Podcasts, Articles, News and Insights From Enterprise Technology Leaders

Podcasts, articles, and news delivering analyst-led perspectives to help leaders navigate AI, data, cybersecurity, and infrastructure decisions.

Latest in Enterprise Technology

The C-Suite Guide to AI Strategy & Execution
Whitepaper

The C-Suite Guide to AI Strategy & Execution

Building a Semantic Layer and Enabling Generative AI for Enterprises
Whitepaper

Building a Semantic Layer and Enabling Generative AI for Enterprises

Meet EM360Tech's Experts

Gain actionable insights from leaders in enterprise technology and B2B tech marketing.
Anne Bailey
em360tech image

Anne Bailey

Senior Analyst at KuppingerCole Analysts
  • AI
  • Data
Jonathan Care
em360tech image

Jonathan Care

Senior Analyst at KuppingerCole Analysts AG
  • Security
George Firican
em360tech image

George Firican

Founder at Lights on Data Consulting & Training
  • Data
Blair Pleasant
em360tech image

Blair Pleasant

Co-Founder at UCStrategies
  • Emerging Technologies
Douglas Laney
em360tech image

Douglas Laney

Research and Advisory Fellow at BARC
  • Data
Kate Strachnyi
em360tech image

Kate Strachnyi

Founder at DATAcated
  • Data
Explore by Expertise

Exclusive EM360Tech Content

Discover expert led podcasts, articles, and news from enterprise technology leaders at EM360Tech, your source for B2B tech intelligence

Halliburton Cyber Attack Takes Down Critical Systems
Tech Article

Halliburton Cyber Attack Takes Down Critical Systems

em360tech image
Microchip Technology Shuts Systems Down After Cyber Attack
Tech Article

Microchip Technology Shuts Systems Down After Cyber Attack

em360tech image
Emerging Trends in Governance, Risk and Compliance (GRC) - 2024
Whitepaper

Emerging Trends in Governance, Risk and Compliance (GRC) - 2024

em360tech image
Rethinking Security in the Age of Zero Trust - ManageEngine
Podcast

Rethinking Security in the Age of Zero Trust - ManageEngine

em360tech image
Savvy: Identity-First SaaS Security
Whitepaper

Savvy: Identity-First SaaS Security

em360tech image
Savvy: Identity Security Checkup
Whitepaper

Savvy: Identity Security Checkup

em360tech image
Privacy by Default and Design: Essential for GDPR Compliance and Trust
Podcast

Privacy by Default and Design: Essential for GDPR Compliance and Trust

em360tech image
Is AI Losing its Hype? What Past Bubbles Have Taught Us
em360tech image
Tech Article
AI

Is AI Losing its Hype? What Past Bubbles Have Taught Us

Trump Uses AI Deepfakes to Fake Taylor Swift Endorsement
Tech Article

Trump Uses AI Deepfakes to Fake Taylor Swift Endorsement

em360tech image
Top 10 Best Cybersecurity Podcasts for CISOs 
Top 10

Top 10 Best Cybersecurity Podcasts for CISOs 

em360tech image
Separating Fact from Fiction in Hybrid Working
Tech Article

Separating Fact from Fiction in Hybrid Working

em360tech image
What is Cybersquatting and is It Illegal?
Tech Article

What is Cybersquatting and is It Illegal?

em360tech image
What is Privacy by Design and Default? An Essential guide
Tech Article

What is Privacy by Design and Default? An Essential guide

em360tech image
Top 10 Most Influential Women in Cybersecurity
Top 10

Top 10 Most Influential Women in Cybersecurity

em360tech image
AI and Big Data Expo Europe key agenda sessions
Press Release

AI and Big Data Expo Europe key agenda sessions

em360tech image
Black Hat and DEF CON Conference Recap - Cybersecurity Awesomeness
em360tech image
Podcast
Security

Black Hat and DEF CON Conference Recap - Cybersecurity Awesomeness

All Social Security Numbers Leaked in Massive Data Breach
Tech Article

All Social Security Numbers Leaked in Massive Data Breach

em360tech image
Zero Trust Security: Mastering the Weakest Link
Podcast

Zero Trust Security: Mastering the Weakest Link

1 min
em360tech image
Top 10 Facility Management Software Solutions for 2024
Top 10

Top 10 Facility Management Software Solutions for 2024

em360tech image
Communications Tech Events to Attend: An Analyst's Take
Tech Article

Communications Tech Events to Attend: An Analyst's Take

em360tech image
AI-Enabled Autonomous Weapons: Transforming Modern Warfare
Tech Article

AI-Enabled Autonomous Weapons: Transforming Modern Warfare

7 min
em360tech image
Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security
Podcast

Automated Network Pentesting: Your Secret Weapon in Cybersecurity - Vonahi Security

em360tech image