Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

Turning Code into Control - Your Path to Secure IaC
Whitepaper

Turning Code into Control - Your Path to Secure IaC

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience
Whitepaper

The Evolution of Integrated Risk Management (IRM): Moving Beyond Silos to Achieve Enterprise Resilience

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

The Psychology of Security: Empowering People to Protect
Podcast

The Psychology of Security: Empowering People to Protect

1 min
em360tech image
What is Cl0p Ransomware? Its Origins and Key Strategies for Mitigation
Tech Article

What is Cl0p Ransomware? Its Origins and Key Strategies for Mitigation

8 min
em360tech image
French Hospitals Hit by Cyberattack, Hacker Exposes 750k Patient Records
Tech Article

French Hospitals Hit by Cyberattack, Hacker Exposes 750k Patient Records

em360tech image
Fintech Giant Finastra Hit by Data Breach, Hacker Claims Responsibility
Tech Article

Fintech Giant Finastra Hit by Data Breach, Hacker Claims Responsibility

em360tech image
How do Hackers Collect Intelligence on their Victims?
Podcast

How do Hackers Collect Intelligence on their Victims?

em360tech image
Apple Confirms macOS Targeted in Zero-Day Vulnerability Cyber Attacks
Tech Article

Apple Confirms macOS Targeted in Zero-Day Vulnerability Cyber Attacks

em360tech image
Equinox Data Breach Compromises Patient Information
Tech Article

Equinox Data Breach Compromises Patient Information

em360tech image
What is Multi-Factor Authentication (MFA) and Why You Need It?
em360tech image
Tech Article
Security

What is Multi-Factor Authentication (MFA) and Why You Need It?

Chinese Espionage Hackers Allegedly Stole Sensitive Data From Fortinet
Tech Article

Chinese Espionage Hackers Allegedly Stole Sensitive Data From Fortinet

em360tech image
Top Cyber Sеcurity Trends and Best Practices for Organisations in 2025
Tech Article

Top Cyber Sеcurity Trends and Best Practices for Organisations in 2025

em360tech image
Hackers Target Black Friday with Phishing Sites, Steal Credit Cards
Tech Article

Hackers Target Black Friday with Phishing Sites, Steal Credit Cards

em360tech image
Supermarket Cyber Attack Compromises Ahold Delhaize Grocery Stores & Pharmacies
Tech Article

Supermarket Cyber Attack Compromises Ahold Delhaize Grocery Stores & Pharmacies

em360tech image
122M Victims of Data Leak Linked to B2B Data Firm Security Lapse
Tech Article

122M Victims of Data Leak Linked to B2B Data Firm Security Lapse

em360tech image
What is Software Supply Chain Security and Why Is It Important?
Tech Article

What is Software Supply Chain Security and Why Is It Important?

em360tech image
Backup Strategies for Post-breach Recovery
Tech Article

Backup Strategies for Post-breach Recovery

em360tech image
How Decision-Makers Can Get Ready for Ransomware Attacks?
em360tech image
Tech Article
Security

How Decision-Makers Can Get Ready for Ransomware Attacks?

Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs
Podcast

Drive by Diplomacy: Cybersecurity in the Age of Chinese EVs

1 min
em360tech image
Amazon Confirms Employee Data Leak After Hacker Alleges MOVEit Breach
Tech Article

Amazon Confirms Employee Data Leak After Hacker Alleges MOVEit Breach

em360tech image
Evaluating Identity as a Competitive Differentiator
Tech Article

Evaluating Identity as a Competitive Differentiator

em360tech image
Nokia at Risk After Third Party Data Breach
Tech Article

Nokia at Risk After Third Party Data Breach

em360tech image
Top 10 Types of Cyber Attacks and How to Defend Against Them
Top 10

Top 10 Types of Cyber Attacks and How to Defend Against Them

em360tech image
Schneider Electric Suffers Major Data Breach, Personal Information Compromised
Tech Article

Schneider Electric Suffers Major Data Breach, Personal Information Compromised

em360tech image