Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Expert-driven insights and practical strategies for navigating the future of AI and emerging technologies in business. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make informed decisions for your enterprise.
…
continue reading
Turn data overwhelm into data-driven success. Led by an ensemble cast of expert interviewers offering in-depth analysis and practical advice to make the most of your organization's data.
…
continue reading

1
Why Data Strategy Fails Without Data and AI Literacy
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42Many companies spend a lot on data technology, but often forget about the importance of data and AI literacy. Without the right skills, even the best platforms can fail to deliver results. Teams need to understand how to work with data and AI to make any strategy successful. In this episode of Tech Transformed, EM360Tech’s Trisha Pillay chats with …
…
continue reading

1
What Does the Future of CX Look Like with Agentic AI?
23:17
23:17
Play later
Play later
Lists
Like
Liked
23:17"As agentic AI spreads across industries,” states Rishi Rana, the Chief Executive Officer at Cyara. “Everybody is curious to understand how that is going to transform customer experience across all the channels?" In this episode of the Tech Transformed podcast, Shubhangi Dua, the Host and Podcast Producer at EM360Tech, talks with Rishi Rana, the CE…
…
continue reading

1
Developer Productivity 5X to 10X: Is Durable Execution the Answer to AI Orchestration Challenges?
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18"If you are not using it and don't understand it, you are losing big time because you reinvent that wheel of durable execution yourself, and it's hard," reasons Maxim Fateev, Co-Founder and CTO of Temporal Technologies. In a recent episode of the Tech Transformed podcast, Fateev explored the concept of durable execution. This approach not only impr…
…
continue reading

1
What is a Hardware Security Module (HSM) and Why Does it Matter for Your Cybersecurity?
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45When cybercriminals breach an organization, they're not just after one piece of data - they're hunting for the keys that unlock everything. "Think of Hardware Security Modules (HSMs) like a master vault in a bank for an entire organization's digital security," said David Close, Chief Solutions Architect at Futurex. More than just an analogy, this i…
…
continue reading

1
Struggling with ERP Data? How to Get Real-Time Reporting in Excel
19:30
19:30
Play later
Play later
Lists
Like
Liked
19:30In this episode of the Don't Panic It's Just Data podcast, Christina Stathopoulos talks with Miller and Michael Wiley, Sr. Product Manager of Spreadsheet Server. They discuss the challenges and solutions in financial reporting, focusing on real-time reporting from ERP systems to Excel. The discussion covers the current state of financial reporting,…
…
continue reading

1
How Can Global Marketplaces Master Payment Security and Combat Fraud?
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49"In this technology-centric world, where we see new advantages, new paths, new adventures, at the end of the day, the other side of the screen is always a human being,” Bartosz Skwarczek, Founder & President at G2A Capital Group, reflectively said. The quote sets the tone of the recent episode of The Security Strategist podcast. In this episode, Sh…
…
continue reading

1
What is AI Hyper-Personalisation in CX and Why Does it Matter?
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11"Customers are now expecting highly personalised, seamless, and efficient interactions across all the touch points,” stated Rahul Sareen, the Senior Leader–Cross Industry, Private Equity and Startups Solutions at Amazon Web Services (AWS). Sareen’s statement represents the state of customer experience (CX) today. It’s a demand that is forcing busin…
…
continue reading

1
Why an Agentic Data Management Platform is the Next Generation Data Stack
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35Enterprise data management is undergoing a fundamental transformation. The traditional data stack built on rigid pipelines, static workflows, and human-led interventions is reaching its breaking point. As data volume, velocity, and variety continue to explode, a new approach is taking shape: agentic data management. In this episode of Tech Transfor…
…
continue reading

1
Are AI Agents the Future of Developer Productivity in the Enterprise?
20:15
20:15
Play later
Play later
Lists
Like
Liked
20:15"There's a lot of hype with the AI agents and their productivity and potential outcomes. AI Agents are quite amazing, says Eric Paulsen, EMEA Field CTO at Coder. In this episode of the Tech Transformed podcast, Shubhangi Dua, Podcast Host and Producer at EM360Tech, talks to Paulsen about the constantly advancing role of AI agents in development env…
…
continue reading

1
The Death of Expertise: What AI Won’t Teach Us
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54Are we heading for a future where AI knows everything but won’t bother explaining it to us? Advancements in artificial intelligence are rapidly transforming the way industries operate and influencing the future of society as a whole. AI has become a force behind breakthrough technologies such as big data analytics, robotics, and the Internet of Thi…
…
continue reading

1
Multi-Cloud & AI: Are You Ready for the Next Frontier?
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45"AI may be both the driver and the remedy for multi-cloud adoption," says Dmitry Panenkov, Founder & CEO of emma, alluding to the vast potential and possibilities Artificial Intelligence (AI) and multi-cloud strategies offer. In this episode of the Tech Transformed podcast, Tom Croll, a Cybersecurity Industry Analyst and Tech Advisor at Lionfish, s…
…
continue reading

1
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
28:30
28:30
Play later
Play later
Lists
Like
Liked
28:30Artificial intelligence (AI) is on everyone’s mind, and its impact doesn't escape the cybersecurity industry. The industry experts acknowledge not just the benefits but also the cybersecurity threats of AI integrations. As Pascal Geenens, Director of Threat Intelligence at Radware, puts it, "It's AI, so everything is changing weekly. What I talked …
…
continue reading

1
AI’s Silent Killer: Technical Debt & the Hidden Costs of Bad Data
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20Enterprises face one common problem: the hidden costs of AI-based technical debt. “There’s a lot of hype around AI, but many initiatives aren't founded in a business value proposition,” says Paul Brownell, CTO, Growth Acceleration Partners (GAP). “People wander in without an intentional path for ROI.” In this episode of the Don't Panic, It's Just D…
…
continue reading

1
Why Fraud Prevention Silos Are Holding Your Business Back
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
…
continue reading

1
The Infinity Loop: What's Trapping Financial Institutions in Data Patching?
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33Organisations often find themselves trapped in an infinite loop. Typically hailed as an "infinity loop" or "patching loop,” it’s differentiated by a continuous cycle of fixing problems, patching, and redoing data pipelines just to maintain operations. “It's a trap that many financial institutions, banks, insurance companies, and more fall into. Thi…
…
continue reading

1
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
…
continue reading

1
What Are the Key AI Trends Impacting Data Centers Today?
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48"Certainly an exciting time for data centers, private and public alike, isn't it?" This opening remark from Tom Croll of Lionfish Tech Advisors set the stage for a compelling discussion with Ryan Mallory, President and COO of Flexential, on the recent episode of the Tech Transformed podcast. The speakers discuss the current AI scenario's impact on …
…
continue reading

1
Don't Just Forecast, Flourish: The Integrated Path to Financial Agility
24:43
24:43
Play later
Play later
Lists
Like
Liked
24:43Blending financial planning directly into existing business intelligence (BI) platforms like Microsoft Power BI and Qlik are on the rise. But have you questioned why, and what drives this shift? In this episode of the Don’t Panic It’s Just Data podcast, Kevin Petrie, BARC analyst, sits down to chat with Thomas Gorr, Director of Product Management f…
…
continue reading

1
Your Data’s GPS: Navigating Modernisation with Precision
26:52
26:52
Play later
Play later
Lists
Like
Liked
26:52In this episode of the Don’t Panic, It’s Just Data podcast, Kevin Petrie, VP of Research at BARC, is joined by Nidhi Ram, Vice President of Global Services Strategy and Operational Excellence at Precisely. The duo explore the idea of focusing on data modernisation and improving accessibility rather than constantly implementing new technologies. Bot…
…
continue reading

1
Is Your Attack Surface a Swiss Cheese? Solving Attack Surface Management (ASM) Challenges
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09In this episode of The Security Strategist podcast, host Richard Stiennon, industry analyst and author, speaks to Craig Roberts, Principal Software Engineer at Rapid7, about digital exposure and the increasing challenges of Attack Surface Management (ASM). The conversation peels back the layers of hidden vulnerabilities and misconfigurations that p…
…
continue reading

1
Quantum Computing, AI, & Ransomware: Inside Infosecurity Europe 2025 Key Themes
26:07
26:07
Play later
Play later
Lists
Like
Liked
26:07Infosecurity Europe, Europe's leading cybersecurity event, is celebrating its 30th anniversary from June 3rd to 5th at ExCeL London. This year's conference is setting the stage for major moments in the enterprise tech space. The event aims to foster collaboration and promises to showcase the top cutting-edge cybersecurity solutions. In this episode…
…
continue reading

1
Who Speaks for the Algorithm? The Emerging Role of the AI Analyst
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Takeaways #AI #analysts are crucial for integrating AI into business processes. Organisations need to rethink their data management strategies for AI. AI #data clearinghouse concepts help manage data access and security. Cross-functional collaboration is essential for successful AI integration. AI can enhance employee effectiveness rather than repl…
…
continue reading

1
Can AI Eliminate IT Tickets? Exploring the Future of Automated IT
35:06
35:06
Play later
Play later
Lists
Like
Liked
35:06"The concept of Zero Ticket IT is that instead of reacting to the ticket and trying to solve the ticket, you go directly to the source of the issue." This statement by Sean Heuer, CEO of Resolve Systems, sets the stage for this episode of the Tech Transformed podcast. Shubhangi Dua, podcast host and producer at EM360Tech, , sits down with Heuer to …
…
continue reading

1
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
…
continue reading

1
Can Old Hardware Run New AI? How Businesses Can Make Current Hardware Future-Forward
36:24
36:24
Play later
Play later
Lists
Like
Liked
36:24Are you a CIO, CTO, CISO, or IT decision maker in the restaurant or retail industry, grappling with rising costs and tariffs to keep up with the rapid pace of technological change? The pressure to create high-quality solutions with AI while managing existing infrastructure can be challenging. In this episode of the Tech Transformed Podcast, Shubhan…
…
continue reading

1
Can AI Agents Help You Achieve Data Trust and Compliance?
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04The ability to effectively manage and optimise data is key in an organisation today. But with the sheer volume and complexity of enterprise data, traditional methods are struggling to keep up with the change. This is where the agentic AI approach has swooped in to transform how organisations handle their most valuable resource. "The promise of AI a…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
Data Backups: The Digital Safety Deposit Box
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
…
continue reading

1
DDoS Demystified: Understanding the Threat
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
…
continue reading

1
Can Open Source Ensure AI Works For Everyone, Not Just The Largest Enterprises?
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58“Before starting a new AI project, it is really worthwhile defining the business priority first,” asserts Joanna Hodgson, the UK and Ireland regional leader at Red Hat. “What specific problem are you trying to solve with AI? Do we need a general purpose AI application or would a more focused model be better? How will we manage security, compliance …
…
continue reading