Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

What is ITDR (Identity Threat Detection and Response)?
Tech Article

What is ITDR (Identity Threat Detection and Response)?

em360tech image
The EU AI Act: What it Means for UK Businesses and how to Stay Compliant
Tech Article

The EU AI Act: What it Means for UK Businesses and how to Stay Compliant

6 min
em360tech image
Government Response to Cyberattacks on Critical Infrastructure: Is it Enough?
Tech Article

Government Response to Cyberattacks on Critical Infrastructure: Is it Enough?

4 min
em360tech image
Courage & Resilience: Bringing FBI Grit to Cybersecurity
Podcast

Courage & Resilience: Bringing FBI Grit to Cybersecurity

1 min
em360tech image
Identity - a Quick Win in your Zero Trust Roadmap
Podcast

Identity - a Quick Win in your Zero Trust Roadmap

em360tech image
10 Cybersecurity Unicorns That You Won't Find in a Gartner MQ
Tech Article

10 Cybersecurity Unicorns That You Won't Find in a Gartner MQ

em360tech image
Landmark Admin Data Breach Compromises 800,000 Customers
Tech Article

Landmark Admin Data Breach Compromises 800,000 Customers

em360tech image
What is SOAR? Upgrade Your Security with Automation and AI
em360tech image
Tech Article
Security

What is SOAR? Upgrade Your Security with Automation and AI

100 Million Patient's Data Leaked In Change Healthcare Cyber Attack
Tech Article

100 Million Patient's Data Leaked In Change Healthcare Cyber Attack

em360tech image
Hot Topic Data Breach Jeopardizes Customer Information
Tech Article

Hot Topic Data Breach Jeopardizes Customer Information

em360tech image
Ransom-Repeat: How to Stop Funding Your Favorite Hackers!
Podcast

Ransom-Repeat: How to Stop Funding Your Favorite Hackers!

24 min
em360tech image
Navigating the Cybersecurity Market: How Experts Choose the Best Solutions Amid Thousands of Vendors
Tech Article

Navigating the Cybersecurity Market: How Experts Choose the Best Solutions Amid Thousands of Vendors

em360tech image
What is BlackCat Ransomware? Everything You Need to Know About the Hacker Group
Tech Article

What is BlackCat Ransomware? Everything You Need to Know About the Hacker Group

14 min
em360tech image
What is the Blue Screen of Death? And How Can You Fix it?
Tech Article

What is the Blue Screen of Death? And How Can You Fix it?

em360tech image
Troubleshooting Common Issues with SMB Signing
Tech Article

Troubleshooting Common Issues with SMB Signing

em360tech image
What is a DDoS Attack? A Guide to Distributed Denial of Service Attacks
em360tech image
Tech Article
Security

What is a DDoS Attack? A Guide to Distributed Denial of Service Attacks

Cisco Investigates Data Breach After Stolen Data Appears Online
Tech Article

Cisco Investigates Data Breach After Stolen Data Appears Online

em360tech image
Ransomware: A Battle for Cyber Security
Podcast

Ransomware: A Battle for Cyber Security

1 min
em360tech image
Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know
Podcast

Top Findings from ISMS.Online’s “State of Information Security” Report: What You Need to Know

1 min
em360tech image
OWASP Latvia Chapter: Strengthening Cybersecurity in the Baltic Region
Tech Article

OWASP Latvia Chapter: Strengthening Cybersecurity in the Baltic Region

em360tech image
Episode 5 - Cybersecurity 101 for Automation Leaders
Podcast

Episode 5 - Cybersecurity 101 for Automation Leaders

em360tech image
What is a VPN? Why do you need one?
Tech Article

What is a VPN? Why do you need one?

em360tech image