Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
EM360Tech public
[search 0]
Download the App!
show episodes
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
  continue reading
 
Loading …
show series
 
"Certainly an exciting time for data centers, private and public alike, isn't it?" This opening remark from Tom Croll of Lionfish Tech Advisors set the stage for a compelling discussion with Ryan Mallory, President and COO of Flexential, on the recent episode of the Tech Transformed podcast. The speakers discuss the current AI scenario's impact on …
  continue reading
 
Blending financial planning directly into existing business intelligence (BI) platforms like Microsoft Power BI and Qlik are on the rise. But have you questioned why, and what drives this shift? In this episode of the Don’t Panic It’s Just Data podcast, Kevin Petrie, BARC analyst, sits down to chat with Thomas Gorr, Director of Product Management f…
  continue reading
 
In this episode of the Don’t Panic, It’s Just Data podcast, Kevin Petrie, VP of Research at BARC, is joined by Nidhi Ram, Vice President of Global Services Strategy and Operational Excellence at Precisely. The duo explore the idea of focusing on data modernisation and improving accessibility rather than constantly implementing new technologies. Bot…
  continue reading
 
In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
  continue reading
 
Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
  continue reading
 
Takeaways #AI #analysts are crucial for integrating AI into business processes. Organisations need to rethink their data management strategies for AI. AI #data clearinghouse concepts help manage data access and security. Cross-functional collaboration is essential for successful AI integration. AI can enhance employee effectiveness rather than repl…
  continue reading
 
"The concept of Zero Ticket IT is that instead of reacting to the ticket and trying to solve the ticket, you go directly to the source of the issue." This statement by Sean Heuer, CEO of Resolve Systems, sets the stage for this episode of the Tech Transformed podcast. Shubhangi Dua, podcast host and producer at EM360Tech, , sits down with Heuer to …
  continue reading
 
“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
  continue reading
 
Are you a CIO, CTO, CISO, or IT decision maker in the restaurant or retail industry, grappling with rising costs and tariffs to keep up with the rapid pace of technological change? The pressure to create high-quality solutions with AI while managing existing infrastructure can be challenging. In this episode of the Tech Transformed Podcast, Shubhan…
  continue reading
 
The ability to effectively manage and optimise data is key in an organisation today. But with the sheer volume and complexity of enterprise data, traditional methods are struggling to keep up with the change. This is where the agentic AI approach has swooped in to transform how organisations handle their most valuable resource. "The promise of AI a…
  continue reading
 
Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
  continue reading
 
Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
  continue reading
 
Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
  continue reading
 
Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
  continue reading
 
“Before starting a new AI project, it is really worthwhile defining the business priority first,” asserts Joanna Hodgson, the UK and Ireland regional leader at Red Hat. “What specific problem are you trying to solve with AI? Do we need a general purpose AI application or would a more focused model be better? How will we manage security, compliance …
  continue reading
 
Takeaways #Satellitecommunications are essential for remote field teams. They provide safety and tracking for workers in isolated areas. Disaster preparedness involves proactive planning and communication. User-friendly #technology is crucial for effective utilisation. Reliable communication impacts day-to-day operations positively. Employers show …
  continue reading
 
"Having the insight and being able to stitch together your technical resources and business decisions together, is the prime place where observability can add value to you,” stated Manesh Tailor, EMEA Field CTO at New Relic. In this episode of the Tech Transformed podcast, Kevin Petrie, Vice President of Research at BARC, speaks with Manesh Tailor …
  continue reading
 
"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
  continue reading
 
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
  continue reading
 
Takeaways #AIagents are #autonomous entities that can perceive and act. Human oversight is essential in the initial stages of AI implementation. Data quality and trust are critical for effective AI agents. Guardrails must be integrated into the design of AI agents. Modularity in design allows for flexibility and adaptability. #AI should be embedded…
  continue reading
 
In this episode of the Don't Panic, It's Just Data podcast, hosted by EM360Tech's podcast producer, Shubhangi Dua speaks to Donnie Owsley from Snohomish County, and Jeff Burton and Tom Lavery from the University of British Columbia. All of the speakers will be presenting at the upcoming Peak of Data and AI event, organised by Safe Software, the cre…
  continue reading
 
"If AI has proven anything, it will change pretty rapidly. Understanding its limitations and not asking too much of it is significant. What’s successful is prototyping tools," said Rob Whiteley, CEO of Coder. "Such tools where AI can create an application, while not the world's most graceful code but will get you to working prototype pretty quickly…
  continue reading
 
Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
  continue reading
 
Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
  continue reading
 
Takeaways #Financeteams are often resistant to change, clinging to outdated tools. Real-time data integration can help break down data silos and better decision-making. The shift from FP&A to XP&A emphasises collaboration across departments. #Datagovernance is crucial when handling financial data. Real-time data enables more accurate forecasting an…
  continue reading
 
Takeaways #Customersuccess is about helping customers get value from products. The perception of customer success is shifting from a cost centre to a revenue generator. #AI can enhance customer success by providing predictive insights and automating processes. Customer success teams are uniquely positioned to identify upsell and cross-sell opportun…
  continue reading
 
Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors. “When it comes to API…
  continue reading
 
Takeaways #AgenticAI systems can string tasks together for efficiency. Real-world applications include supply chain optimisation and knowledge worker augmentation. #Dataquality is crucial for effective AI implementation. Education and understanding of AI's potential are essential for organisations. Governance is key to ethical AI deployment. Leader…
  continue reading
 
"So you want trusted data, but you want it now? Building this trust really starts with transparency and collaboration. It's not just technology. It's about creating a single governed view of data that is consistent no matter who accesses it, " says Errol Rodericks, Director of Product Marketing at Denodo. In this episode of the 'Don't Panic, It's J…
  continue reading
 
Takeaways #CMDM is essential for creating a unified and accurate view of the customer. Trust comes from how responsibly data is handled. Ethical data use is a competitive advantage and builds trust. Executive sponsorship and cross team buy-in is crucial for MDM projects. A strong customer #datastrategy is a competitive edge, not a side project. Sum…
  continue reading
 
In the latest episode of the Don’t Panic It’s Just Data podcast, we connected with speakers who provided a preview of their presentations at the upcoming Peak of Data and AI event in Seattle organised by Safe Software from May 5-8, 2025. This premier gathering, hosted by Safe Software, the creators of FME, will be a hub for data and AI innovators, …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play