EM360 public
[search 0]
More

Download the App!

show episodes
 
A weekly show hosted by Matt Harris, Content Producer at EM360, exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
 
In today’s rapidly-changing technological environment, data offers new ways for business to improve or even completely transform business models. But with this rapid change, it’s difficult to separate hype from reality and determine what practical steps can show value in real-world implementations. In this podcast series, we set out to ask, how is Data transforming business? Expect to hear opinions from leading tech vendors and the people who rely on data for day-to-day business such as Barc ...
 
Loading …
show series
 
Machine Learning Operations, or MLOps, is a set of practices that aims to deploy and maintain machine learning models reliably and efficiently. Similar to the DevOps approach, MLOps seeks to increase automation and improve the quality of production models while focusing on business requirements. In the first part of this three-episode series on the…
 
Machine Learning Operations, or MLOps, is a set of practices that aims to deploy and maintain machine learning models reliably and efficiently. Similar to the DevOps approach, MLOps seeks to increase automation and improve the quality of production models while focusing on business requirements. In the first part of this three-episode series on the…
 
Unstructured data refers to the information that isn't arranged according to a pre-set data model, meaning it can’t be stored in a traditional database or RDBMS. With recent numbers showing that up to 90% of the data collected by enterprises is unstructured, how can businesses pivot into managing these huge amounts of information? In this episode o…
 
API security is a key component of modern web application security. But due to their common use, and their access to sensitive data, they are quickly becoming a primary target for attackers. A recent study from Imperva showed that 70% of organisations believe a lack of API security has restricted their API adoption - but should companies feel anxio…
 
Hyperautomation refers to the approach businesses can take to rapidly automate as many IT and business processes as possible. Using RPA and low-code/no-code tools, the hyperautomation software market has exploded in the last few years as enterprises seek to streamline their internal processes - with Gartner expecting it to reach a value of $600 bil…
 
Continuous integration and continuous delivery/deployment, or CI/CD, refers to the method used to deliver apps by introducing automation into the development stages. But why is this corner of the tech world gaining so much momentum? In this episode of the EM360 Podcast, Editor Matt Harris speaks to Rob Zuber, CTO at CircleCI, as they talk about: Cr…
 
Back in March, the FBI revealed that the majority of ransomware attacks against critical infrastructure target the healthcare industry. But why is the public health sector being attacked more than, for example, the banking or retail sector? In this episode of the EM360 Podcast, Editor Matt Harris speaks to Trevor Dearing, Director of Critical Infra…
 
Automation is well-known for facilitating higher production rates and allowing for more efficient use of materials across the worldwide workforce. But how can it be used in the modern workplace and across the business to break down barriers for neurodiverse and disabled people? In this episode of the EM360 Podcast, Editor Matt Harris is joined by G…
 
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure. It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective. The security of an enterprise's surface is paramount in the current era of cloud - but how …
 
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure. It sounds as simple as asset management, but ASM is different in the way it approaches these responsibilities from an attacker’s perspective. The security of an enterprise's surface is paramount in the current era of cloud - but how …
 
Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack. In this episode of the EM360 Podcast, Dr. Eric…
 
Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions provide businesses with next-generation protection against exfiltration while maintaining accessibility for day-to-day operations, even during an attack. In this episode of the EM360 Podcast, Dr. Eric…
 
The explosion of 5G has resulted in organisations having more efficient signalling for Internet-of-Things (IoT) devices, faster connectivity speeds, and greater network performance. However, the use of 5G has also opened the door to new potential threats and vulnerabilities such as DDOS attacks on 5G service interfaces and cyberattacks on the IoT e…
 
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents. In this episode of the EM360 podcast, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Mariana Periera, D…
 
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents. Are IT teams capable of keeping up, or are we leading towards cyber doomsday? In this episode of the EM360 podcast, Chief…
 
In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available. With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats? In this episode of the EM360 podc…
 
In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make patches available. With security teams now being put under immense pressure, what can organisations do to help secure their online presence against modern cyber threats? In this episode of the EM360 podc…
 
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. Using a va…
 
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software and operating system vulnerabilities. This is because as technological defenses become more and more robust, cybercriminals are increasingly targeting the weakest link in the chain: people. Using a va…
 
Artificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-solving. A key part of modern technology, the advancements of AI indicate just how far the human race has come. AI can be used by businesses to interpret and use massive volumes of data. In this third ep…
 
Artificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-solving. A key part of modern technology, the advancements of AI indicate just how far the human race has come. AI can be used by businesses to interpret and use massive volumes of data. In this third ep…
 
The cloud experience has had far-reaching benefits on all sectors within the enterprise. Digitally, cloud-based IT has evolved the capabilities of technology, while cloud-based infrastructure lets IT teams deliver flexible and on-demand resources that boost a company’s agility. But with a recent study showing that 3 out of 5 companies who have move…
 
Cyber insurance helps to provide critical cover for those who need protection against digital threats. While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens. This includes the costs of investigating a cybercrime, recovering lost data and rest…
 
Cyber insurance helps to provide critical cover for those who need protection against digital threats. While businesses are responsible for their own cybersecurity, liability coverage can help provide crucial support to help them stay afloat when the worst happens. This includes the costs of investigating a cybercrime, recovering lost data and rest…
 
Digital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from city planning to construction and decoration, digital twins can help you visualise concepts within spaces with ease. When it comes to processes a digital twin can represent measurements of flows that a…
 
Digital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from city planning to construction and decoration, digital twins can help you visualise concepts within spaces with ease. When it comes to processes a digital twin can represent measurements of flows that a…
 
A recent F-Secure survey of 7,200 internet users showed that two-thirds of remote workers have reported worrying about their online security and privacy. And with a large percentage of the UK population transitioning into remote work following the pandemic, many have had to take cybersecurity seriously when accessing company platforms and data on o…
 
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop sec…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login