Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

Employee Data Exposed Following Dell Cyber Attack
Tech Article

Employee Data Exposed Following Dell Cyber Attack

em360tech image
MoneyGram Blames Cyber Attack for Ongoing IT Outage
Tech Article

MoneyGram Blames Cyber Attack for Ongoing IT Outage

em360tech image
Neural Networks at Risk: AI and Cyber Threats
Podcast

Neural Networks at Risk: AI and Cyber Threats

1 min
em360tech image
Homegrown SOC Automation: Pros and Cons
Tech Article

Homegrown SOC Automation: Pros and Cons

em360tech image
Who is LockBit? Inside the Famous Russian Ransomware Gang
Tech Article

Who is LockBit? Inside the Famous Russian Ransomware Gang

13 min
em360tech image
International Cyber Expo 2024: Q&A with Event Director Rachael Shattock
Tech Article

International Cyber Expo 2024: Q&A with Event Director Rachael Shattock

em360tech image
Blackpool Schools Hit by Ransomware Cyber Attack
Tech Article

Blackpool Schools Hit by Ransomware Cyber Attack

em360tech image
Filecloud Datasheet
em360tech image
Whitepaper
Security

Filecloud Datasheet

FileCloud Feature Highlight One Pager
Whitepaper

FileCloud Feature Highlight One Pager

em360tech image
FileCloud One Pager
Whitepaper

FileCloud One Pager

em360tech image
FileCloud Security Best Practices & FAQ
Whitepaper

FileCloud Security Best Practices & FAQ

em360tech image
Customer Data Breached in Harvey Nichols Cyber Attack
Tech Article

Customer Data Breached in Harvey Nichols Cyber Attack

em360tech image
Authenticating Users with Traditional SSO is Not Enough
Podcast

Authenticating Users with Traditional SSO is Not Enough

1 min
em360tech image
SCION: The Future of Critical Infrastructure Defence
Podcast

SCION: The Future of Critical Infrastructure Defence

em360tech image
How is Proactive CDR Revolutionising Cloud Security
Podcast

How is Proactive CDR Revolutionising Cloud Security

em360tech image
What is Post-Quantum Cryptography (PQC)? Definition, Algorithms, Importance
em360tech image
Tech Article
Security

What is Post-Quantum Cryptography (PQC)? Definition, Algorithms, Importance

Top 10 Best Pentesting Tools for 2024
Top 10

Top 10 Best Pentesting Tools for 2024

em360tech image
Election Security - Cybersecurity Awesomeness
Podcast

Election Security - Cybersecurity Awesomeness

em360tech image
Scale of TfL Cyber Attack Revealed as Teen Arrested
Tech Article

Scale of TfL Cyber Attack Revealed as Teen Arrested

em360tech image
Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management
Podcast

Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management

1 min
em360tech image
Omada IdentityPROCESS+ Guide: The Best Practice Framework for Successful Identity Governance
Whitepaper

Omada IdentityPROCESS+ Guide: The Best Practice Framework for Successful Identity Governance

em360tech image
Slim CD Cyber Attack Exposes 1.7 Million Card Holders’ Data
Tech Article

Slim CD Cyber Attack Exposes 1.7 Million Card Holders’ Data

em360tech image