Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

The Cyber Game: Simulations, Ranges, and Digital Twins
Podcast

The Cyber Game: Simulations, Ranges, and Digital Twins

1 min
em360tech image
Why Tracking Your Digital Risk is a Big Deal
Podcast

Why Tracking Your Digital Risk is a Big Deal

1 min
em360tech image
Top 10 Anti-Malware Tools
Top 10

Top 10 Anti-Malware Tools

em360tech image
Top 10 Supply Chain Attacks: What You Need to Know
Top 10

Top 10 Supply Chain Attacks: What You Need to Know

6 min
em360tech image
What Is Business Email Compromise? Read This to Avoid Being Scammed
Tech Article

What Is Business Email Compromise? Read This to Avoid Being Scammed

em360tech image
What is DevSecOps? and Why It Matters
Tech Article

What is DevSecOps? and Why It Matters

5 min
em360tech image
Children's Health Data Leaked Following Alder Hey Cyber Attack
Tech Article

Children's Health Data Leaked Following Alder Hey Cyber Attack

em360tech image
What is XDR? A Complete Guide to Extended Detection and Response
em360tech image
Tech Article
Security

What is XDR? A Complete Guide to Extended Detection and Response

What is Qilin Ransomware? A Rising Threat in Cybersecurity
Tech Article

What is Qilin Ransomware? A Rising Threat in Cybersecurity

6 min
em360tech image
What is Zero Trust Architecture (ZTA) and Why It Matters?
Tech Article

What is Zero Trust Architecture (ZTA) and Why It Matters?

8 min
em360tech image
What is a Romance Scam and How to Spot Them?
Tech Article

What is a Romance Scam and How to Spot Them?

em360tech image
Understanding Mercenary Spyware: What it is and How to Protect Yourself
Tech Article

Understanding Mercenary Spyware: What it is and How to Protect Yourself

4 min
em360tech image
NHS Forced to Cancel Appointments Following Cyber Incident
Tech Article

NHS Forced to Cancel Appointments Following Cyber Incident

em360tech image
What is Hacktivism? Behind the Digital Disruptors
Tech Article

What is Hacktivism? Behind the Digital Disruptors

em360tech image
Who is Lazarus Group? A Deep-Dive into the North Korean Cyber Gang
Tech Article

Who is Lazarus Group? A Deep-Dive into the North Korean Cyber Gang

11 min
em360tech image
What is Passwordless Authentication? And is it Safe to Use?
em360tech image
Tech Article
Security

What is Passwordless Authentication? And is it Safe to Use?

Andrew Tate Website Hacked By Political Hacktivist Group
Tech Article

Andrew Tate Website Hacked By Political Hacktivist Group

em360tech image
Blue Yonder Cyber Attack Impacts Starbucks and Supermarkets
Tech Article

Blue Yonder Cyber Attack Impacts Starbucks and Supermarkets

em360tech image
What is Black Basta? How it Works and How to Protect Against It
Tech Article

What is Black Basta? How it Works and How to Protect Against It

8 min
em360tech image
HDCF Life Data Breach Jeopardises Customer Data
Tech Article

HDCF Life Data Breach Jeopardises Customer Data

em360tech image
Top 10 Most Notorious Hacker Groups in History
Top 10

Top 10 Most Notorious Hacker Groups in History

em360tech image
Who is Evil Corp? A Look into the Russian Cyber Gang
Tech Article

Who is Evil Corp? A Look into the Russian Cyber Gang

6 min
em360tech image