EM360 public
[search 0]
More
Download the App!
show episodes
 
A weekly show hosted by Matt Harris, Head of Content at EM360, exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
  continue reading
 
In today’s rapidly-changing technological environment, data offers new ways for business to improve or even completely transform business models. But with this rapid change, it’s difficult to separate hype from reality and determine what practical steps can show value in real-world implementations. In this podcast series, we set out to ask, how is Data transforming business? Expect to hear opinions from leading tech vendors and the people who rely on data for day-to-day business such as Barc ...
  continue reading
 
In this EM360 podcast, we investigate the cutting edge Cybersecurity issues that organisations are facing today. These discussions are led by the organisations at the forefront of defence as they walk us through the issues people are facing and how to effectively implement prevention strategies.
  continue reading
 
Loading …
show series
 
Today, small businesses face significant challenges. Limited resources, tight budgets, time constraints, and inadequate training often leave them vulnerable. Hackers quickly exploit these weaknesses, targeting small and medium-sized businesses (SMBs) with sophisticated threats. Managed Service Providers (MSPs) are tasked with the daunting responsib…
  continue reading
 
The 2024 Attack Intelligence Report thoroughly analyses the latest trends, tactics, and techniques used by cyber adversaries. This year's report highlights a significant increase in sophisticated attacks, including advanced persistent threats (APTs) and highly targeted ransomware campaigns. By leveraging the MITRE ATT&CK framework, the report offer…
  continue reading
 
As artificial intelligence (AI) becomes increasingly integral to business operations, enterprises face new risks from Shadow AI—unauthorised or unmanaged AI tools and projects that bypass standard security protocols. The potential consequences of Shadow AI are severe, introducing vulnerabilities, compromising data integrity, and leading to complian…
  continue reading
 
Security Operations Center (SOC) analysts are the backbone of organisations' defence against cyber threats. However, the high-pressure environment, constant vigilance, and demanding workload can lead to serious burnout. This condition not only hampers analysts' performance and job satisfaction but also poses a threat to overall security. Organisati…
  continue reading
 
Managing large volumes of data in the context of AI and machine learning applications presents challenges related to data quality, data preparation, and automation. The requirements of data management are changing with the advent of generative AI, requiring more flexibility and the ability to handle larger volumes of data. Pimcore leverages AI and …
  continue reading
 
The most dangerous cyber attacks today have one thing in common: they target humans rather than systems. Social engineering has been a prevalent tactic for years, with a known $51B in exposed losses over the last decade. Unfortunately, these numbers will continue to rise with the proliferation of AI, and your email inboxes are your most likely targ…
  continue reading
 
Maximising data relationships through text analytics, particularly with tools like LLMS and Knowledge Graphs, offers organisations unprecedented insights and capabilities. By leveraging these advanced technologies, businesses can unlock hidden connections and patterns within their data, leading to more informed decision-making and strategic plannin…
  continue reading
 
Hackers use AI tools like ChatGPT to enhance their operations and manipulate large language models. They infiltrate and attack GPT by manipulating the knowledge base through coordinated bot activity. These sophisticated cybercriminals are not just using AI tools, they are leveraging them to streamline their attacks. By exploiting the model's natura…
  continue reading
 
The trend of platformization in the Security Operations Centre (SOC) is a game-changer in the cybersecurity landscape. It offers a holistic approach to managing and mitigating security threats. By consolidating various security tools, processes, and data sources into a unified platform, organizations can streamline operations, reduce complexity, an…
  continue reading
 
Infosecurity Europe is a cornerstone event in the cybersecurity industry. It brings together a diverse array of cybersecurity services and professionals for three days of unparalleled learning, exploration, and networking. At its essence, the event is committed to delivering indispensable value to its attendees through meticulously crafted themes a…
  continue reading
 
The alarming rate of violence against healthcare workers underscores the urgent need for comprehensive security measures within medical facilities. As incidents continue to rise, it's imperative that proactive strategies are employed to safeguard the well-being of patients, visitors and staff. In this episode of the EM360 Podcast, Paulina Rios Maya…
  continue reading
 
GenAI has revolutionized the landscape of information security. Once reserved for experts and Ph. D.s, it is now accessible to a broader spectrum of practitioners and engineers. Its applications span from summarising data to tailoring reports, amplifying incident response, and profiling user behaviours. By harnessing the power of generative AI, sec…
  continue reading
 
Managing cloud computing costs is a pressing challenge faced by organisations of all sizes across industries. As businesses increasingly migrate their operations to the cloud, the complexity of managing and optimizing costs grows exponentially. Without proper oversight and strategy, cloud expenses can quickly spiral out of control, leading to budge…
  continue reading
 
Ensuring the reliability and effectiveness of AI systems remains a significant challenge. Generative AI must be combined with access to your company data in most use cases, a process called retrieval-augmented generation (RAG). The results from GenerativeAI are vastly improved when the model is enhanced with contextual data from your organization. …
  continue reading
 
Geographic Information Systems (GIS) have transformed urban landscape analysis and government policy creation, albeit not without challenges. In the past, GIS analysts often visited locations to piece together information physically. With the help of cutting-edge platforms like Safe Software’s FME, cities like Burnaby, British Columbia, have revolu…
  continue reading
 
Government organisations face a multitude of challenges when it comes to managing their data effectively. From interoperability issues between systems to the need for seamless collaboration across agencies, the complexity can be overwhelming. Safe Software's FME platform offers a comprehensive solution to these challenges by providing a flexible an…
  continue reading
 
The sheer volume and diversity of data available to organisations today offer numerous opportunities for innovation, efficiency gains, and informed decision-making. However, this abundance of data also brings with it formidable challenges, particularly concerning privacy, security, and ethical considerations. Data is often described as new oil, so …
  continue reading
 
Ever wonder how search engines understand the difference between "apple," the fruit, and the tech company? It's all thanks to knowledge graphs! These robust and scalable databases map real-world entities and link them together based on their relationships. Imagine a giant web of information where everything is connected and easy to find. Knowledge …
  continue reading
 
Ever wonder how search engines understand the difference between "apple," the fruit, and the tech company? It's all thanks to knowledge graphs! These robust and scalable databases map real-world entities and link them together based on their relationships. Imagine a giant web of information where everything is connected and easy to find. Knowledge …
  continue reading
 
Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management. Today, Censornet offers a comprehensive suite of tools designed to conf…
  continue reading
 
Gone are the days of merely safeguarding school computers! Censornet, a rising star in the tech industry, has undergone a remarkable transformation. From its roots as an internet security provider for educators, it has emerged as a trailblazing force in digital risk management. Today, Censornet offers a comprehensive suite of tools designed to conf…
  continue reading
 
The traditional data warehousing landscape is changing. The concept of private data cloud offers a compelling alternative to both cloud PaaS and traditional data warehousing. Imagine a secure, dedicated environment for your data, existing entirely within your organisation's control. Yellowbrick, a leader in private data cloud solutions, empowers bu…
  continue reading
 
The traditional data warehousing landscape is changing. The concept of private data cloud offers a compelling alternative to both cloud PaaS and traditional data warehousing. Imagine a secure, dedicated environment for your data, existing entirely within your organisation's control. Yellowbrick, a leader in private data cloud solutions, empowers bu…
  continue reading
 
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows,…
  continue reading
 
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows,…
  continue reading
 
The data analysis landscape is on the precipice of a paradigm shift. Generative AI (GenAI) promises revolutionary insights, but traditional systems struggle to feed its insatiable appetite for well-structured data. Imagine GenAI as a high-powered engine – it needs meticulously organised fuel to reach its full potential. In this episode of the EM360…
  continue reading
 
The data analysis landscape is on the precipice of a paradigm shift. Generative AI (GenAI) promises revolutionary insights, but traditional systems struggle to feed its insatiable appetite for well-structured data. Imagine GenAI as a high-powered engine – it needs meticulously organised fuel to reach its full potential. In this episode of the EM360…
  continue reading
 
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent br…
  continue reading
 
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent br…
  continue reading
 
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, …
  continue reading
 
The fight against cybercrime is a never-ending battle. Firewalls and antivirus software, our traditional defences, are like trusty shields—good against basic attacks but not enough. Advanced attackers can slip through the cracks, exploiting new weaknesses or mimicking harmless traffic. Thus, businesses are exposed and face potential data breaches, …
  continue reading
 
Cloud-native is the new gold rush for businesses seeking speed, efficiency, and innovation. But are you getting the most out of your investment? Legacy troubleshooting and observability tools can be hidden anchors, dragging down your developers' productivity. The result? You're not reaping the full benefits of cloud-native, and your competitors are…
  continue reading
 
Loading …

Quick Reference Guide