Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

New Relic: Does Your DEM Strategy Connect All the Dots?
Whitepaper

New Relic: Does Your DEM Strategy Connect All the Dots?

Control AI Agents and Other Non-Human Identities with Okta and AWS
Whitepaper

Control AI Agents and Other Non-Human Identities with Okta and AWS

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

Usage-Based Magic: Turning Cloud Data Into Dollar-Saving Decisions
Podcast

Usage-Based Magic: Turning Cloud Data Into Dollar-Saving Decisions

by George Firican
1 min
em360tech image
Understanding Mercenary Spyware: What it is and How to Protect Yourself
Tech Article

Understanding Mercenary Spyware: What it is and How to Protect Yourself

by
4 min
em360tech image
NHS Forced to Cancel Appointments Following Cyber Incident
Tech Article

NHS Forced to Cancel Appointments Following Cyber Incident

by Katie Baker
2 min
em360tech image
What is Transfer Learning? Leveraging Past Knowledge for Future AI
Tech Article

What is Transfer Learning? Leveraging Past Knowledge for Future AI

by Katie Baker
3 min
em360tech image
AI Jesus Installed in Swiss Church
Tech Article

AI Jesus Installed in Swiss Church

by Katie Baker
2 min
em360tech image
What is Hacktivism? Behind the Digital Disruptors
Tech Article

What is Hacktivism? Behind the Digital Disruptors

by Katie Baker
3 min
em360tech image
What Happened to Hi5? From Social Media Star to Digital Footnote
Tech Article

What Happened to Hi5? From Social Media Star to Digital Footnote

by
6 min
em360tech image
What Is Self Service Analytics?
em360tech image
Tech Article
AI

What Is Self Service Analytics?

Who is Lazarus Group? A Deep-Dive into the North Korean Cyber Gang
Tech Article

Who is Lazarus Group? A Deep-Dive into the North Korean Cyber Gang

by
11 min
em360tech image
What is Deep Learning? Definition, How It Works, Examples
Tech Article

What is Deep Learning? Definition, How It Works, Examples

by Katie Baker
5 min
em360tech image
What is Passwordless Authentication? And is it Safe to Use?
Tech Article

What is Passwordless Authentication? And is it Safe to Use?

by Katie Baker
3 min
em360tech image
Andrew Tate Website Hacked By Political Hacktivist Group
Tech Article

Andrew Tate Website Hacked By Political Hacktivist Group

by Katie Baker
3 min
em360tech image
Blue Yonder Cyber Attack Impacts Starbucks and Supermarkets
Tech Article

Blue Yonder Cyber Attack Impacts Starbucks and Supermarkets

by Katie Baker
2 min
em360tech image
Apple AI Upgrade To Launch LLM Siri
Tech Article

Apple AI Upgrade To Launch LLM Siri

by Shubhangi Dua
6 min
em360tech image
What is Black Basta? How it Works and How to Protect Against It
Tech Article

What is Black Basta? How it Works and How to Protect Against It

by
8 min
em360tech image
What is Llama 3? Everything you Need to Know About Meta's New AI
em360tech image
Tech Article
AI

What is Llama 3? Everything you Need to Know About Meta's New AI

8 Most Common Data Quality Issues
Tech Article

8 Most Common Data Quality Issues

by Piotr Czarnas
3 min
em360tech image
Top 10 Cloud Security Posture Management (CSPM) Tools
Top 10

Top 10 Cloud Security Posture Management (CSPM) Tools

by Shubhangi Dua
7 min
em360tech image
What Happened to Atari? The Rise, Fall, and Legacy of the Gaming Giant
Tech Article

What Happened to Atari? The Rise, Fall, and Legacy of the Gaming Giant

by Katie Baker
5 min
em360tech image
HDCF Life Data Breach Jeopardises Customer Data
Tech Article

HDCF Life Data Breach Jeopardises Customer Data

by Katie Baker
2 min
em360tech image
Top 10 Most Notorious Hacker Groups in History
Top 10

Top 10 Most Notorious Hacker Groups in History

by Katie Baker
11 min
em360tech image
Why did Yik Yak Fail? How the Messaging App Died
Tech Article

Why did Yik Yak Fail? How the Messaging App Died

by
6 min
em360tech image