Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Tech Transformed

Technology Business News

Episodes

Showing 101-200 of 316
«« ← Prev Page 2 of 4 Next → »»

Astera: Adopting AI-Driven Document Processing and Data Extraction

07 Mar 2024

Contributed by Lukas

Intelligent document processing (IDP) is a technology-driven approach that automates document processing and extraction of valuable information.While ...

Iguazio, McKinsey, and the Future of MLOps

06 Mar 2024

Contributed by Lukas

From the rise of generative AI to the EU AI Act, it’s been a particularly explosive year in the AI and ML space.With most industry surveys pointing ...

Getting Your Data Ready for AI

28 Feb 2024

Contributed by Lukas

Austin Kronz is the Director of Data Strategy at Atlan, a modern data workspace enabling better collaboration between diverse users like businesses, a...

FileCloud: Connecting Your Content Collaboration and Security Strategy

27 Feb 2024

Contributed by Lukas

Companies are evolving their approaches to managing content collaboration lifecycles, integrating security measures, and ensuring compliance with indu...

Customer Experience Predictions for 2024 and Beyond

21 Feb 2024

Contributed by Lukas

Prof. Steven van Belleghem is an international speaker, EM360 partnered analyst and one of the world’s leading experts in customer experience.H...

Pentera: Automated Security Validation and Empowering Pen Testing Teams

19 Feb 2024

Contributed by Lukas

Automated Security Validation. Involving tools, scripts and platforms to emulate true-to-life attacks, Automated Security Validation is a key part of ...

Cresta: How Generative AI is Transforming Customer Service

14 Feb 2024

Contributed by Lukas

Generative AI is changing the world of customer service. From deflection and reducing agent headcount using virtual agents/chatbots, or using aut...

Zero Networks: The Problem with VPNs

14 Feb 2024

Contributed by Lukas

It seems like VPN products are consistently the initial access vectors for ransomware groups and targetted attacks. This was demonstrated in the ...

The Future of Apps and CX Design

14 Feb 2024

Contributed by Lukas

Kevin Lee is the Chief Digital Officer, Consumer at BT Group. Responsible for the overall vision and strategy for all digital products and s...

How to Master Your Data Movement

07 Feb 2024

Contributed by Lukas

Data movement. The art and science behind moving data through the power of technology. An essential part of how modern businesses operate, the movemen...

Meteomatics: The World of Weather Data

06 Feb 2024

Contributed by Lukas

Rainfall. Temperature. Humidity. Natural disasters. Human methods of reading and predicting weather can be tracked all the way back to native tribes a...

Palo Alto Networks: The Role of Automation in Rapid Breach Response

06 Feb 2024

Contributed by Lukas

Rapid breach response. The art of quickly reacting to a security breach or incident. Key for minimising the impact of attacks and ensuring your team i...

Informatica: Why Data Products Are Critical for Driving Business Value

01 Feb 2024

Contributed by Lukas

Maximize business value with data products — they incorporate essential data and related capabilities to meet key business objectives. Data pro...

Thoropass: Fixing the Broken Audit Process

31 Jan 2024

Contributed by Lukas

The audit process is broken. CISOs and CTOs have faced a multitude of challenges under this outdated audit landscape, and the efficacy of companies ar...

Crafting the Best Customer Experience

31 Jan 2024

Contributed by Lukas

Violeta Martin is Vice President, Commercial Sales EMEA at DocuSign.She has over 15 years’ experience growing and leading high performing teams...

CloudSEK: The Future of Software Supply Chain Security

30 Jan 2024

Contributed by Lukas

In the world of complex supply chains, it’s not enough to secure our own data but also ensuring that third party vendors we work with have robust se...

Radware: Moving From Responsive Protection to Proactive Protection

24 Jan 2024

Contributed by Lukas

In 2024, the conventional approach of responding to threats is dead. As cyberspace becomes more complex, interconnected, and sophisticated, companies ...

The Future of AI Regulation

24 Jan 2024

Contributed by Lukas

Dr Clare Walsh is Director of Education at the Institute of Analytics (IoA) and is one of the world’s leading academic voices in data analytics and ...

The Dark Future of AI? A Conversation with Author Thomas R Weaver

10 Jan 2024

Contributed by Lukas

Thomas R Weaver is a tech entrepreneur and author of Artificial Wisdom, a new novel centred around whether AI might sacrifice certain human freed...

How Close is AI to Running All Enterprise Communications?

08 Jan 2024

Contributed by Lukas

AI has become widely used in enterprise communications in the wake of successful launches of multiple LLMs and strides in natural language processing....

Cresta: How AI is Impacting Customer Service

08 Jan 2024

Contributed by Lukas

What has been the impact of generative AI on CX and contact centers?The recent hype cycle has redefined investment strategies, prompting companies to ...

Harbr: Solving Data Access Headaches

08 Jan 2024

Contributed by Lukas

Data access is a critical aspect of how businesses manage and leverage their data to drive decision-making. With large volumes of data from vario...

AI, Analytics and Data Democratisation: Christina Stathopoulos’ Predictions for 2024

03 Jan 2024

Contributed by Lukas

Christina Stathopoulos is a leading voice in the data community, participating regularly as an international public speaker and educator in the f...

The Future of Communication: Jon Arnold’s Industry Predictions for 2024

20 Dec 2023

Contributed by Lukas

Jon Arnold is the Principal of J Arnold & Associates, an independent analyst providing thought leadership and go-to-market counsel with a foc...

Dremio: The State of the Data Lakehouse

18 Dec 2023

Contributed by Lukas

The data lakehouse has been quickly gaining popularity within the data management and analytics space. Combining elements of data lakes and data ...

OT Security and Why Critical Infrastructures Need It

13 Dec 2023

Contributed by Lukas

OT security, or Operational Technology security, focuses on safeguarding industrial control systems, supervisory control and data acquisition (SCADA) ...

Mezmo: Taking Control of Your Telemetry Data

12 Dec 2023

Contributed by Lukas

Telemetry data pipelines are designed to collect, process and transmit telemetry data from various sources towards a place where businesses can store,...

Palo Alto Networks: Using Threat Intelligence Effectively in Incident Investigation

30 Nov 2023

Contributed by Lukas

Using threat intelligence effectively in incident investigation is crucial for identifying, mitigating, and preventing cybersecurity threats. By ...

Workload Portability for Cross-Cloud Disaster Recovery and Migration

29 Nov 2023

Contributed by Lukas

Workload portability, a critical facet of modern computing, empowers businesses to seamlessly transfer applications and data across diverse environmen...

Fivetran: The Biggest Challenges Facing Data Leaders Today - And How to Solve Them

22 Nov 2023

Contributed by Lukas

In an era dominated by the relentless surge of information, data has become the lifeblood of modern businesses and organisations. As the volume, varie...

How AI Can Teach Us More About Human Responses

22 Nov 2023

Contributed by Lukas

Thomas Zoëga Ramsøy is the CEO and Founder of Neurons Inc.  A neuropsychologist by training and a Ph.D. in neurobiology and neuroimaging, ...

Informatica: Harnessing Data, AI and Cloud for a 360-Degree View of your Business

22 Nov 2023

Contributed by Lukas

Having a 360-degree view of your business means having a comprehensive and holistic understanding of every aspect of your organisation. It involv...

Radware: 360 Application Protection and Why Companies Need It

15 Nov 2023

Contributed by Lukas

Application security is a complex, wide-ranging field. With attackers using a wide range of attacks from credential stuffing to cookie poisoning,...

Driving Innovation for Virtualisation Solutions

15 Nov 2023

Contributed by Lukas

The Xen Project focuses on revolutionising virtualisation solutions by providing a versatile and powerful hypervisor that addresses the evolving needs...

Huntress: Doing More With Less in Your Cybersecurity Strategy

14 Nov 2023

Contributed by Lukas

Doing more with less. The art of optimising your cybersecurity strategy and resources to achieve effective protection against cyber threats. From...

Savvy: SaaS Identity Discovery and Visibility

13 Nov 2023

Contributed by Lukas

Securing Software as a Service (SaaS) applications is crucial to protect sensitive data, ensure user privacy, and maintain the overall integrity of th...

NetNut: Web Data Extraction and How to Turn Any Website Into Structured Data

09 Nov 2023

Contributed by Lukas

Web data extraction. The ability to transform any website into structured data.Using a residential proxy network, companies have been able to fine-tun...

Cyera: Why Data Defence is so Difficult in the TikTok Era

09 Nov 2023

Contributed by Lukas

Enabling the business to leverage data while preventing breaches are top priorities for CxOs and boards across industries. However, data security...

Pivotree: The Art of Perfecting Product Data at Scale and Speed

08 Nov 2023

Contributed by Lukas

Like1Play00:0024:02MuteProduct data that is clean, consistent and enriched with accurate information and descriptions gets re...

ITV’s Data Mesh Journey and Pioneering AI Implementation in Media

08 Nov 2023

Contributed by Lukas

Darren Wood is the Head of Data Product Strategy at ITV. With a decade-long career in product development in FTSE 100 companies, Darren is a visionary...

Cyera: How Generative AI is Driving Investments in Data Security

06 Nov 2023

Contributed by Lukas

No one knows how far gen AI can go in the enterprise but we know that it will be massive. Future platforms will certainly streamline and ensure effici...

Banking on Data: A Conversation with the Bank of England’s Data Management Lead

01 Nov 2023

Contributed by Lukas

Abel Aboh is the Data Management Lead at the Bank of England. Responsible for the design, development & delivery of one of the core Data Mana...

Zero Networks: We’re Sick of Zero Trust Too!

31 Oct 2023

Contributed by Lukas

Zero Trust is a security concept and framework that assumes no trust, even among users and systems inside the corporate network. Traditionally, n...

Precisely: Having the Right Data to Make Confident Business Decisions

26 Oct 2023

Contributed by Lukas

Like1Play00:0017:41MuteIn today's data-driven world, where 90% of business decisions rely on data, harnessing the power of enriched data is paramount ...

Blumira: Choosing the Right XDR Strategy In The Financial Industry

26 Oct 2023

Contributed by Lukas

XDR isn’t just a fancy term or the latest trend; it represents consolidating security tools, enhancing defences against sophisticated attacks, and r...

Huntress: The Future of Cybersecurity Leadership

25 Oct 2023

Contributed by Lukas

It’s officially the spooky season - but something scarier than ghosts, vampires and werewolves is striking fear into the hearts of cybersecurity lea...

NHS and the Power of Data in Improving the Client/Patient Experience

25 Oct 2023

Contributed by Lukas

How is the UK’s National Health Service using the power of data to improve the client/patient experience?Digital transformation has been a key part ...

Creating a Better World Using Data

18 Oct 2023

Contributed by Lukas

Natural disasters predicted. Accidents avoided. Lives saved. The importance of data for businesses has been well-documented - but how is it really imp...

Nile: It Has Never Been About the Network

13 Oct 2023

Contributed by Lukas

There is always a greater goal for networking. In the 2020s, IT leaders want their network to “get out of the way” and support their business...

Enterprise Technology and Its Power to Change the World

11 Oct 2023

Contributed by Lukas

Geoff Scott is a highly experienced technology leader with over two decades of experience in the enterprise technology space, specifically with SAP im...

Cyera: Revolutionising Data Security for the Cloud Era

10 Oct 2023

Contributed by Lukas

Rapidly accelerating technology advances, the recognized value of data, and increasing data literacy are changing what it means to be "data driven."&n...

Fivetran: The Enterprise Data Platform

04 Oct 2023

Contributed by Lukas

Fivetran automates data movement out of, into and across cloud data platforms. It automates the most time-consuming parts of the ELT process from...

Mastering Network Management and Performance

04 Oct 2023

Contributed by Lukas

Network management is incredibly important for companies in the modern age.Monitoring, securing and maintaining computer networks is integral to ensur...

The Real Value of Data

27 Sep 2023

Contributed by Lukas

The cloud plays a pivotal role in business data by enabling efficient storage, processing, and analysis.It allows organisations to scale their data in...

Data Storytelling is Critical in Achieving Success

20 Sep 2023

Contributed by Lukas

Data storytelling. One of the hottest non-tech trends in the tech space, telling your data story has been critical for data management leaders to secu...

Network Asset Discovery and the World of Incident Response

13 Sep 2023

Contributed by Lukas

Network Asset Discovery is the process of identifying and cataloguing all devices, resources, and services present within a computer network. Thi...

Revelate: Finding Success with Data Products

12 Sep 2023

Contributed by Lukas

Data productization. The art of turning raw data into business-ready consumable data products. Applying product management principles to data man...

Reinventing Fraud Recovery and Disputes

06 Sep 2023

Contributed by Lukas

Over £1,200,000,000 was stolen through fraud last year in the UK alone, with nearly 80% of that being conducted online*.With cases like these rising,...

Pivotree and Syndigo: Unlocking Value Through Content Strategy

04 Sep 2023

Contributed by Lukas

What is the relationship between product content and customer experience?A symbiotic one, say experts, but what technologies need to be implemented an...

Why Data Events and the Data Community are so Important

30 Aug 2023

Contributed by Lukas

The data community is incredibly important.From knowledge sharing and collaboration to staying updated with trends, the community of data professional...

The Future of Automation for Enterprises

23 Aug 2023

Contributed by Lukas

Automation streamlines repetitive tasks, reducing the time and effort required to complete them. This allows employees to dedicate their time and skil...

CyberMaxx: Monitoring Cyber Risk and How Offence Fuels Defence

21 Aug 2023

Contributed by Lukas

Monitoring cyber risk is essential in today's interconnected landscape. Involving continuous assessment of vulnerabilities, threat detection, and...

Why Big Data LDN is Unmissable this September

16 Aug 2023

Contributed by Lukas

Big Data LDN (London) is the UK’s leading free-to-attend data, analytics & AI conference and exhibition, hosting leading data, analytics & A...

Using Generative AI to Boost Data Engineer Productivity

09 Aug 2023

Contributed by Lukas

Generative AI has had an unprecedented impact on the world of enterprise tech. From applications within cybersecurity to handling data, the brigh...

Salvador Technologies: The Art of Cyber Attack Recovery

04 Aug 2023

Contributed by Lukas

The aftermath of a cyber attack for a business can be devastating and may have significant short-term and long-term consequences. The extent of t...

TrustArc: The Evolution of Privacy Laws

03 Aug 2023

Contributed by Lukas

Privacy laws are legal regulations that aim to protect the privacy and personal information of individuals. Designed to govern the collection, us...

Lack of Awareness is the Main Barrier to Entering Tech Industry

02 Aug 2023

Contributed by Lukas

What might be stopping young people from pursuing a career within the tech industry?A lack of awareness, suggests some experts - with current careers ...

TrustArc: Why a Company-Wide Privacy Culture is Important

01 Aug 2023

Contributed by Lukas

Developing a company-wide privacy culture is crucial in today's data-driven world where personal information is constantly being collected and process...

Optimising a Hybrid Data Management Approach

26 Jul 2023

Contributed by Lukas

Unstructured data refers to any data that does not have a predefined or organized format. It does not fit neatly into traditional databases or tables,...

How AI Helps Deutsche Post DHL Empower Their 600,000 Employees

19 Jul 2023

Contributed by Lukas

How is the world’s leading logistic company using AI across their business to improve the work lives of its 600,000+ employees?Deutsche Post DHL Gro...

How the Role of CDO is Changing Forever

12 Jul 2023

Contributed by Lukas

Chief Data Officers, or CDOs, are responsible for all of the data-related activities of an organisation. From ensuring data quality and integrati...

HollandParker: Corporate Performance Management and Why It’s So Important

11 Jul 2023

Contributed by Lukas

Corporate Performance Management (CPM) is a set of processes, methodologies, and tools used by organisations to measure and manage their performance a...

Precisely: Improving Your Business Data With Data Enrichment

10 Jul 2023

Contributed by Lukas

Data enrichment means combining your organisation’s internal data with data from third-party sources to make it more valuable, accurate, and insight...

The Impact of AI on Geospatial Data Integration

05 Jul 2023

Contributed by Lukas

Everyone’s talking about AI right now. It’s proven to be one of the biggest disruptors to the tech space post-Covid, but how has it affected ...

Red Sift: Brand Protection is Key for Your Security Strategy

29 Jun 2023

Contributed by Lukas

A recent Gartner report stated that companies that implement CTEM (continuous threat exposure management) will be three times less likely to suffer fr...

The Importance of Data Modernisation

28 Jun 2023

Contributed by Lukas

Data modernisation is becoming increasingly important to CIOs and CTOs in today’s world. From leveraging modern technologies to improving perfo...

Aisera: Leveraging AI to Meet Employee and Customer Experience Goals

23 Jun 2023

Contributed by Lukas

The rise of generative AI and its seemingly unlimited potential in the world of work has been well-documented in recent months.But how can this new, h...

MineOS: AI and Data Privacy - Where Do They Intersect?

21 Jun 2023

Contributed by Lukas

The rise of AI has been well-documented over the last year, but one ever-present concern that has risen alongside has been how generative models inter...

Fivetran: Takeaways From The Modern Data Stack Roadshow

15 Jun 2023

Contributed by Lukas

Is the modern data stack dead? How can you better leverage your MDS? And how can you stay ahead of the curve in a market which is seeing more and more...

Why CISOs Need to Care About Active Directory Security

14 Jun 2023

Contributed by Lukas

Active Directory security is crucial for maintaining the confidentiality, integrity, and availability of an organisation's network resources and data....

ThreatLocker: Deny-by-Default and Being Proactive With Your Cybersecurity

08 Jun 2023

Contributed by Lukas

From ruthlessly targeting BFSIs to leaking the personal data of cancer patients, the horror stories that surround serious cybercrime are worse than ev...

CRUX: The Agile Approach to External Data Integration

07 Jun 2023

Contributed by Lukas

External data integration is crucial for organisations seeking to enhance their understanding of customers, markets, and industry trends.By leveraging...

How Cybercriminals Manage to go Undetected for Months

07 Jun 2023

Contributed by Lukas

During his 16 years at the FBI fighting cybercrime targeting U.S. companies and entities, Jason Manar, now Chief Information Security Officer at ...

Hadrian: Continuous Threat Exposure Management as a Way to Benchmark CISO Success

06 Jun 2023

Contributed by Lukas

Earlier this year, Gartner predicted that companies that implement Continuous Threat Exposure Management, or CTEM, will have 3x fewer incidents year-o...

Portworx: Solving Developer Productivity Challenges

02 Jun 2023

Contributed by Lukas

In today's highly competitive digital landscape, software development has become the cornerstone of innovation and progress.From creating cutting-edge...

Cresta: Generative AI Revolutionising the Contact Centre

01 Jun 2023

Contributed by Lukas

Generative AI has taken the enterprise tech world by storm, and its growing influence within the contact centre space is no different. So how has...

Rapid7: Scaling Cybersecurity Into a Business Process

31 May 2023

Contributed by Lukas

In today's interconnected world, where technology plays a vital role in our personal and professional lives, the effectiveness of cybersecurity measur...

BlackFog: DLP is Dead - Long Live Data Exfiltration!

31 May 2023

Contributed by Lukas

Data exfiltration has become a serious issue for companies in today’s world.The unauthorised removal and theft of company data are becoming more com...

Dissecting the UK Online Safety Bill

24 May 2023

Contributed by Lukas

The UK’s new Online Safety Bill is a new set of laws to protect children and adults online, with a key part compelling social media companies to be ...

Tackling Productivity Challenges in the Modern Workplace

17 May 2023

Contributed by Lukas

In today's fast-paced and highly competitive work environment, productivity is essential for success. To tackle productivity in the modern workpl...

Dremio: Hadoop Migration and Moving to Frictionless Cloud

12 May 2023

Contributed by Lukas

Moving from an on-prem infrastructure to a frictionless cloud model has become a key goal for many companies. From scalability to improved securi...

Preventative Measures and Being One Step Ahead of Cyber Attackers

10 May 2023

Contributed by Lukas

From protection of sensitive data to ensuring business continuity, being one step ahead of cybercriminals and threat actors is key to surviving as a b...

HID Global: Physical Identity Challenges in the Healthcare Industry

09 May 2023

Contributed by Lukas

Physical identity plays a crucial role in security. Through biometric authentication technology like facial recognition and iris reading to fingerprin...

FOSSA: Understanding SCA Tools to Master Your Risk Management

05 May 2023

Contributed by Lukas

SCA (Software Composition Analysis) tools are crucial for effective risk management in software development. These tools help to identify and mitigate...

Managing Your ML Lifecycle

03 May 2023

Contributed by Lukas

Machine learning (ML) systems can provide several benefits to organisations. From improved efficiency and productivity to enhanced decision-makin...

Working in the Age of Generative AI

26 Apr 2023

Contributed by Lukas

Working in the age of generative AI presents both opportunities and challenges. On one hand, the ability to automate certain tasks and generate new id...

TrustArc: Effectively Managing Third-Party Risk

21 Apr 2023

Contributed by Lukas

Effectively managing third-party risk has become crucial for companies.Not only is it key to helping protect a company's reputation, which is crucial ...

Blumira: Difficulties SMEs Face with Cybersecurity

21 Apr 2023

Contributed by Lukas

Small and medium-sized enterprises (SMEs) face numerous challenges when it comes to cybersecurity. One of the most significant challenges is the ...

The Risks Cyberattacks Now Pose to Human Life

19 Apr 2023

Contributed by Lukas

Cyberattacks have evolved beyond data theft and financial fraud to pose a real risk to human life. From power grids to medical devices, many crit...

Astera: Building Data Platforms With a Modern Data Stack

14 Apr 2023

Contributed by Lukas

Data management platforms (DMPs) have soared in popularity over the last decade, as understanding and gaining value from data has become a big priorit...

«« ← Prev Page 2 of 4 Next → »»