EM360 公開
[search 0]
もっと

Download the App!

show episodes
 
A weekly show hosted by EM360 Head of Content Max Kurton exploring the ever-changing world of enterprise tech. Every week a new expert walks us through a different topic in such areas as cybersecurity, data, AI, emerging tech, unified communications, and more!
 
Loading …
show series
 
As we make our way into 2022, we have to acknowledge that workers are still inclined to favour remote working jobs. In fact, statistically people of colour and women are more likely to pursue remote working jobs, with 87% of Asian workers, 81% of black workers and 85% of women of every ethnicity stating it as a major preference. When you take into …
 
Ever heard of the data-decision gap? If you have, you likely recognise that many organisations struggle to make data-driven decisions. A big problem for many organisations is while they might have data, the source of this data is questionable at best, which makes it hard to drive decision making. A key answer is visualised data and the ability to t…
 
You know that using social media in business can lead to some fantastic results, so you think of a post that you know will resonate with your audience. After a few hours building a graphic, using social media listening tools and doing thorough background research, you post it. At the end of the week, the post only has two likes. You are thinking, "…
 
You can have the greatest tech in the world but if you only have bad data, you're effectively flogging a dead horse. We might hear people say that data is their biggest asset and that data is the only way to make informed decisions but this data is very often pulled from various different locations that are impossible to track. You have a statistic…
 
With the increase of cyber threats globally since the pandemic, conducting a cybersecurity risk assessment for your business is more important ever. Making your organisation compliant with cybersecurity measures is essential in the modern day but did you know that only 60% of organisations have a comprehensive cyber insurance policy to protect them…
 
As we know, marketers are always looking for an edge, something that positions them above their peers. By embracing new technologies that enable conversations such as Chatbots, businesses can design a conversation flow and solicit more valuable information about customers' needs. In this podcast, Jiaqi Pan, CEO and Co-Founder of Landbot, walks us t…
 
Hosting this episode of the EM360 Podcast is Torsten Volk, Managing Research Director at Enterprise Management Associates (EMA). Torsten speaks on how Kubernetes became a platform that brought developers and operators together with Grant Miller, CEO and Co-founder at Replicated. The two experts explore: The term 'Multi-prem', where it comes from, a…
 
If you have been paying attention over the last few years, you will realise that cybersecurity is moving more towards an anticipatory approach, particularly with the advancements of managed detection and response software. Beyond this however, precautions now have to be interwoven into the very fabric of an organisation. Email protection is not eno…
 
With an increase in adoption of commercial and investment banking technology, organisations are now providing customers with greater communication, ease of access and financial opportunities. In fact, between 2017-2021, consumers in Asia-Pacific emerging markets increased their use in digital banking by 33%, with 88% of consumers now utilising it t…
 
As much as people fear that they have lost their anonymity on the internet, technologies that previously companies and individuals alike to regain this privilege are starting to show their shortcomings. The VPN setup, which has been gaining steady momentum since it became publicly available in 1999, is finally reaching the end of its lifeline as th…
 
Needless to say, trusted computing is a complex and heavily debated subject. Even today, in 2021, the debate continues, and organisations are still weighing up the benefits of what a trusted computing hardware or software system might bring to them. In traditional trusted computing hardware, technology is used to allow the user to decide what they …
 
With the increasing lack of anonymity on the internet, users and organisations alike are looking to implement a VPN setup within their system in order to gain a stronger sense of security. In countries with strong firewalls such as China, businesses prioritise the use of VPNs in order to open themselves up to the global market. With that said, a we…
 
Privacy enhancing technologies, or PETs, can be used for a multitude of reasons; whether it's being used to decrease the crime rates of countries, for social good or even for the use of your business, PETs have proved time and time again to be effective. PETs are broad, and when using one within your business, the focus really should be on providin…
 
What data science needs, in our current world where we have more data than we know what to do with, is a solution that allows data to be readily applicable and useful for the growth of an organisation. This does not just mean the ability to analyse the market, but it also means the ability to enhance integrated experiences, giving organisations a s…
 
Changing methodologies and approaches to B2B marketing creates constant challenges for those attempting to reach their market segment with ease. What B2B means today is very different to what it meant in the past, and this is in part due to the effects of content marketing. While the days of print magazines, posters and radio ads are less common no…
 
While new technologies are constantly being developed to fight cybercrime and strengthen cybersecurity systems, much of the cybersecurity is left yawning. New additions to technologies such as Endpoint Detection and Response (EDR), while effective, are not implementing the level of change that we need to see if we want to ensure safety while reduci…
 
The phone scam has been in the cybercriminal's playbook for decades, but the pandemic has lead to a sharp increase of these attacks. According to Eric Griffith from PC Mag, According to Eric Griffith from PC Mag, a well constructed phone scam can exploit more money than a scam conducted via email, social media, websites or apps. This becomes all th…
 
Security threats are unavoidable and inescapable for modern businesses. No matter the size of the enterprise, dealing with the likes of data breaches and ransomware attackers has become commonplace. The key, then, is to know how exactly to detect and respond to these incidents. With new threat hunting and detection technologies, tools, and techniqu…
 
The world of artificial intelligence and machine learning is everchanging, with new trends being discovered every year. In the wake of GDPR in 2018, the use of such technologies was applied to legal documents, company legislations and privacy regulations. In 2019, this trend continued while others experimented with incorporating AI into video game …
 
With new analytic trends emerging as we delve deeper into this decade, organisations are starting to pay attention to solutions and tools that offer them greater insights into their data. A study from Forrester Research revealed that less than 0.5% of all data is ever analysed and used, while only 12% of enterprise data is used to make decisions. A…
 
Implementing AI to automate sales and financial duties is nothing new, but recently there has been a lot of discussion related to AI powered Order-to-Cash platforms. In nearly every sector, reducing waiting times means reducing costs, but Order-to-Cash AI can also be the key to customer retention and expansion while also speeding up financial proce…
 
As more and more businesses experience latency issues in traditional cloud databases, edge computing is now more popular than ever before. Having a device at the edge of your network allows for smoother run times while also synchronising with other geo-distributed devices in your ecosystem that are placed on other parts of the globe. Fusing an alre…
 
Email is the front door into an organisation and humans typically manage it. However, with phishing attacks becoming more targeted and sophisticated, and increasing cases of account takeover and data loss due to a successful email attack, humans alone can no longer be relied on to protect the inbox. Fortunately for businesses, there are email secur…
 
One of the biggest problems when managing data is that vast quantities of it is scattered across data silos and multiple systems. The primary issue this causes is the inability to shape your business to your customers' demands. What's often forgotten about is that when that data also has transactional information, it becomes hard to monitor suspici…
 
2020 was comprised of big data breaches, leaks and new obstacles, leading to what many have dubbed a "Cybersecurity Pandemic." Surviving in these difficult times has been hard and more often than not, it's the people that suffer; in fact, 58% of breaches in the last year involved some level of personal data. The Cybersecurity Pandemic has affected …
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login