Podcasts, Articles, News and Insights From Enterprise Technology Leaders
Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.
Latest in Enterprise Technology
Configit CLM Checklist - Digital Transformation
Whitepaper
Configit CLM Checklist - Digital Transformation
Meet EM360Tech's Experts
Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Debbie
Reynolds

Debbie Reynolds
CEO and Chief Data Privacy Officer at Debbie Reynolds Consulting LLC
- Data
Exclusive EM360Tech Content
Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence
The UK Online Safety Act Explained: What It Means for Businesses
Tech Article
The UK Online Safety Act Explained: What It Means for Businesses
5 min

Start Where You Are: A Practical Guide to Advancing IaC Security Maturity
Whitepaper
Start Where You Are: A Practical Guide to Advancing IaC Security Maturity
2 min

Turning Code into Control - Your Path to Secure IaC
Whitepaper
Turning Code into Control - Your Path to Secure IaC
2 min

How to Halt Ransomware Attacks by Blocking Exfiltration
Tech Article
How to Halt Ransomware Attacks by Blocking Exfiltration
4 min

Microsoft SharePoint Attacks Underscore Urgent Need for Cyber Resilience
Tech Article
Microsoft SharePoint Attacks Underscore Urgent Need for Cyber Resilience
7 min

Is Synthetic Data GDPR-Compliant? What Security and Privacy Leaders Need to Know
Tech Article
Is Synthetic Data GDPR-Compliant? What Security and Privacy Leaders Need to Know
19 min

Ransomware Threats Continue to Escalate: Key Incidents and Emerging Trends

Tech Article
Security
Ransomware Threats Continue to Escalate: Key Incidents and Emerging Trends
What is Cognitive Security? Protecting Your Mind in the Age of AI
Tech Article
What is Cognitive Security? Protecting Your Mind in the Age of AI
4 min

The End of Traditional Network Security: Welcome to the Mesh Era
Tech Article
The End of Traditional Network Security: Welcome to the Mesh Era
6 min

From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
Podcast
From Prompt Injection to Agentic AI: The New Frontier of Cyber Threats
28 min

Who’s Helping You Track Your Cybersecurity Progress?
Tech Article
Who’s Helping You Track Your Cybersecurity Progress?
2 min

7 Risks of Shadow IT and How to Mitigate Them
Tech Article
7 Risks of Shadow IT and How to Mitigate Them
14 min

How to Manage Non-Human Identities Lifecycle Effectively
Tech Article
How to Manage Non-Human Identities Lifecycle Effectively
14 min

Why Fraud Prevention Silos Are Holding Your Business Back
Podcast
Why Fraud Prevention Silos Are Holding Your Business Back
22 min

What is Cognitive Hacking? The Cyber Attack That Targets Your Mind

Tech Article
Security
What is Cognitive Hacking? The Cyber Attack That Targets Your Mind
The Rise of Insider AI Threats: When Your LLM Knows Too Much
Tech Article
The Rise of Insider AI Threats: When Your LLM Knows Too Much
4 min

Ransomware Attacks: What You Need to Know
Tech Article
Ransomware Attacks: What You Need to Know
11 min

Scaling Shadows: How Machine Identities Are Rewriting Cloud Security
Tech Article
Scaling Shadows: How Machine Identities Are Rewriting Cloud Security
11 min

Understanding Non-Human Identities and Why They Matter in Cybersecurity
Tech Article
Understanding Non-Human Identities and Why They Matter in Cybersecurity
10 min

What is a Money Mule? Your Account Could Be Helping Criminals Hide Money
Tech Article
What is a Money Mule? Your Account Could Be Helping Criminals Hide Money
5 min

What Is Identity Theft & How Can You Prevent It?
Tech Article
What Is Identity Theft & How Can You Prevent It?
4 min

Sign up for the EM360Tech Newsletter
Get the latest insights, analysis and tech news delivered straight to your inbox