Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

Car Renters' Data Exposed in Avis Cyber Attack
Tech Article

Car Renters' Data Exposed in Avis Cyber Attack

em360tech image
Sextortion Scam Uses Photos of Your Home from Google Maps
Tech Article

Sextortion Scam Uses Photos of Your Home from Google Maps

em360tech image
Fraud Rings: A Dangerous Trend Businesses Should Be Aware Of
Whitepaper

Fraud Rings: A Dangerous Trend Businesses Should Be Aware Of

em360tech image
Top 10 Privileged Access Management (PAM) Solutions for 2024
Top 10

Top 10 Privileged Access Management (PAM) Solutions for 2024

em360tech image
Yubico YubiKeys Vulnerability - Cybersecurity Awesomeness
Podcast

Yubico YubiKeys Vulnerability - Cybersecurity Awesomeness

em360tech image
Planned Parenthood Cuts IT Systems Following Cyber Attack
Tech Article

Planned Parenthood Cuts IT Systems Following Cyber Attack

em360tech image
Solution Overview: What is Wiz?
Tech Article

Solution Overview: What is Wiz?

em360tech image
What is Link Rot and How Can You Avoid It?
em360tech image
Tech Article
Security

What is Link Rot and How Can You Avoid It?

Cutting Through the Noise: Redefining Detection and Response With Secureworks
Podcast

Cutting Through the Noise: Redefining Detection and Response With Secureworks

em360tech image
TfL Cyber Attack Pushes London Transport Off the Rails
Tech Article

TfL Cyber Attack Pushes London Transport Off the Rails

em360tech image
Celebrating International Women in Cyber Day 2024
Tech Article

Celebrating International Women in Cyber Day 2024

em360tech image
Solution Overview: What is Oasis Security NHI Management (NHIM)?
Tech Article

Solution Overview: What is Oasis Security NHI Management (NHIM)?

em360tech image
German Air Traffic Control Downed by Cyber Attack
Tech Article

German Air Traffic Control Downed by Cyber Attack

em360tech image
Cyber Attack Strikes Cambridge University Publishing House
Tech Article

Cyber Attack Strikes Cambridge University Publishing House

4 min
em360tech image
Avantra: Solutions for the end of Solution Manager
Whitepaper

Avantra: Solutions for the end of Solution Manager

em360tech image
S/4HANA or RISE with SAP, which is the right choice for you?
em360tech image
Whitepaper
Security

S/4HANA or RISE with SAP, which is the right choice for you?

S/4HANA migration with Avantra
Whitepaper

S/4HANA migration with Avantra

em360tech image
Avantra: Automating System Copy and Refresh
Whitepaper

Avantra: Automating System Copy and Refresh

em360tech image
Identity Solutions - Cybersecurity Awesomeness
Podcast

Identity Solutions - Cybersecurity Awesomeness

em360tech image
Customer Data Swiped in Fota Wildlife Park Cyber Attack 
Tech Article

Customer Data Swiped in Fota Wildlife Park Cyber Attack 

em360tech image
What is Business Impact Analysis (BIA)? Definition and Importance
Tech Article

What is Business Impact Analysis (BIA)? Definition and Importance

em360tech image
Top 10 Identity Access Management (IAM) Tools for 2024
Top 10

Top 10 Identity Access Management (IAM) Tools for 2024

em360tech image