Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

Liverpool Fans Top the League for Premier League Ticket Scams
Tech Article

Liverpool Fans Top the League for Premier League Ticket Scams

em360tech image
Best-in-Class vs. All-in-One Security Solutions - Cybersecurity Awesomeness
Podcast

Best-in-Class vs. All-in-One Security Solutions - Cybersecurity Awesomeness

em360tech image
Securing DevOps: Best Practices for Building Secure and Resilient Software
Tech Article

Securing DevOps: Best Practices for Building Secure and Resilient Software

em360tech image
What Would 1% Do to Your Business: ML for Optimal Security Strategies - Kount
Podcast

What Would 1% Do to Your Business: ML for Optimal Security Strategies - Kount

em360tech image
Halliburton Cyber Attack Takes Down Critical Systems
Tech Article

Halliburton Cyber Attack Takes Down Critical Systems

em360tech image
Microchip Technology Shuts Systems Down After Cyber Attack
Tech Article

Microchip Technology Shuts Systems Down After Cyber Attack

em360tech image
Emerging Trends in Governance, Risk and Compliance (GRC) - 2024
Whitepaper

Emerging Trends in Governance, Risk and Compliance (GRC) - 2024

em360tech image
Rethinking Security in the Age of Zero Trust - ManageEngine
em360tech image
Podcast
Security

Rethinking Security in the Age of Zero Trust - ManageEngine

Savvy: Identity-First SaaS Security
Whitepaper

Savvy: Identity-First SaaS Security

em360tech image
Savvy: Identity Security Checkup
Whitepaper

Savvy: Identity Security Checkup

em360tech image
Top 10 Best Cybersecurity Podcasts for CISOs 
Top 10

Top 10 Best Cybersecurity Podcasts for CISOs 

em360tech image
What is Cybersquatting and is It Illegal?
Tech Article

What is Cybersquatting and is It Illegal?

em360tech image
Top 10 Most Influential Women in Cybersecurity
Top 10

Top 10 Most Influential Women in Cybersecurity

em360tech image
Black Hat and DEF CON Conference Recap - Cybersecurity Awesomeness
Podcast

Black Hat and DEF CON Conference Recap - Cybersecurity Awesomeness

em360tech image
All Social Security Numbers Leaked in Massive Data Breach
Tech Article

All Social Security Numbers Leaked in Massive Data Breach

em360tech image
Zero Trust Security: Mastering the Weakest Link
em360tech image
Podcast
Security

Zero Trust Security: Mastering the Weakest Link

Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security
Podcast

Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security

em360tech image
McLaren Health Care Cyber Attack Puts Patient Data at Risk
Tech Article

McLaren Health Care Cyber Attack Puts Patient Data at Risk

em360tech image
The Intersection of AI in Cybersecurity: A 2024 Industry Report
Whitepaper

The Intersection of AI in Cybersecurity: A 2024 Industry Report

em360tech image
Microsoft DDoS Attack and CrowdStrike Outage - Cybersecurity Awesomeness
Podcast

Microsoft DDoS Attack and CrowdStrike Outage - Cybersecurity Awesomeness

em360tech image
Cybersecurity Automation: Cutting Through the Manual Clutter
Podcast

Cybersecurity Automation: Cutting Through the Manual Clutter

em360tech image
Fake AI Facebook Ads Are Stealing Passwords
Tech Article

Fake AI Facebook Ads Are Stealing Passwords

em360tech image