Articles about Q&A

Why the IIoT and edge computing are pushing data to the fore [Q&A]

Edge computing

The possibilities born out of the Industrial Internet of Things (IIoT) may seem endless as the scale of what it can accomplish continues to rise. By adding edge computing into the equation, the benefits for enterprises increase even further due to the real-time capabilities it enables.

With this shift comes an increased focus on data, which is at the heart of all IIoT and edge deployments. However, some enterprises are in different stages than others when it comes to utilizing that data and getting the most actionable results out of it for valuable business decision making. We spoke with Jason Andersen, VP of business line management for infrastructure availability company  Stratus Technologies, to find out more.

Continue reading

Why startups and entrepreneurs need a smart patent strategy [Q&A]

patent troll cartoon

Ken Seddon is the CEO of the non-profit patent protection network LOT. The organization’s members include Google, Red Hat, Lenovo, Pega and other big players, as well as dozens of startups in areas such as transportation, blockchain, and software.

Startups are disproportionately impacted by patent trolls and we chatted with Ken about how a smart, assertive IP strategy can help protect their businesses.

Continue reading

How managed services can help businesses with GDPR [Q&A]

GDPR graphic

With GDPR implementation now only weeks away many businesses are still not fully prepared for the impact of the new legislation.

We spoke to Matt Klassen VP of cloud marketing at IT service management specialist Cherwell Software to find out how managed services can help companies to comply with GDPR by the may 25th deadline and to manage the additional workload it's likely to create.

Continue reading

The challenges of adopting the Industrial Internet of Things [Q&A]

Industrial internet of things

A future enabled by the Industrial Internet of Things (IIoT) is not so far off, with the integration of IoT devices rising across industrial settings from oil and gas to building security.

The potential to leverage big data and analytics to optimize operations and efficiencies is driving industrial companies to move to IIoT-enabled devices, but these companies are now faced with the challenge of modernizing their legacy production systems.

Continue reading

The impact of AI in the data center [Q&A]

data center

The rise of artificial intelligence (AI), automation and machine learning is changing the way IT professionals approach data center operations and management. And the possibilities are endless -- from lowering operational costs and reducing time to deploy new applications -- there’s no doubt that AI is transforming the data center.

We spoke with Hal Woods, chief technology officer of storage and data management specialist Datera, to learn more.

Continue reading

Virtual data protection officer service helps UK businesses with GDPR compliance [Q&A]

Keyboard with GDPR date

With GDPR coming into effect on 25th May, many organizations will find themselves needing to appoint a data protection officer in order to comply.

But appointing full-time compliance staff can be a difficult and costly exercise. Which is why cyber security company ThinkMarble is launching a Virtual Data Protection Officer (VDPO) service.

Continue reading

Picking through the haystack -- the role of AI in cyber security [Q&A]

AI security

Over the past year or so the idea of using artificial intelligence as an aid to cyber security has gained a lot of support.

But what role does AI and machine learning have, and what will the future of security look like when it's in widespread use? We spoke to Gene Stevens, co-founder and CTO of network security company ProtectWise to find out.

Continue reading

GDPR and disclosing data breaches [Q&A]

data breach

With GDPR coming into force in May this year, companies are preparing themselves to comply with the new legislation, in particular putting in place procedures to deal with data breaches.

But some, like Uber -- who have suffered a breach in the past and covered it up -- may well be wondering whether it’s better to disclose these events now rather than risk them leaking out once GDPR is in force.

Continue reading

How GDPR will affect your email archiving [Q&A]

Archive

The arrival of GDPR is set to impact on many aspects of commercial operation, not least email. But what about old emails that are stored or archived?

We spoke to Marc French, chief trust officer at cloud email specialist Mimecast to find out more about GDPR and an aspect that organizations may have overlooked.

Continue reading

How moving inventory to the cloud can streamline your business [Q&A ]

Cloud

A major trend we've been seeing in inventory management (and business, in general) is for companies to move from a desktop solution to a cloud solution. This has profound implications for the nature of how businesses manage their inventory, and we thought it would be interesting to get the low down on this trend from an industry expert.

Christy Hair is an inventory solution specialist with Boxstorm,  an online inventory management specialist. We asked her a series of questions about cloud inventory management and how moving a company's inventory to the cloud can help it streamline its processes in new ways.

Continue reading

Why moving to the cloud can help boost security and compliance [Q&A]

Secure cloud

Although the adoption of cloud services has increased over the past few years, many organizations are still unwilling to make the move to the cloud due to security and compliance concerns.

But Jim Hansen, VP of product marketing at security management firm AlienVault argues that companies with limited resources and budget should actually consider moving to the cloud in order to benefit from stronger security and compliance, in addition to other business benefits. We spoke to him to find out more.

Continue reading

How the healthcare sector is waking up to phishing threats [Q&A]

Doctor

The healthcare sector is a popular target for phishing attacks, yet it's failing to adopt simple measures like DMARC that could offer protection to both patients and staff.

A new report from cyber security company Agari reveals that fewer than 10 percent NHS Trusts and Boards in the UK have self-certified as using DMARC. Globally 77 percent of healthcare organizations don't have a DMARC policy.

Continue reading

The role of education in fighting security breaches [Q&A]

Education internet

When securing systems most people's thoughts turn to the technology of firewalls, anti-virus programs and so on. What’s often neglected is the human aspect.

Many breaches are down to poor password practices or falling for phishing emails, things which can be prevented with better education. We spoke to Stephen Burke, founder and CEO of security awareness specialist Cyber Risk Aware to get his views on how awareness training can be used to drive better behavior and make businesses more secure.

Continue reading

Data protection and edge computing in the Industrial Internet of Things [Q&A]

industrial skyline

As the Industrial Internet of Things (IIoT) takes hold across multiple industries, buzz around edge computing is growing in parallel as operators evolve to push more and more computing power to the edge of their networks, where IIoT functions really live.

The data being generated, however, is now becoming more and more critically important, requiring new levels of protection. We spoke to Jason Andersen, VP of business line management at Stratus Technologies, a provider of availability solutions for edge computing, IIoT and critical infrastructure. Jason offers his insights on the evolution of data criticality and protection as well as unified edge infrastructure as a future platform of the next generation of edge processing.

Continue reading

All you need to know about IoT Botnets [Q&A]

botnet

Connected devices like smart TVs and webcams aren't new -- but since their inception 30 years ago, the number of humans connected to the internet has been surpassed by the number of devices connected to it.

In fact, industry analysts estimate the number of connected devices will reach 50 billion by 2020. And as the number of connected devices increases exponentially, so the number of security risks grows as well.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.