EM360 halka açık
[search 0]
Daha fazla

Download the App!

show episodes
 
A weekly show hosted by Matt Harris, Head of Content at EM360, exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
 
Loading …
show series
 
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attacks can be devastating, as they allow the attacker to gain access to the systems and data of many organisations. To mitigate the risks of supply chain attacks, organisations should perform due diligence…
 
Hyperautomation and AIOps are two of the most important technologies that are driving the digital transformation of businesses across the globe. The business value of Hyperautomation and AIOps is significant. By automating repetitive tasks, hyperautomation helps businesses to save time and reduce costs, while also improving accuracy and efficiency.…
 
Shadow IT refers to the use of technology and IT systems within an organization without the approval or knowledge of the central IT department. This can range from employees using their own personal devices for work purposes to departments setting up and using their own software and systems. Shadow IT can increase security risks and lead to data br…
 
Data management is essential for retailers to manage their data effectively to gain valuable insights into customer behavior, preferences, and purchase patterns. By doing so, retailers can make data-driven decisions and improve their operations, sales, and marketing strategies. However, managing data can be challenging for retailers due to the volu…
 
Risk management is the process of identifying, assessing, and controlling threats to an organisation's capital and earnings. These risks can come in many forms, including market risk, credit risk, operational risk, and others. Effective risk management helps companies minimize the potential impact of negative events, protect their reputation, and e…
 
In traditional data architecture, data was always centralised in a data warehouse or a data lake and governed by a centralised team. However, with the rise of distributed systems, microservices, and agile methodologies, this approach has proven to be inadequate for managing data at scale. Data Mesh proposes a different approach, where data is treat…
 
Location intelligence. Location intelligence is crucial for a company's data-driven decision-making process, providing insights into the relationship between location and business operations. It helps identify new market opportunities, optimize operations, improve customer experiences, mitigate risks, and provide a competitive advantage. By analyzi…
 
Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage and restoring normal business functionality as quickly as possible. A well-executed incident response plan can help organisations mitigate the impact of security incidents and maintain the trust of their c…
 
Business agility refers to the ability of a company to quickly adapt and respond to changes in the market and customer demands. In today's fast-paced business environment, companies need to be nimble and flexible to remain competitive and succeed. Agile practices have become a key factor in achieving business agility, with organizations adopting me…
 
Companies are using the metaverse in the workplace in a variety of ways. From using virtual reality environments to allow remote employees to work together as if they were in the same physical space, to using virtual events and trade shows to showcase their products and services to a global audience, the metaverse is a growing commodity for forward…
 
Automating compliance controls refers to the use of technology to manage and monitor compliance with regulations and laws. The purpose of automating compliance controls is to ensure that organizations meet their obligations in a consistent and efficient manner, while reducing the risk of non-compliance. Automating these controls can provide signifi…
 
Managing third-party risk has become an increasingly important concern for enterprises as the use of third-party vendors and partners continues to grow in the business world. In the wake of Uber’s second third-party breach from vendor Teqtivity in December, resulting in a data dump of almost 80,000 Uber employees’ personal information, serious ques…
 
Data is the backbone of any successful business, and having a 360-degree view of it is crucial to understand the key metrics and drivers of the organization. By collecting, processing, and analyzing data from various sources such as customer interactions, financial transactions, and employee performance, your business can gain valuable insights int…
 
Data ethics. The ever-changing landscape of how people perceive their personal data - and how companies use it - has been the subject of debate as data collection becomes more and more commonplace. With US politics heading for data protection laws that could rival the severity of GDPR and consumers more aware than ever of how much their data is wor…
 
Data observability refers to the ability to collect, measure, and analyse data from various sources in order to understand the current state and behaviour of a system. This includes monitoring the system's performance, availability, and errors, as well as identifying patterns and anomalies in the data. By implementing data observability, organisati…
 
Email security is vitally important for modern companies, with 95% using email as their main communication tool and 80% using email for sensitive data transfers. But is this a mistake? Has email security fallen behind compared to other methods of communication? And what’s the alternative? In this episode of the EM360 Podcast, Head of Content Matt H…
 
Digital forensics have transformed crime prevention and the handling of cases permanently. With over 5,000 British police officers able to work cases remotely and upload sensitive evidence directly to the cloud, forensic investigations that could have taken days or even weeks to resolve can now be dealt with instantaneously. So how have strides in …
 
Cloud-native observability is a practice of rapidly detecting and remediating issues in complex and distributed systems. Observability of cloud-native environments is important because it helps to ensure that these applications and infrastructure are running smoothly and effectively. To achieve this, enterprises typically use a combination of tools…
 
Cyber warfare has changed cybersecurity forever. Rising tensions across the world have seen multiple state-sponsored attacks hit states like Ukraine, China and the US. With global superpowers spending millions on their cyberdefence strategies, are there any lessons that the enterprise can take away? In this episode of the EM360 Podcast, Head of Con…
 
Predictive data intelligence is the use of data, AI-driven algorithms, and machine learning techniques to quickly connect data consumers with the most relevant data they need to drive their business initiatives and deliver greater value. The goal of predictive analytics is to go beyond simply describing data to enable data consumers to accelerate t…
 
Containerisation is a method of packaging applications in a way that allows them to be easily deployed and run in different computing environments. Containers allow applications to be easily moved between different environments, such as different servers, cloud platforms, or local development environments, without the need to worry about compatibil…
 
Contract Lifecycle Management automates and streamlines everything related to a business' contract processes. From authoring and sharing to signing and approving, contracts play a massive role in how businesses deal and correspond with the rest of the market. In this episode of the EM360 Podcast, Editor Matt Harris speaks to Ronan Copeland, Group V…
 
Low code and no code are popular alternatives to traditional software development that limit the amount of coding needed in a bid to make working on applications quicker, easier and more accessible. Saving time, boosting efficiency and filling talent gaps are among the advantages of low code/no code, but what limitations could these practices provi…
 
The last few years have seen rapid changes in the cybersecurity landscape. From work-from-home cybersecurity becoming a key part of companies’ strategies to ransomware becoming an ever-present risk, cybersecurity has presented consistent challenges to the enterprise. But what does 2023 hold for the world of cybersecurity? In this episode of the EM3…
 
The smart city. A modern, urban area where technology is intertwined with and relied on by the overall infrastructure. Traffic flow, footfall, healthcare, education; almost all aspects of our everyday lives can be affected and improved by the way city systems can collect data and use it for good. But what happens when the smart city becomes comprom…
 
Loading …

Hızlı referans rehberi