Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
EM360Tech public
[search 0]
Download the App!
show episodes
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork
 
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
  continue reading
 
Loading …
show series
 
Are you a CIO, CTO, CISO, or IT decision maker in the restaurant or retail industry, grappling with rising costs and tariffs to keep up with the rapid pace of technological change? The pressure to create high-quality solutions with AI while managing existing infrastructure can be challenging. In this episode of the Tech Transformed Podcast, Shubhan…
  continue reading
 
The ability to effectively manage and optimise data is key in an organisation today. But with the sheer volume and complexity of enterprise data, traditional methods are struggling to keep up with the change. This is where the agentic AI approach has swooped in to transform how organisations handle their most valuable resource. "The promise of AI a…
  continue reading
 
Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
  continue reading
 
Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
  continue reading
 
Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
  continue reading
 
Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
  continue reading
 
“Before starting a new AI project, it is really worthwhile defining the business priority first,” asserts Joanna Hodgson, the UK and Ireland regional leader at Red Hat. “What specific problem are you trying to solve with AI? Do we need a general purpose AI application or would a more focused model be better? How will we manage security, compliance …
  continue reading
 
Takeaways #Satellitecommunications are essential for remote field teams. They provide safety and tracking for workers in isolated areas. Disaster preparedness involves proactive planning and communication. User-friendly #technology is crucial for effective utilisation. Reliable communication impacts day-to-day operations positively. Employers show …
  continue reading
 
"Having the insight and being able to stitch together your technical resources and business decisions together, is the prime place where observability can add value to you,” stated Manesh Tailor, EMEA Field CTO at New Relic. In this episode of the Tech Transformed podcast, Kevin Petrie, Vice President of Research at BARC, speaks with Manesh Tailor …
  continue reading
 
"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
  continue reading
 
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
  continue reading
 
Takeaways #AIagents are #autonomous entities that can perceive and act. Human oversight is essential in the initial stages of AI implementation. Data quality and trust are critical for effective AI agents. Guardrails must be integrated into the design of AI agents. Modularity in design allows for flexibility and adaptability. #AI should be embedded…
  continue reading
 
In this episode of the Don't Panic, It's Just Data podcast, hosted by EM360Tech's podcast producer, Shubhangi Dua speaks to Donnie Owsley from Snohomish County, and Jeff Burton and Tom Lavery from the University of British Columbia. All of the speakers will be presenting at the upcoming Peak of Data and AI event, organised by Safe Software, the cre…
  continue reading
 
"If AI has proven anything, it will change pretty rapidly. Understanding its limitations and not asking too much of it is significant. What’s successful is prototyping tools," said Rob Whiteley, CEO of Coder. "Such tools where AI can create an application, while not the world's most graceful code but will get you to working prototype pretty quickly…
  continue reading
 
Takeaways #Peacetimesecurity is no longer sufficient in modern cloud environments. AI and automation are essential for effective security management. Real-time security platforms can prevent breaches before they occur. Integrating security into the development process is crucial for success. Key metrics include mean time to detect and remediate vul…
  continue reading
 
Remote Monitoring and Management (RMM) solutions are quite ambitious, promising to identify the issues before they have a chance to impact your IT operations. “A good RMM offers a combination of tools for you to do this properly,” stated Elias Moura, the Head of Product Marketing at Pulseway. “You have automation to enable auto-remediation, built-i…
  continue reading
 
Takeaways #Financeteams are often resistant to change, clinging to outdated tools. Real-time data integration can help break down data silos and better decision-making. The shift from FP&A to XP&A emphasises collaboration across departments. #Datagovernance is crucial when handling financial data. Real-time data enables more accurate forecasting an…
  continue reading
 
Takeaways #Customersuccess is about helping customers get value from products. The perception of customer success is shifting from a cost centre to a revenue generator. #AI can enhance customer success by providing predictive insights and automating processes. Customer success teams are uniquely positioned to identify upsell and cross-sell opportun…
  continue reading
 
Application Programming Interface (API) is one of the most critical components of software applications which mediates communication between different applications and exchanges permissible data. APIs, as a fundamental integrant of software, are acutely important to secure, as vulnerabilities can be exploited by threat actors. “When it comes to API…
  continue reading
 
Takeaways #AgenticAI systems can string tasks together for efficiency. Real-world applications include supply chain optimisation and knowledge worker augmentation. #Dataquality is crucial for effective AI implementation. Education and understanding of AI's potential are essential for organisations. Governance is key to ethical AI deployment. Leader…
  continue reading
 
"So you want trusted data, but you want it now? Building this trust really starts with transparency and collaboration. It's not just technology. It's about creating a single governed view of data that is consistent no matter who accesses it, " says Errol Rodericks, Director of Product Marketing at Denodo. In this episode of the 'Don't Panic, It's J…
  continue reading
 
Takeaways #CMDM is essential for creating a unified and accurate view of the customer. Trust comes from how responsibly data is handled. Ethical data use is a competitive advantage and builds trust. Executive sponsorship and cross team buy-in is crucial for MDM projects. A strong customer #datastrategy is a competitive edge, not a side project. Sum…
  continue reading
 
In the latest episode of the Don’t Panic It’s Just Data podcast, we connected with speakers who provided a preview of their presentations at the upcoming Peak of Data and AI event in Seattle organised by Safe Software from May 5-8, 2025. This premier gathering, hosted by Safe Software, the creators of FME, will be a hub for data and AI innovators, …
  continue reading
 
From the integrities of the human workforce embracing enhancing soft skills over hard skills in the enterprise tech space to the adoption of artificial intelligence (AI) agents in customer service, this conversation covers it all. In this episode of the Tech Transformed podcast, Shubhangi Dua speaks with Nikhil Nandagopal, co-founder and CPO of App…
  continue reading
 
"There's been a lot of wrangling of data, a lot of wrangling of humans as well, which is a big theme for today," says Warwick Leitch, Product Management Director at insightsoftware. In this episode of the 'Don't Panic, It's Just Data' podcast, Debbie Reynolds, CEO and Chief Data Privacy Officer at Debbie Reynolds Consulting LLC, speaks with Leitch …
  continue reading
 
In this episode of the Security Strategist podcast, Chris Steffen speaks with Sudhir Reddy, the CTO of Esper, about the imperative balance between security and user experience in dedicated devices. They discuss the unique challenges of securing these devices, the role of Mobile Device Management (MDM), compliance issues, and practical steps enterpr…
  continue reading
 
Welcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. The…
  continue reading
 
Andrea Cullen discusses her extensive experience in cybersecurity, focusing on the gender imbalance and cultural stereotypes that have historically dominated the field. She emphasizes the importance of diversity and mentorship in fostering innovation and problem-solving within cybersecurity teams. Andrea advocates for a more inclusive approach to r…
  continue reading
 
“Continuous threat exposure management is the new phrase for what we used to call vulnerability management programs," said J.J. Guy, CEO and Co-Founder of Sevco Security. In this episode of The Security Strategist podcast, Richard Stiennon, Founder and Chief Analyst at IT-Harvest speaks with Guy about the evolution of vulnerability management into …
  continue reading
 
In this episode of the Tech Transformed Podcast, Jon Arnold, Principal of J Arnold Associates speaks with Nikola Mrksic, CEO of PolyAI, discussing all things AI, specifically in contact centres. From the benefits of automation to the emergence of the most trending subject of the year – Agentic AI. Mrksic particularly spotlights some underutilised c…
  continue reading
 
The digital age is fueled by data, and the engines powering that data are data centres. However, this growth comes at a significant energy cost. In the latest episode of the EM360Tech Don’t Panic It’s Just Data podcast, Shubhangi Dua speaks with Rolf Bienert, Technical & Managing Director of the OpenADR Alliance, to shed light on the urgent need fo…
  continue reading
 
The world is changing faster than ever. Businesses are drowning in data, yet struggling to extract the insights they need to stay ahead. Artificial intelligence (AI) holds the key, but traditional AI models are too slow, too static, and too disconnected from the real world. This is where real-time AI comes in. Real-time AI empowers businesses to ma…
  continue reading
 
Loading …
Listen to this show while you explore
Play