Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
EM360Tech Podcasts
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
…
continue reading
Turn data overwhelm into data-driven success. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make the most of your organization's data.
…
continue reading

1
Why Are 94% of CISOs Worried About AI, and Is Zero Trust the Only Answer?
15:50
15:50
Play later
Play later
Lists
Like
Liked
15:50Identity fabric, a contemporary, flexible identity and access management (IAM) architecture, should “be involved at every stage of authentication and authorisation,” says Stephen McDermid, CSO, EMEA at Okta Security. According to CISCO’s VP, 94 per cent of CISOs believe that complexity in identity infrastructure decreases their overall security. In…
…
continue reading

1
Fast, Safe, and Automated: Bridging DevOps and SecOps in the Age of Engineering Excellence
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24Enterprises can no longer afford the old trade-off between speed and safety. Developers are under constant pressure to release code faster. At the same time, security teams face an endless stream of new threats. The middle ground is clear, and that is software must be secure and resilient from the start, without slowing innovation. This is the phil…
…
continue reading

1
What Does the Rise of Agentic AI Mean for Traditional Security Models?
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04In an era of AI, it’s no longer a question of whether we should use it, but instead, we need to understand how it should be used effectively, conveys Sam Curry, the Chief Information Security Officer (CISO) at Zscaler. He believes that the growth of agentic AI is not meant to replace human security teams; rather, it aims to improve the industry as …
…
continue reading

1
AI-Powered Canvases: The Future of Visual Collaboration and Innovation
19:11
19:11
Play later
Play later
Lists
Like
Liked
19:11AI-Powered Canvases: The Future of Visual Collaboration and Innovation As hybrid and remote work become the standard, organizations are rethinking how teams brainstorm, align, and innovate. Traditional whiteboards and digital tools often fall short in keeping pace with today’s complex business challenges. This is where AI-powered canvases are trans…
…
continue reading

1
Container Security Uncovered: Lessons from NIST SP 800-190
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10It has been eight years since the NIST Special Publication 800-190: Application Container Security Guide was published, and its recommendations remain central to container security today. As cloud-native applications have become the foundation of modern enterprise IT, securing containers has shifted from an afterthought to a critical priority. In t…
…
continue reading
AI is rapidly changing how cybercriminals operate. Social engineering, once easy to spot, has entered a new era. Phishing emails that used to be riddled with spelling mistakes and clumsy language are now polished, persuasive, and tailored using data scraped from social media and other online sources. The result? Messages that look legitimate enough…
…
continue reading

1
How to Build a Secure Development Workflow in an Era of AI?
15:10
15:10
Play later
Play later
Lists
Like
Liked
15:10"What we're seeing as a response to coding agents is one of the biggest risks in security vulnerabilities to date,” said Jaime Jorge, Founder and CEO of Codacy. “It's almost like a game to see how fast we can exploit vulnerabilities in some of these applications that are created so quickly." In this episode of The Security Strategist Podcast, Richa…
…
continue reading

1
Setting Up for Success: Why Enterprises Need to Harness Real-Time AI to Ensure Survival
19:09
19:09
Play later
Play later
Lists
Like
Liked
19:09The issue is data fragmentation, where untrustworthy data is siloed across different databases, SaaS applications, warehouses, and on-premise systems,” Vladimir Jandreski, Chief Product Officer at Ververica, tells Christina Stathopoulos, the Founder of Dare to Data. “Simply, there is no single view of the truth that exists. With governance and data…
…
continue reading

1
How Can AI Bridge the Gap from Observability to Understandability?
29:15
29:15
Play later
Play later
Lists
Like
Liked
29:15"The tools we make are observability tools today. But it can never be the goal of our business to provide observability. The goal of our business as a vendor and as a partner with our customers is to give them understandability,” stated Nic Benders, the Chief Technical Strategist at New Relic. In this episode of the Don't Panic It's Just Data podca…
…
continue reading

1
How Do You Stop an Encrypted DDoS Attack? How to Overcome HTTPS Challenges
18:29
18:29
Play later
Play later
Lists
Like
Liked
18:29"When you're encrypting the traffic and giving the keys only to the owner of the traffic, it provides a specific door for attackers to walk right in,” stated Eva Abergel, the Senior Solution Expert at Radware. In this episode of The Security Strategist Podcast, Richard Stiennon, the Chief Research Analyst at IT-Harvest, an author and a trusted cybe…
…
continue reading

1
Not just Chatbots: What AI Agents Really Mean for Enterprises
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19The phrase “AI agent” still brings to mind chatbots handling customer queries. Fast forward to today - AI agents are far more versatile, representing a new generation of systems capable of perceiving, reasoning, and acting autonomously. These bots are beginning to reshape how enterprises operate, not just in customer service but across software dev…
…
continue reading

1
Data Experts Question: Is Data Infrastructure Ready for Responsible AI?
36:39
36:39
Play later
Play later
Lists
Like
Liked
36:39Welcome back to Meeting of the Minds, a special podcast episode series by EM360Tech, where we talk about the future of tech. In this Big Data special episode of the Meeting of the Minds, our expert panel – Ravit Jain, Podcast host, Christina Stathopoulos of Dare to Data and a data and AI evangelist, Wayne Eckerson, data strategy consultant and pres…
…
continue reading

1
Preemptive Defense with AI-powered Deception: Outsmarting the AI-driven Adversary
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35“For a long time, we focused on defending the perimeter and thought that was enough to keep businesses safe,” stated Ram Varadarajan, CEO and Co-founder of Acalvio. “It’s like putting locks on doors. The problem is that more people are finding ways to cross those boundaries and enter your business at an alarming rate.” In the recent episode of The …
…
continue reading

1
Phishing-Resistant Authentication: A Strategic Imperative for CISOs
25:45
25:45
Play later
Play later
Lists
Like
Liked
25:45Passwords remain one of the weakest links in enterprise security. Despite advances in multi-factor authentication (MFA), recent data breaches show that attackers continue to bypass traditional protections. In this episode of The Security Strategist, host Trisha Pillay speaks with Nic Sarginson, senior solutions engineer at Yubico. Together, they ex…
…
continue reading

1
How RAG and Graph RAG Take Generative AI to the Next Level
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20Generative AI has captured global attention, powering everything from chatbots to intelligent assistants. Yet in the enterprise, its promise often hits a dead end. According to Gartner, 80 per cent of enterprise data remains unused or “dark,” because conventional AI struggles to interpret complex, domain-specific information. In this episode of the…
…
continue reading

1
Is Your Workforce Ready for AI-Driven Cyber Threats?
17:50
17:50
Play later
Play later
Lists
Like
Liked
17:50"With every technological wave, technology weaponises very quickly. You can create targeted attacks at an unprecedented scale, a human-centric attack at a scale that's never been before humanly possible,” states Sage Wohns, CEO and Founder of Jericho Security. In this episode of The Security Strategist podcast, host Richard Stiennon, Chief Research…
…
continue reading

1
How to Prepare Your Team for Edge Computing?
23:38
23:38
Play later
Play later
Lists
Like
Liked
23:38In a time when the world is run by data and real-time actions, edge computing is quickly becoming a must-have in enterprise technology. In the recent episode of the Tech Transformed podcast, hosted by Shubhangi Dua, a Podcast Producer and B2B Tech Journalist, discusses the complexities of this distributed future with guest Dmitry Panenkov, Founder …
…
continue reading

1
Winning with Data: Inclusion, Innovation and Community at Big Data LDN
20:55
20:55
Play later
Play later
Lists
Like
Liked
20:55Inclusivity and accessibility remain some of the biggest challenges for data events. True inclusion is not the result of a single initiative, but continuous effort, honest reflection, and a willingness to listen to the community. At Big Data LDN, these values are rooted in the event’s mission. By highlighting both established leaders and emerging v…
…
continue reading

1
The 10-Year Journey: AI Madness, Data Governance, and the Future of Big Data
34:31
34:31
Play later
Play later
Lists
Like
Liked
34:31Big Data LDN (BDL), the ultimate data event of the year, celebrates its 10th anniversary this year. This year’s event is scheduled to take place on September 24 and 25, with a brand-new deep-dive conference held on September 23. In this episode of the Don't Panic, It's Just Data podcast, host Shubhangi Dua, Podcast Producer and B2B Tech Journalist …
…
continue reading

1
How Can Manufacturers Solve the Mass Customisation Problem?
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17"The real challenge that many manufacturers have dealt with for a long time and will keep facing is the shift from mass manufacturing to mass customisation," stated Daniel Joseph Barry, VP of Product Marketing at Configit. In a world that has moved from mass manufacturing to mass customisation, makers of complex products like cars and medical devic…
…
continue reading

1
How Enterprises Can Leverage IoT and AI to Improve Efficiency and Sustainability
25:04
25:04
Play later
Play later
Lists
Like
Liked
25:04As global industries face mounting pressure to operate more efficiently and sustainably, many are turning to the combined power of artificial intelligence (AI) and the Internet of Things (IoT). From optimising energy usage to enabling real-time decision-making, these technologies are reshaping how businesses think about infrastructure, impact, and …
…
continue reading

1
From Elasticsearch to Leading Edge: Vinted’s Journey to Data Modernisation
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21In this episode of the Don't Panic, It's Just Data podcast, Kevin Petrie, VP of Research at BARC and the podcast host, is joined by Dainius Jocas, Search Engineer at Vinted, and Radu Gheorghe, Software Engineer at Vespa.ai. They discuss how Vinted, an online marketplace for secondhand products, modernised its data architecture to address new AI sea…
…
continue reading

1
Why Data Strategy Fails Without Data and AI Literacy
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Many companies spend a lot on data technology, but often forget about the importance of data and AI literacy. Without the right skills, even the best platforms can fail to deliver results. Teams need to understand how to work with data and AI to make any strategy successful. In this episode of Tech Transformed, EM360Tech’s Trisha Pillay chats with …
…
continue reading

1
What Does the Future of CX Look Like with Agentic AI?
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17"As agentic AI spreads across industries,” states Rishi Rana, the Chief Executive Officer at Cyara. “Everybody is curious to understand how that is going to transform customer experience across all the channels?" In this episode of the Tech Transformed podcast, Shubhangi Dua, the Host and Podcast Producer at EM360Tech, talks with Rishi Rana, the CE…
…
continue reading

1
Developer Productivity 5X to 10X: Is Durable Execution the Answer to AI Orchestration Challenges?
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18"If you are not using it and don't understand it, you are losing big time because you reinvent that wheel of durable execution yourself, and it's hard," reasons Maxim Fateev, Co-Founder and CTO of Temporal Technologies. In a recent episode of the Tech Transformed podcast, Fateev explored the concept of durable execution. This approach not only impr…
…
continue reading

1
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything. "Think of Hardware Security Modules (HSMs) like a master vault in a bank for an entire organization's digital security," said David Close, Chief Solutions Architect at Futurex. More than just an analogy, this i…
…
continue reading

1
Struggling with ERP Data? How to Get Real-Time Reporting in Excel
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30In this episode of the Don't Panic It's Just Data podcast, Christina Stathopoulos talks with Miller and Michael Wiley, Sr. Product Manager of Spreadsheet Server. They discuss the challenges and solutions in financial reporting, focusing on real-time reporting from ERP systems to Excel. The discussion covers the current state of financial reporting,…
…
continue reading

1
How Can Global Marketplaces Master Payment Security and Combat Fraud?
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is always a human being,” Bartosz Skwarczek, Founder & President at G2A Capital Group, reflectively said. The quote sets the tone of the recent episode of The Security Strategist podcast. In this episode, Sh…
…
continue reading

1
What is AI Hyper-Personalisation in CX and Why Does it Matter?
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11"Customers are now expecting highly personalised, seamless, and efficient interactions across all the touch points,” stated Rahul Sareen, the Senior Leader–Cross Industry, Private Equity and Startups Solutions at Amazon Web Services (AWS). Sareen’s statement represents the state of customer experience (CX) today. It’s a demand that is forcing busin…
…
continue reading

1
Why an Agentic Data Management Platform is the Next Generation Data Stack
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35Enterprise data management is undergoing a fundamental transformation. The traditional data stack built on rigid pipelines, static workflows, and human-led interventions is reaching its breaking point. As data volume, velocity, and variety continue to explode, a new approach is taking shape: agentic data management. In this episode of Tech Transfor…
…
continue reading

1
Are AI Agents the Future of Developer Productivity in the Enterprise?
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15"There's a lot of hype with the AI agents and their productivity and potential outcomes. AI Agents are quite amazing, says Eric Paulsen, EMEA Field CTO at Coder. In this episode of the Tech Transformed podcast, Shubhangi Dua, Podcast Host and Producer at EM360Tech, talks to Paulsen about the constantly advancing role of AI agents in development env…
…
continue reading