EM360 halka açık
[search 0]
Daha fazla

Download the App!

show episodes
 
Loading …
show series
 
Needless to say, trusted computing is a complex and heavily debated subject. Even today, in 2021, the debate continues, and organisations are still weighing up the benefits of what a trusted computing hardware or software system might bring to them. In traditional trusted computing hardware, technology is used to allow the user to decide what they …
 
With the increasing lack of anonymity on the internet, users and organisations alike are looking to implement a VPN setup within their system in order to gain a stronger sense of security. In countries with strong firewalls such as China, businesses prioritise the use of VPNs in order to open themselves up to the global market. With that said, a we…
 
Privacy enhancing technologies, or PETs, can be used for a multitude of reasons; whether it's being used to decrease the crime rates of countries, for social good or even for the use of your business, PETs have proved time and time again to be effective. PETs are broad, and when using one within your business, the focus really should be on providin…
 
What data science needs, in our current world where we have more data than we know what to do with, is a solution that allows data to be readily applicable and useful for the growth of an organisation. This does not just mean the ability to analyse the market, but it also means the ability to enhance integrated experiences, giving organisations a s…
 
Changing methodologies and approaches to B2B marketing creates constant challenges for those attempting to reach their market segment with ease. What B2B means today is very different to what it meant in the past, and this is in part due to the effects of content marketing. While the days of print magazines, posters and radio ads are less common no…
 
While new technologies are constantly being developed to fight cybercrime and strengthen cybersecurity systems, much of the cybersecurity is left yawning. New additions to technologies such as Endpoint Detection and Response (EDR), while effective, are not implementing the level of change that we need to see if we want to ensure safety while reduci…
 
The phone scam has been in the cybercriminal's playbook for decades, but the pandemic has lead to a sharp increase of these attacks. According to Eric Griffith from PC Mag, According to Eric Griffith from PC Mag, a well constructed phone scam can exploit more money than a scam conducted via email, social media, websites or apps. This becomes all th…
 
Security threats are unavoidable and inescapable for modern businesses. No matter the size of the enterprise, dealing with the likes of data breaches and ransomware attackers has become commonplace. The key, then, is to know how exactly to detect and respond to these incidents. With new threat hunting and detection technologies, tools, and techniqu…
 
The world of artificial intelligence and machine learning is everchanging, with new trends being discovered every year. In the wake of GDPR in 2018, the use of such technologies was applied to legal documents, company legislations and privacy regulations. In 2019, this trend continued while others experimented with incorporating AI into video game …
 
With new analytic trends emerging as we delve deeper into this decade, organisations are starting to pay attention to solutions and tools that offer them greater insights into their data. A study from Forrester Research revealed that less than 0.5% of all data is ever analysed and used, while only 12% of enterprise data is used to make decisions. A…
 
Implementing AI to automate sales and financial duties is nothing new, but recently there has been a lot of discussion related to AI powered Order-to-Cash platforms. In nearly every sector, reducing waiting times means reducing costs, but Order-to-Cash AI can also be the key to customer retention and expansion while also speeding up financial proce…
 
As more and more businesses experience latency issues in traditional cloud databases, edge computing is now more popular than ever before. Having a device at the edge of your network allows for smoother run times while also synchronising with other geo-distributed devices in your ecosystem that are placed on other parts of the globe. Fusing an alre…
 
Email is the front door into an organisation and humans typically manage it. However, with phishing attacks becoming more targeted and sophisticated, and increasing cases of account takeover and data loss due to a successful email attack, humans alone can no longer be relied on to protect the inbox. Fortunately for businesses, there are email secur…
 
One of the biggest problems when managing data is that vast quantities of it is scattered across data silos and multiple systems. The primary issue this causes is the inability to shape your business to your customers' demands. What's often forgotten about is that when that data also has transactional information, it becomes hard to monitor suspici…
 
2020 was comprised of big data breaches, leaks and new obstacles, leading to what many have dubbed a "Cybersecurity Pandemic." Surviving in these difficult times has been hard and more often than not, it's the people that suffer; in fact, 58% of breaches in the last year involved some level of personal data. The Cybersecurity Pandemic has affected …
 
Technology as a service is a methodological approach that seeks to place the importance of the customer's need at the forefront of the software. The world of Unified Communications saw the breakthrough of Unified Communications as a Service (or UCaaS) in around 2014 and it has since managed to leverage cloud technology to send requests and communic…
 
As a security framework that has rapidly developed over the last few years, "Zero Trust" has become a hot topic for many in the industry. Despite the huge amount of attention that Zero Trust is receiving, at this point 70% of reported correspondents have stated that they have no Zero Trust access projects underway or in place. The fear for many is …
 
It's now widely accepted that customer experience (CX) knowledge now has a direct impact on a company's success, and if you don't know how to leverage that knowledge to make informed decisions, your company might not be reaching its full capabilities. The problem with focusing on CX is that it occasionally comes at the expense of organisations' sec…
 
Over the last decade, the development of cybersecurity has accelerated faster than ever before. The initial deployment of endpoint detection and response (EDR) was quickly replaced with extended detection and response (XDR), and it seems that this adoption of AI is transforming cybersecurity. To find out more about how AI is transforming cybersecur…
 
Providing appropriate representation of women in the workforce remains a challenge for many businesses due to their complicated history with patriarchy. While many women are told that if they work hard enough, they will be able to fight sexism, this fight can only be achieved if all companies take representation seriously and provide an infrastruct…
 
By making the communication, processing, and consumption of events part of the foundations of your application, you are incorporating what we refer to as event-driven architecture. Event-driven architecture is a fantastic new approach to application design as it fosters versatility by facilitating greater responsiveness. In this EM360 podcast, we s…
 
The majority of employees within your organisation likely aren't thinking about cybersecurity as their first priority. They each have their own individual roles, and taking on the responsibility of manoeuvering means taking on additional work when your time is already stretched. It's for this that the majority of businesses are looking at cybersecu…
 
Staying agile in the fast paced world of enterprise technology is only possible if you are implementing the most agile technology. Enterprise Resource Planning software, or ERP, has become one of the key components of all enterprises in recent years. Despite its popularity, installing ERP comes with its challenges; most notably, employees are conce…
 
They say that data is the new oil, but being able to manage large quantities of data remains a challenge for many organisations in 2021. Anmut, a company that specialises in helping companies leverage the power of data, recently showed that only 34% of businesses currently manage data assets with the same discipline of other assets. The fact is tha…
 
As cybersecurity technologies become stronger, so do the adversaries. Over the last decade, we have seen the rise of ransomware, petya and, most recently, typosquatting. Despite our best efforts to be meticulous when reading URLs, there is always a margin of error that could compromise the security and economy of your business. Joining us to tell u…
 
Loading …

Hızlı referans rehberi

Google login Twitter login Classic login