approach can pay off.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.