Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
…
continue reading
EM360Tech Podcasts
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Turn data overwhelm into data-driven success. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make the most of your organization's data.
…
continue reading
1
Why AI Agents Demand a New Approach to Identity Security
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows, and make decisions at a speed and scale beyond human capability. Matt Fangman, Field CTO at SailPoint, explains on The Security Strategist podcast that this new power has costs. AI agents have turne…
…
continue reading
1
Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing how attacks are launched and how organisations function daily. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pas…
…
continue reading
1
From IoT to AIoT: Operational and Security Challenges for Modern Enterprises
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the Security Strategist podcast, host Trisha Pillay spea…
…
continue reading
1
Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastructure, operations, regulatory compliance, and user trust, all while delivering systems that are reliable, secure, and effective across diverse regions. In this episode of Security Strategist, host Tr…
…
continue reading
1
How Can MSPs Move From Defense to Full Cyber Resilience?
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19In this final episode with N-able, the guests answer a pressing challenge for today’s MSPs: How to transform security operations into genuine cyber resilience. In this episode of The Security Strategist podcast, Jim Waggoner, VP of Product Management at N-able, and Lewis Pope, CISSP and N-able Head Nerd, sit down with host Jonathan Care, the Lead A…
…
continue reading
1
What If We Could Fix Vulnerabilities Faster Than We Find Them?
20:54
20:54
Play later
Play later
Lists
Like
Liked
20:54In the recent episode of The Security Strategist Podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sat down with John Amaral, Co-Founder and CTO of Root. They discussed how automation, AI agents, and a new approach called “Shift Out” are changing vulnerability management. Amaral, who has decades of experience in security leaders…
…
continue reading
1
Responsible AI Starts with Responsible Data: Building Trust at Scale
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00We live in a world where technology moves faster than most organisations can keep up. Every boardroom conversation, every team meeting, even casual watercooler chats now include discussions about AI. But here’s the truth: AI isn’t magic. Its promise is only as strong as the data that powers it. Without trust in your data, AI projects will be built …
…
continue reading
1
The Missing Piece: How Data and AI Impact Management Unlocks Business Value
23:12
23:12
Play later
Play later
Lists
Like
Liked
23:12“What is the true value of our data and AI initiatives?” Too often, we drive all our energy into tools, processes, and outputs, but forget to ask ourselves how what we build actually makes a difference. For enterprises, this means looking beyond AI models and dashboards to see how our data drives real, measurable impact. Understanding the differenc…
…
continue reading
1
Can Identity Security Close the AI Governance Gap?
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29As AI tools proliferate inside enterprises, often faster than security teams can track or govern them, a new class of risks are emerging. In this episode of the Security Strategist Podcast, IT-Harvest Chief Research Analyst Richard Stiennon sits down with Art Gilliland, CEO of Delinea, to discuss the explosive adoption of AI, the rise of shadow AI,…
…
continue reading
1
What Should Contact Centres Do First to Prepare for Agentic AI?
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50As companies rethink how they provide customer experiences (CX), a new form of AI capability, agentic AI, is quickly changing how work is accomplished in contact centres. In the recent episode of the Tech Transformed podcast, Dialpad Lead Product Manager Calvin Hohener sits down with host Jon Arnold, Principal at J Arnold & Associates. They discuss…
…
continue reading
1
The AI-Ready Data Core: Creating the Foundation for Intelligent Systems
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13As AI becomes a central pillar of business decision-making, enterprises face a new challenge, and that is making their data AI-ready. It’s no longer enough to collect and digitise information. For organisations, data must be structured, contextualised, discoverable, and usable—both by humans and intelligent systems. AI can only deliver if your data…
…
continue reading
1
EDR, XDR, or MDR - What’s the Real Difference and Why Does It Matter?
29:52
29:52
Play later
Play later
Lists
Like
Liked
29:52In the recent episode of The Security Strategist podcast, Jim Waggoner, VP of Product Strategy at N-able, and Joe Ferla, one of N-able’s Head Nerds, speak to host Chris Steffen, Vice President of Research at Enterprise Management Associates (EMA). They addressed one of cybersecurity’s biggest misconceptions – while organizations might be getting be…
…
continue reading
1
Breaking Free from Busywork: AI and the Future of Profitable Client Delivery
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Client service teams are at a breaking point. Margins are shrinking, the demand keeps rising, and much of the day is consumed by work that doesn’t move the needle. As a result, skilled people often spend hours reconciling spreadsheets, re-entering the same data across multiple systems, and chasing updates, time that should be spent on the work clie…
…
continue reading
1
How Generative AI is Transforming Customer Experience Today
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24With the rapid evolution of Generative AI, customer experience (CX) is evolving rapidly, too. In a recent episode of the Tech Transformed podcast, Mike Gozzo, Chief Product and Technology Officer at Ada, sat down with host Christina Stathopoulos, Founder of Dare to Data. They talked about how generative AI is changing business-to-customer interacti…
…
continue reading
1
The 3G Sunset Worldwide: How Enterprises Can Avoid Device Disruption
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23The era of 3G is ending. For many industrial businesses, smart infrastructure systems, remote device management, and IoT connectivity rely on networks that are now being phased out globally. The question isn’t if—but when your operations could be disrupted. In this episode of Tech Transformed, Trisha Pillay speaks with Jana Vidis, Business Developm…
…
continue reading
1
Securing Assets in a Complex IT Landscape: Deterministic Automation in ITAM
21:44
21:44
Play later
Play later
Lists
Like
Liked
21:44Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
…
continue reading
1
Why Do Most ‘Full-Stack Observability’ Tools Miss the Network?
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06Tech leaders are often led to believe that they have “full-stack observability.” The MELT framework—metrics, events, logs, and traces—became the industry standard for visibility. However, Robert Cowart, CEO and Co-Founder of ElastiFlow, believes that this MELT framework leaves a critical gap. In the latest episode of the Tech Transformed podcast, h…
…
continue reading
1
How HashiCorp and Red Hat are preparing enterprises for AI at scale
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05Enterprises are discovering that the first wave of cloud adoption didn’t simplify operations. It created flexibility, but it also introduced fragmentation, rising costs, and skills gaps that now make AI adoption harder to manage. In this episode of Tech Transformed, analyst and host Dana Gardner speaks with two leaders from across the IBM portfolio…
…
continue reading
1
How Can Businesses Address Guardrails for Autonomous AI Agents with Permissions?
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
…
continue reading
1
Is Current DLP Failing Data Security in the Age of Generative AI?
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of The Security Strategist Podcast, guest Gidi Cohen, CEO and Co-Founder of Bonfy.AI, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional data los…
…
continue reading
1
From Data Steward to AI Strategist: Redefining the Role of the CDO in the Agentic Era
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14While the role of a chief data officers (CDOs) was traditionally focused on regulatory compliance, it has now expanded to empowering the consistent and effective use of data across organizations to improve business outcomes. One of the most effective ways for CDOs to demonstrate their value is by developing a data strategy that is closely aligned w…
…
continue reading
1
AI-Powered Chip Design: Real World Impact Across Silicon to Systems
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53The semiconductor industry is at an inflection point. As systems become more intelligent, connected, and software-defined, chip design is growing too complex for humans alone. Advances in electronic design automation are reshaping how silicon is built and verified, enabling faster, smarter, and more reliable innovation from data centers to edge dev…
…
continue reading
1
Driving Enterprise Innovation with AI and Strong CI/CD Foundations
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02Driving Enterprise Innovation with AI and Strong CI/CD Foundations As enterprises push to deliver software faster and more efficiently, continuous integration and continuous delivery (CI/CD) pipelines have become central to modern engineering. With increasing complexity in builds, tools, and environments, the challenge is no longer just speed, but …
…
continue reading
1
From Cost-Cutting to Competitive Edge: The Strategic Role of Observability in AI-Driven Business
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48For years, observability sat quietly in the background of enterprise technology, an operational tool for engineers, something to keep the lights on and costs down. As systems became more intelligent and automated, observability has stepped into a far more strategic role. It now acts as the connective tissue between business intent and technical exe…
…
continue reading
1
The Zero Trust Conundrum: How Intelligent Friction Boosts Business Velocity
20:05
20:05
Play later
Play later
Lists
Like
Liked
20:05In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. Redd…
…
continue reading
1
Universal Privileged Access Authorization: Securing Humans, Machines, and Agentic AI
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30Can your organization truly trust every identity, human, machine, and AI? The traditional security perimeter is no longer a reliable boundary. As enterprises adopt hybrid infrastructures, cloud services, and autonomous AI systems, identity has emerged as the central element of effective cybersecurity. In the latest episode of The Security Strategis…
…
continue reading
1
How Can MSPs Stay Competitive with Managed Detection and Response (MDR)?
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27In today’s cybersecurity industry, Managed Service Providers (MSPs) who do not adapt risk falling behind. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, talks with Stefanie Hammond, Head Nerd at N-able, and Jim Waggoner, Vice President of Product Management at N-able. They disc…
…
continue reading
1
Can AI Tools Actually Prevent Burnout — or Are They Making It Worse?
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10““Without healthy employees, you don’t have healthy customers. And without healthy customers, you don’t have a healthy bottom line.” — Kate Visconti, Founder and CEO, Five to Flow. While artificial intelligence (AI) has hastened development and made enterprises more efficient, it also comes with more deadlines. The deadlines often merge into after-…
…
continue reading
1
Is Your Financial Reporting Ready for the Future?
19:45
19:45
Play later
Play later
Lists
Like
Liked
19:45The challenge all organisations, big and small, face is answering and implementing solutions to solve this key question: How can finance and accounting teams work faster, smarter and more accurately? In the recent episode of the Don’t Panic It’s Just Data podcast, host Scott Taylor, The Data Whisperer and Principal Consultant at MetaMeta Consulting…
…
continue reading
1
Beyond the Hyperscalers: Building Cyber Resilience on Independent Infrastructure
23:05
23:05
Play later
Play later
Lists
Like
Liked
23:05“Cyber resilience isn’t just about protection, it’s about preparation.” Every business in this day and age lives in the cloud. Our operations, data, and collaboration tools are powered by servers located invisibly around the world. But here’s the question we often overlook: what happens when the cloud falters? In this episode of Tech Transformed, T…
…
continue reading
1
How enterprises can enable the Agentic AI Lakehouse on Apache Iceberg
14:34
14:34
Play later
Play later
Lists
Like
Liked
14:34"A flaw of warehouses is that you need to move all your data into them so you can keep it going, and for a lot of organisations that's a big hassle,” says Will Martin, EMEA Evangelist at Dremio. “It can take a long time, it can be expensive, and you ultimately can end up ripping up processes that are there." In this episode of the Don’t Panic It’s …
…
continue reading
1
Are Your Keys Safe? Why HSMs Are Now Essential for Cloud, Quantum, and AI Security
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19"You have to think about how the online world really operates and how we make sure that data is secure. How can we trust each other in the digital world?" Robert Rogenmoser, the CEO of Securosys, asks. The answer is "encryption and digital signature." According to Robert Rogenmoser, the CEO of Securosys, storing keys insecurely creates immediate ri…
…
continue reading
1
How are 5G and Edge Computing Powering the Future of Private Networks?
25:02
25:02
Play later
Play later
Lists
Like
Liked
25:02"5G is becoming a great enabler for industries, enterprises, in-building connectivity and a variety of use cases, because now we can provide both the lowest latency and the highest bandwidth possible,” states Ganesh Shenbagaraman, Radisys Head of Standards, Regulatory Affairs & Ecosystems. In the recent episode of the Tech Transformed podcast, Shub…
…
continue reading