EM360 public
[search 0]
More
Download the App!
show episodes
 
In cybersecurity, every move is critical. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We explore the latest trends and threats in cybersecurity, providing insights on how to protect your organisation effectively. Our discussions, featuring thought leaders and pioneering organisations, cover the most pressing issues businesses face today. Tune in as we dissect major threats, explore emergi ...
  continue reading
 
This podcast is your go-to source for all things AI and emerging technologies. We explore how tech is shaping the future of business and share best practices for implementing these innovations. With expert interviews, in-depth analysis, and practical advice, you'll stay ahead of the curve and make informed decisions for your enterprise. Join us to debunk myths, dive into the latest trends, and cut through the AI noise with “Tech Transformed.” Tune in and transform your understanding of techn ...
  continue reading
 
Making the most out of your data can feel overwhelming. Not only do many businesses have more data than they know what to do with, but they also often struggle to gain insights from some of the most valuable data in their possession, leading to many of their crucial data assets going unused. Whether it's issues with data quality, visualization, or management, getting lost in the sea of enterprise data at your possession can make it impossible to make smart, data-driven decisions that improve ...
  continue reading
 
Loading …
show series
 
Safe Software’s FME is transforming Omaha’s approach to urban mobility with groundbreaking solutions for asset management, e-scooter tracking, and parking management. FME’s robust data integration capabilities are at the core of Omaha’s advancements. The data integration platform enables real-time tracking of e-scooters, offering precise data on th…
  continue reading
 
As AI technologies become more integrated into business operations, they bring opportunities and challenges. AI’s ability to process vast amounts of data can enhance decision-making but also raise concerns about data privacy, security, and regulatory compliance. Ensuring that AI-driven systems adhere to data protection laws, such as GDPR and CCPA, …
  continue reading
 
As organisations increasingly migrate to cloud environments, they face a critical challenge: ensuring the security and privacy of their data. Cloud technologies offer many benefits, including scalability, cost savings, and flexibility. However, they also introduce new risks, such as potential data breaches, unauthorised access, and compliance issue…
  continue reading
 
Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evolve, these industries face growing challenges in identifying, disrupting, and preventing their activities. According to Sumsub internal research, every 100th user was involved in fraudulent networks in …
  continue reading
 
New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks and Gen-AI. These advanced AI models, while powerful, are vulnerable to a range of attacks, including adversarial manipulation, data poisoning, and model inversion, where attackers can reverse-engineer …
  continue reading
 
Managed Service Providers (MSPs) are evolving beyond traditional IT support, becoming strategic partners in driving business growth. By embracing AI technologies, MSPs are improving operational efficiency, streamlining service delivery, and offering smarter solutions to meet modern challenges. As businesses navigate digital transformation, MSPs are…
  continue reading
 
Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access. Infinipoint addresses these vulnerabilities by offering one-click remediation for device security posture checks. This innovative solution ensures that only devices meeting strict security standards can access c…
  continue reading
 
Trusted AI ensures that people, data, and AI systems work together transparently to create real value. This requires a focus on performance, innovation, and cost-effectiveness, all while maintaining transparency. However, challenges such as misaligned business strategies and data readiness can undermine trust in AI systems. To build trusted AI, it’…
  continue reading
 
Balancing transparency in AI systems with the need to protect sensitive data is crucial. Transparency helps build trust, ensures fairness, and meets regulatory requirements. However, it also poses challenges, such as the risk of exposing sensitive information, increasing security vulnerabilities, and navigating privacy concerns. In this episode, Pa…
  continue reading
 
As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up with the increasingly sophisticated threats targeting critical networks in sectors like utilities and finance. To address these challenges, there is a pressing need for a new approach to Internet secu…
  continue reading
 
Open source technologies are transforming how businesses manage real-time data on cloud platforms. By leveraging flexible, scalable, and cost-effective open-source tools, organisations can process and analyse large volumes of data with speed and precision. These technologies offer unmatched transparency, customisation, and community-driven innovati…
  continue reading
 
As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the complexity of modern infrastructures and cyber threats. Traditional security measures often fail to identify and respond to sophisticated cloud-based attack…
  continue reading
 
As organisations adopt AI, data literacy has become more critical than ever. Understanding data—how it's collected, analysed, and used—is the foundation for leveraging AI effectively. Without strong data literacy, businesses risk making misguided decisions, misinterpreting AI outputs, and missing out on AI’s transformative benefits. By fostering a …
  continue reading
 
Big Data LDN 2024, the UK’s leading data, analytics, and AI event, is less than a week away – promising two days filled with ground-breaking stories, expert insights, and endless innovation. Taking place at the Kensington Olympia in London on September 18-19, this year’s event features fifteen theatres and over 300 expert speakers sharing insights …
  continue reading
 
Data labelling is a critical step in developing AI models, providing the foundation for accurate predictions and smart decision-making. Labelled data helps machine learning algorithms understand input data by assigning meaningful tags to raw data—such as images, text, or audio—ensuring that AI models can recognise patterns and make informed decisio…
  continue reading
 
Critical Start's Managed Detection and Response (MDR) service is designed to provide 24x7x365 monitoring, human-driven threat investigation, and flexible deployment across IT and OT environments. By leveraging deep technical expertise, robust API integrations, and contractual SLAs, they offer comprehensive protection against evolving cyber thre…
  continue reading
 
Traditional KYC processes are inadequate against modern fraud tactics. While KYC helps with initial identity checks, it doesn't cover evolving threats like AI-generated deepfakes or ongoing account takeovers. Curious about how to protect your business from the latest threats like fake IDs, account takeovers, and AI-generated deep fakes? Tune in to …
  continue reading
 
Sustainable sourcing is essential for businesses committed to environmental and social responsibility, but achieving it requires accurate and reliable data. Master Data Management (MDM) ensures that all sourcing data—such as supplier information, certifications, and compliance records—is consistent and up-to-date. This enables organisations to make…
  continue reading
 
AI is revolutionising contact centres by automating routine tasks, reducing response times, and enhancing customer experience. AI is built to handle simple inquiries efficiently and at scale. It helps contact centres close the gap between customer expectations and conventional customer service by enabling engagement through digital channels. AI-dri…
  continue reading
 
Data provenance is essential for maintaining trust and integrity in data management. It involves tracking the origin of data and understanding how it has been processed and handled over time. By focusing on fundamental principles such as identity, timestamps, and the content of the data, organisations can ensure that their data remains accurate, co…
  continue reading
 
When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies? In this episode of the EM360 Podcast, Chris Steffen, EMA's Vi…
  continue reading
 
FME is a vital tool in disaster management and response. It enables the integration and transformation of geospatial data for real-time tracking of disasters and hazards. By ensuring accurate and timely data analysis, it provides essential decision support for disaster management professionals. During the Maui wildfires, FME and the Pacific Disaste…
  continue reading
 
Join us in this exciting episode of Tech Transformed, where we talk to Kelly Vero, a pioneering game developer, digital leader, and visionary in the metaverse. With a career spanning 30 years and a resume that includes contributions to legendary franchises like Tomb Raider and Halo 3, Kelly brings a wealth of knowledge and experience to the table. …
  continue reading
 
Open source real-time analytics offers unparalleled advantages, providing businesses with freedom and independence to maintain operations seamlessly, even if a vendor issue arises. However, the journey isn't without its challenges. Open source solutions can often be clunky and require specialised expertise to manage effectively. This is where Doubl…
  continue reading
 
Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats. Embrace a dynamic approach to security that adapts to …
  continue reading
 
In the post-pandemic world, relying solely on perimeter-based identity security is no longer sufficient. Increased cloud adoption, expanded access permissions, and the complexities of modern cloud environments have exposed vulnerabilities that traditional methods can't address. Issues like VPN weaknesses and inadequate security controls highlight t…
  continue reading
 
Privacy by Default and Design is a fundamental principle of the General Data Protection Regulation (GDPR). It prioritises transparency, user control, and data security from the outset. This approach ensures that privacy is integrated into systems and processes by default rather than as an afterthought. By embedding these practices, organisations en…
  continue reading
 
Zero Trust architecture is a modern security approach that enhances protection by focusing on network segmentation and granular access control, moving away from traditional perimeter defences. This model helps prevent breaches and limits the spread of threats within a network. While transitioning to Zero Trust can be challenging, it can be implemen…
  continue reading
 
Traditional manual testing done once a year to meet your compliance requirements is no longer sufficient. The threat landscape is changing at lightning speed, and your defenses need to keep up. That’s where automated network testing comes in! It’s like having a tactical SWAT team on standby, ready to spot exploitable vulnerabilities and provide you…
  continue reading
 
Safe Software's Feature Manipulation Engine (FME) plays a pivotal role in the City of Fremont's operations, particularly in ensuring accurate and efficient data submissions under the Racial and Identity Profiling Act (RIPA). By automating complex workflows and enhancing data quality, FME not only ensures seamless compliance with RIPA requirements b…
  continue reading
 
Loading …

Quick Reference Guide