The ERP challenges that are keeping security teams up at night [Q&A]

Stressed man trying to sleep

Data is the lifeblood of modern business and enterprise resource planning (ERP) systems are where it's likely to live. ERP software integrates data and business functions across departments like finance, manufacturing, marketing, sales and more, and of course this makes it an attractive target for cyber criminals.

So what threats do ERP systems face and what can enterprises do to defend against them? We spoke to Kellie Synder, CCO of Onapsis, to find out.

Continue reading

How AI is changing the way developers work [Q&A]

man in headset with computer over virtual screens

The fear of software developers losing their jobs to AI is a concern for many people in the industry, but are these fears really justified?

Mike Loukides, VP of emerging tech content at O'Reilly Media, believes that AI can enhance the developer role rather than replace it. We spoke to him to find out how, with the right tools and training, the endpoint of this AI revolution won't lead to unemployment, but rather to better software.

Continue reading

How AI is changing the telecoms industry [Q&A]

smart city

The transition to cloud and SaaS use, along with the recent move towards remote and hybrid working, has placed increased pressure on the telecoms industry. At the same time, it has unlocked a significant opportunity for telcos, as remote work has placed a premium on services like fiber and broadband.

Increased data volumes place additional demands on infrastructure and drives up costs. We talked to Anthony Behan, managing director for communications, media and entertainment at Cloudera to discuss these developments and how artificial intelligence is helping telcos to adapt.

Continue reading

Why identity security could be the Achilles heel of your business [Q&A]

identity individual crowd

Most successful cyberattacks rely on compromised identity or social engineering. Yet this can be a major blindspot for enterprises with basic awareness of the problem lacking and a growing number of personal devices used for work.

We spoke to Jim Taylor, chief product officer of identity platform RSA, -- which recently published a report on the issue -- to learn more about the problem and how it can be addressed.

Continue reading

Making cybersecurity elementary [Q&A]

Cybersecurity periodic table

There are so many terms and acronyms used in the cybersecurity sector that it can be a little overwhelming at times, even for people who work in the industry.

Paul Baird, director of cyber security operations and engineering at Advanced Software and fellow at the Chartered Institute of Information Security (CIISec) has produced a round up of all the terms that you might ever need to know in the security space in a format based on the periodic table of elements.

Continue reading

Verified randomness -- what is it and why does it matter? [Q&A]

random_numbers

Much of the online world relies on things being random. Gamers trust that their players re-spawn at completely random locations, similarly, gamblers trust that online slot machines are giving them random outcomes.

Ensuring things are properly random is also important for things like decentralized finance and blockchain transactions. But how can you be sure that something is properly random?

Continue reading

How to reduce generative AI's risks to data [Q&A]

AI

Generative AI models like ChatGPT are creating a lot of enthusiasm for what they can do for businesses, but they are generating just as much fear over what can go wrong with the data they handle. There is a lack of trust between large companies that have the data and the AI startups that want to use them.

What can we expect to see in the near future? We spoke with Katy Salamati, senior manager of the advanced analytics lifecycle at SAS, to find out.

Continue reading

How 5G is set to transform the way businesses connect [Q&A]

5G circuit board

The rollout of 5G will speed up mobile communications and also enable more computing tasks to be carried out at the edge.

For businesses it presents the opportunity for a greater understanding of customer patterns and infrastructure needs. We spoke to Chris Gehlen, CEO and co-founder of SaaS/NaaS cloud platform Neutroon, to learn more.

Continue reading

What is a vCISO and why would you want to hire one? [Q&A]

CISO

As the profile of cybersecurity has increased within enterprises, so has the challenge of finding people to fill senior roles and then hanging on to them.

Recent research suggests that CISOs don't stay in the job for more than three years on average. One answer is to use a virtual CISO (vCISO) to advise on current issues and relieve the strain on the in-house team.

Continue reading

Balancing risk and reward with low-code and no-code platforms [Q&A]

Low code

In recent years, enterprises have increasingly turned to low-code and no-code platforms in order to streamline their development processes.

With the introduction of AI, this sector is evolving even faster and Wing To, general manager of Intelligent DevOps at Digital.ai, believes this needs organizations to develop a cautious approach. We spoke to him to find out why.

Continue reading

How AI is set to transform the legal sector [Q&A]

Internet AI law concept

The use of generative AI is becoming common across many industries, but while it undoubtedly offers benefits it can lead to problems too.

Legal firms in particular can fall foul of poor results, one firm was fined $5,000 after a court found that one of its lawyers had used ChatGPT to write a court brief which included false citations.

Continue reading

Who will win the battle of open vs closed AI? [Q&A]

Artificial Intelligence Bias

Closed AI products like Bard and ChatGPT (ironically from OpenAI) have already delivered a practical, powerful chatbot experience and are being employed by many businesses.

Open AI by contrast is still in its early stages and has not seen wide adoption. We spoke to Mike Finley, CTO and co-founder of AnswerRocket, to find out the differences between the two and how they're set to develop.

Continue reading

Ditching passwords in favor of passwordless, phishing-resistant authentication [Q&A]

Passwordless authentication - Inscription on Blue Keyboard Key.

According to the FIDO (Fast Identity Online) Alliance, passwords are the root cause of more than 80 percent of data breaches. And yet, many organizations -- both big and small -- continue to use this antiquated approach to authentication. In fact, recent research from Yubico, which surveyed more than 16,000 employees across eight countries, found 59 percent of respondents still rely on usernames and passwords as their primary method of authentication.

Why do we continue to see the same old same old, especially when the authentication industry has made such significant strides in not only passwordless but also phishing-resistant authentication? We spoke with Axiad founder and co-CEO Bassam Al-Khalidi to get an answer to this question and find out how companies can make the move to a passwordless, phishing-resistant future. Read on to hear what he had to say.

Continue reading

How SMBs are tailoring their cybersecurity programs [Q&A]

SMB laptop

The uncertain economic climate has led to many smaller businesses cutting their budgets over the last year. But where cybersecurity spend is concerned this can be a risky move.

We spoke to Geoff Bibby, senior vice president at OpenText Cybersecurity to discuss how SMBs and managed security providers (MSPs) can adapt their security plans while still remaining protected.

Continue reading

Why not all AI is created equal and how the wrong choice could be hurting your business [Q&A]

intelligence

AI seems to be everywhere at the moment. But despite the fact that it has become ubiquitous, it isn't all the same.

Steve Benton, VP of threat research for Anomali, talked to us about why not all AI is equal and what businesses need to consider to ensure they get the most from the technology.

Continue reading

Load More Articles