Why enterprise networks need to move to an as-a-service model [Q&A]

Future-network

For years, the enterprise has built bespoke networks to connect all company resources. These networks were slow to build, but once built did not change much.

That's changing as networks become more complex and dynamic. Workers are highly distributed, edge computing has grown, most enterprises now connect to multiple clouds, and connecting to partners and customers is increasingly common.

Continue reading

Navigating generative AI adoption to minimize risks and maximize benefits in the workplace [Q&A]

digital pioneer

Numerous businesses have embraced generative AI technology to enhance their operational efficiency, boost productivity and foster innovative ideas.

However, it is important to be aware of the potential legal and financial consequences associated with the use of ChatGPT and similar AI systems. We spoke to Sujay Rao, CPO at Sirion to find out more.

Continue reading

The evolution of open source in the enterprise [Q&A]

Open-Source

Open source software has been around for decades, it's thriving, effective and disrupting in the enterprise more than ever.

We talked to, Cédric Gégout, VP product management at Canonical, to discuss the evolution of open source in the enterprise and protecting its fundamentals for continued success.

Continue reading

How companies can respond better to security risks [Q&A]

Risk dial

One of the biggest issues when dealing with security risks is the time that it takes to address problems when they come to light.

We spoke to Yoran Sirkis, CEO of remediation operations specialist Seemplicity, to discuss why there's an issue and how workflow problems around responding to risks can be improved.

Continue reading

External attack surface management [Q&A]

Firewall

The external attack surface -- those assets which face the internet -- is attracting a lot of attention at the moment, with Gartner naming it as a top security risk.

To find out more about external attack surface management (EASM) and why organizations need to take it seriously, we spoke to Rickard Carlsson, CEO of Detectify.

Continue reading

Why traditional CMS are an innovation bottleneck and federated content platforms are the future [Q&A]

Web development and coding. Cross platform development website. Adaptive layout internet page or web interface on screen laptop, tablet and phone. Isometric concept illustration.

Traditional content management systems (CMS) developed at a time when all that was needed was to post some text and a few images. But as consumer and business needs have evolved they can prove to be a bottleneck when it comes to innovating and improving a web presence.

Michael Lukaszczyk, the CEO and co-founder of content platform Hygraph, argues that enterprises need a future-proof solution. We talked to him to find out more.

Continue reading

What is open source silicon root of trust? [Q&A]

trust keyboard

You may have come across the term 'root of trust', it’s a source, such as a hardware module, that can always be trusted within a cryptographic system. The system trusts the keys and other cryptographic information it receives from the root of trust module as always authentic and authorized.

Mostly this involves being tied into a specific vendor, but OpenTitan has developed an open source silicon root of trust for use in for use in data center servers, storage, peripherals, and more.

Continue reading

How to build a successful data lakehouse strategy [Q&A]

Data Lakehouse - Inscription on Blue Keyboard Key.

The data lakehouse has captured the imagination of modern enterprises looking to streamline their architectures, reduce cost and assist in the governance of self-service analytics.

From data mesh support to providing a unified access layer for analytics and data modernisation for the hybrid cloud, it offers plenty of business cases, but many organizations are unsure where to start building one.

Continue reading

Why open source is key to modernizing the enterprise -- without ditching the mainframe [Q&A]

Enterprise technology

Many large enterprises still rely heavily on mainframes to offer a reliable and secure basis for their systems.

But as digital transformation efforts gain pace, developers are eyeing frameworks that can boost their modernization efforts. We spoke to Phil Buckellew, president of infrastructure modernization at Rocket Software, to find out how open source software can bridge the divide between modern applications and mission-critical mainframe infrastructure.

Continue reading

How organizations can get a handle on cloud security [Q&A]

Cloud data protection

As cloud-based enterprises continue to grow, the security threats in the cloud grow with them. Organizations operate in complex, multilayered environments that leave security teams scrambling to protect all of their organization's assets and resources. In fact, they may not even be aware of all of them.

What are the biggest risks they face today? And how can organizations mitigate their vulnerabilities?

Continue reading

How AI can help app developers keep up with changing regulations [Q&A]

Compliance rule law and regulation graphic interface for business quality policy

A changing regulatory landscape can prove difficult for app developers as they need to make sure they remain compliant and keep up with evolving rule sets.

We spoke to Pedro Rodriguez, head of engineering at AI-powered compliance intelligence platform Checks, to find out how AI can help mobile app developers to handle data responsibly and keep up with ever-changing global regulations,

Continue reading

Network security is ripe for automation -- except when it isn't [Q&A]

Technology center with fiber optic equipment

According to one analyst estimate, the market for network automation tools will grow nearly 23 percent annually from 2022-2030.

While many IT professionals are familiar with automation of business processes, they are likely less familiar with its applications in network operations (NetOps) and security. As automation technology is maturing, organizations are using network automation solutions to transform their core workflows, including troubleshooting, change management and network security, for more efficient and effective network operations.

Continue reading

The risks of public Wi-Fi and how to stay safe [Q&A]

Public wi-fi

The demands of daily lives increasingly mean that we want to be connected wherever we are. Add in the shift to hybrid working and we’re likely to want to be in touch with the office all the time too.

That makes the lure of free public Wi-Fi, whether it's in a coffee shop, a hotel or an airport, hard to resist, especially if you have a limited data allowance on your mobile contract. But of course using public networks always comes with a side order of added risk.

Continue reading

Why you need a multi-layered strategy to secure the cloud [Q&A]

cloud security

Recent cyber attacks have seen not just the usual monetary motives but also the rise of espionage attempts with attacks on government officials.

So how can organizations, both public and private sector, protect their most valuable assets? We spoke to Glenn Luft, VP of engineering at Archive360, to find out.

Continue reading

The challenges of securing the healthcare sector [Q&A]

Healthcare cybersecurity

The healthcare sector is particularly attractive to cybercriminals due to the amount of personal data held and the critical nature of many systems.

We spoke to Shankar Somasundaram, CEO of IoT risk management platform Asimily, to discuss healthcare systems and the challenges involved in securing them.

Continue reading

Load More Articles