Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

EM360Tech Podcasts

show episodes
 
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Loading …
show series
 
AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows, and make decisions at a speed and scale beyond human capability. Matt Fangman, Field CTO at SailPoint, explains on The Security Strategist podcast that this new power has costs. AI agents have turne…
  continue reading
 
As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing how attacks are launched and how organisations function daily. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pas…
  continue reading
 
Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the Security Strategist podcast, host Trisha Pillay spea…
  continue reading
 
Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastructure, operations, regulatory compliance, and user trust, all while delivering systems that are reliable, secure, and effective across diverse regions. In this episode of Security Strategist, host Tr…
  continue reading
 
In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber resilience. In this episode of The Security Strategist podcast, Jim Waggoner, VP of Product Management at N-able, and Lewis Pope, CISSP and N-able Head Nerd, sit down with host Jonathan Care, the Lead A…
  continue reading
 
In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with John Amaral, Co-Founder and CTO of Root. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management. Amaral, who has decades of experience in security leaders…
  continue reading
 
We live in a world where technology moves faster than most organisations can keep up. Every boardroom conversation, every team meeting, even casual watercooler chats now include discussions about AI. But here’s the truth: AI isn’t magic. Its promise is only as strong as the data that powers it. Without trust in your data, AI projects will be built …
  continue reading
 
“What is the true value of our data and AI initiatives?” Too often, we drive all our energy into tools, processes, and outputs, but forget to ask ourselves how what we build actually makes a difference. For enterprises, this means looking beyond AI models and dashboards to see how our data drives real, measurable impact. Understanding the differenc…
  continue reading
 
As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging. In this episode of the Security Strategist Podcast, IT-Harvest Chief Research Analyst Richard Stiennon sits down with Art Gilliland, CEO of Delinea, to discuss the explosive adoption of AI, the rise of shadow AI,…
  continue reading
 
As companies rethink how they provide customer experiences (CX), a new form of AI capability, agentic AI, is quickly changing how work is accomplished in contact centres. In the recent episode of the Tech Transformed podcast, Dialpad Lead Product Manager Calvin Hohener sits down with host Jon Arnold, Principal at J Arnold & Associates. They discuss…
  continue reading
 
As AI becomes a central pillar of business decision-making, enterprises face a new challenge, and that is making their data AI-ready. It’s no longer enough to collect and digitise information. For organisations, data must be structured, contextualised, discoverable, and usable—both by humans and intelligent systems. AI can only deliver if your data…
  continue reading
 
In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting be…
  continue reading
 
Client service teams are at a breaking point. Margins are shrinking, the demand keeps rising, and much of the day is consumed by work that doesn’t move the needle. As a result, skilled people often spend hours reconciling spreadsheets, re-entering the same data across multiple systems, and chasing updates, time that should be spent on the work clie…
  continue reading
 
With the rapid evolution of Generative AI, customer experience (CX) is evolving rapidly, too. In a recent episode of the Tech Transformed podcast, Mike Gozzo, Chief Product and Technology Officer at Ada, sat down with host Christina Stathopoulos, Founder of Dare to Data. They talked about how generative AI is changing business-to-customer interacti…
  continue reading
 
The era of 3G is ending. For many industrial businesses, smart infrastructure systems, remote device management, and IoT connectivity rely on networks that are now being phased out globally. The question isn’t if—but when your operations could be disrupted. In this episode of Tech Transformed, Trisha Pillay speaks with Jana Vidis, Business Developm…
  continue reading
 
Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
  continue reading
 
Tech leaders are often led to believe that they have “full-stack observability.” The MELT framework—metrics, events, logs, and traces—became the industry standard for visibility. However, Robert Cowart, CEO and Co-Founder of ElastiFlow, believes that this MELT framework leaves a critical gap. In the latest episode of the Tech Transformed podcast, h…
  continue reading
 
Enterprises are discovering that the first wave of cloud adoption didn’t simplify operations. It created flexibility, but it also introduced fragmentation, rising costs, and skills gaps that now make AI adoption harder to manage. In this episode of Tech Transformed, analyst and host Dana Gardner speaks with two leaders from across the IBM portfolio…
  continue reading
 
“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
  continue reading
 
With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of The Security Strategist Podcast, guest Gidi Cohen, CEO and Co-Founder of Bonfy.AI, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional data los…
  continue reading
 
While the role of a chief data officers (CDOs) was traditionally focused on regulatory compliance, it has now expanded to empowering the consistent and effective use of data across organizations to improve business outcomes. One of the most effective ways for CDOs to demonstrate their value is by developing a data strategy that is closely aligned w…
  continue reading
 
The semiconductor industry is at an inflection point. As systems become more intelligent, connected, and software-defined, chip design is growing too complex for humans alone. Advances in electronic design automation are reshaping how silicon is built and verified, enabling faster, smarter, and more reliable innovation from data centers to edge dev…
  continue reading
 
Driving Enterprise Innovation with AI and Strong CI/CD Foundations As enterprises push to deliver software faster and more efficiently, continuous integration and continuous delivery (CI/CD) pipelines have become central to modern engineering. With increasing complexity in builds, tools, and environments, the challenge is no longer just speed, but …
  continue reading
 
For years, observability sat quietly in the background of enterprise technology, an operational tool for engineers, something to keep the lights on and costs down. As systems became more intelligent and automated, observability has stepped into a far more strategic role. It now acts as the connective tissue between business intent and technical exe…
  continue reading
 
In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. Redd…
  continue reading
 
Can your organization truly trust every identity, human, machine, and AI? The traditional security perimeter is no longer a reliable boundary. As enterprises adopt hybrid infrastructures, cloud services, and autonomous AI systems, identity has emerged as the central element of effective cybersecurity. In the latest episode of The Security Strategis…
  continue reading
 
In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, talks with Stefanie Hammond, Head Nerd at N-able, and Jim Waggoner, Vice President of Product Management at N-able. They disc…
  continue reading
 
““Without healthy employees, you don’t have healthy customers. And without healthy customers, you don’t have a healthy bottom line.” — Kate Visconti, Founder and CEO, Five to Flow. While artificial intelligence (AI) has hastened development and made enterprises more efficient, it also comes with more deadlines. The deadlines often merge into after-…
  continue reading
 
The challenge all organisations, big and small, face is answering and implementing solutions to solve this key question: How can finance and accounting teams work faster, smarter and more accurately? In the recent episode of the Don’t Panic It’s Just Data podcast, host Scott Taylor, The Data Whisperer and Principal Consultant at MetaMeta Consulting…
  continue reading
 
“Cyber resilience isn’t just about protection, it’s about preparation.” Every business in this day and age lives in the cloud. Our operations, data, and collaboration tools are powered by servers located invisibly around the world. But here’s the question we often overlook: what happens when the cloud falters? In this episode of Tech Transformed, T…
  continue reading
 
"A flaw of warehouses is that you need to move all your data into them so you can keep it going, and for a lot of organisations that's a big hassle,” says Will Martin, EMEA Evangelist at Dremio. “It can take a long time, it can be expensive, and you ultimately can end up ripping up processes that are there." In this episode of the Don’t Panic It’s …
  continue reading
 
"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature." According to Robert Rogenmoser, the CEO of Securosys, storing keys insecurely creates immediate ri…
  continue reading
 
"5G is becoming a great enabler for industries, enterprises, in-building connectivity and a variety of use cases, because now we can provide both the lowest latency and the highest bandwidth possible,” states Ganesh Shenbagaraman, Radisys Head of Standards, Regulatory Affairs & Ecosystems. In the recent episode of the Tech Transformed podcast, Shub…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play