Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Blog Pricing
Podcast Image

Tech Transformed

Technology Business News

Episodes

Showing 201-300 of 316
«« ← Prev Page 3 of 4 Next → »»

The Risks of Generative AI

12 Apr 2023

Contributed by Lukas

Generative AI is the latest tech craze that has set the world on fire. From creating marketing copy and engaging emails to designing logos and co...

Zoho Analytics: Augmented Analytics and Data Storytelling are Shaping the Future of BI

11 Apr 2023

Contributed by Lukas

Augmented Analytics and Data Storytelling are two innovative technologies that are shaping the future of Business Intelligence (BI). Augment...

Workiva: Assessing ESG in Your GRC Strategy is Critical

05 Apr 2023

Contributed by Lukas

Assessing environmental, social, and governance (ESG) factors in your GRC strategy is critical as investors, customers, and regulators increasingly de...

Streamlining Identity Data to Protect Yourself in the Long Term

05 Apr 2023

Contributed by Lukas

Identity data is a valuable commodity in today's digital world. With data breaches and identity theft on the rise, it's more important than ever ...

Ascend.io: Data Pipeline Automation and Rethinking the Modern Data Stack

04 Apr 2023

Contributed by Lukas

Data pipeline automation is revolutionizing the way organisations handle data. This new approach to data management is challenging the traditiona...

Workiva: Balancing the Demands of GRC and ESG

30 Mar 2023

Contributed by Lukas

GRC (governance, risk management, and compliance) and ESG (environmental, social, and governance) are critical for companies to balance in today's bus...

Pivotree: Achieving Frictionless Commerce with DaaS

29 Mar 2023

Contributed by Lukas

Frictionless commerce is the ability to seamlessly find customers, establish trust, and transact and deliver products without any hiccups.However, ent...

How Intelligent Automation and Tooling Will Look in 2023

22 Mar 2023

Contributed by Lukas

Intelligent automation refers to the use of advanced technologies such as artificial intelligence, machine learning, and robotic process automation to...

Radware: Understanding Supply Chain Attacks and Client Side Protection

20 Mar 2023

Contributed by Lukas

Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attack...

Avantra: Deriving Value from Investing in Hyperautomation and AIOps

15 Mar 2023

Contributed by Lukas

Hyperautomation and AIOps are two of the most important technologies that are driving the digital transformation of businesses across the globe. ...

Controlling and Managing Shadow IT

15 Mar 2023

Contributed by Lukas

Shadow IT refers to the use of technology and IT systems within an organization without the approval or knowledge of the central IT department. T...

Orion Governance: Major Data Management Challenges Faced by Retailers

14 Mar 2023

Contributed by Lukas

Data management is essential for retailers to manage their data effectively to gain valuable insights into customer behavior, preferences, and purchas...

The Do’s and Don’ts of Risk Management

08 Mar 2023

Contributed by Lukas

Risk management is the process of identifying, assessing, and controlling threats to an organisation's capital and earnings. These risks can come in m...

Agile Lab: Implementing Data Mesh Initiatives

06 Mar 2023

Contributed by Lukas

In traditional data architecture, data was always centralised in a data warehouse or a data lake and governed by a centralised team. However, wit...

Echo Analytics: The Time to Invest in Location Intelligence is Now

06 Mar 2023

Contributed by Lukas

Location intelligence. Location intelligence is crucial for a company's data-driven decision-making process, providing insights into the relation...

Honeycomb: Measuring the Success of an Incident Response Program

02 Mar 2023

Contributed by Lukas

Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage ...

Origins of Business Agility and Why Companies Need it

01 Mar 2023

Contributed by Lukas

Business agility refers to the ability of a company to quickly adapt and respond to changes in the market and customer demands. In today's fast-paced ...

The Future of Enterprise Metaverse-as-a-Service

22 Feb 2023

Contributed by Lukas

Companies are using the metaverse in the workplace in a variety of ways. From using virtual reality environments to allow remote employees to wor...

Hyperproof: The Truth Behind Automating Compliance Controls

16 Feb 2023

Contributed by Lukas

Automating compliance controls refers to the use of technology to manage and monitor compliance with regulations and laws. The purpose of automat...

How Enterprises Need to Manage Third-Party Risk in 2023

15 Feb 2023

Contributed by Lukas

Managing third-party risk has become an increasingly important concern for enterprises as the use of third-party vendors and partners continues t...

Informatica: Using Data to Create a 360-Degree View of Your Business

13 Feb 2023

Contributed by Lukas

Data is the backbone of any successful business, and having a 360-degree view of it is crucial to understand the key metrics and drivers of the organi...

Data Ethics Will Shape Company Decisions in 2023

08 Feb 2023

Contributed by Lukas

Data ethics. The ever-changing landscape of how people perceive their personal data - and how companies use it - has been the subject of debate as dat...

Monte Carlo: Establishing Trust through Data Observability

06 Feb 2023

Contributed by Lukas

Data observability refers to the ability to collect, measure, and analyse data from various sources in order to understand the current state and behav...

Avoid Email When Transferring Sensitive Data

01 Feb 2023

Contributed by Lukas

Email security is vitally important for modern companies, with 95% using email as their main communication tool and 80% using email for sensitive data...

Digital Forensic Challenges in the Police Force

25 Jan 2023

Contributed by Lukas

Digital forensics have transformed crime prevention and the handling of cases permanently. With over 5,000 British police officers able to work c...

Chronosphere: The State of Cloud-Native Observability

23 Jan 2023

Contributed by Lukas

Cloud-native observability is a practice of rapidly detecting and remediating issues in complex and distributed systems.Observability of cloud-native ...

How Cyber Warfare is Changing Cybersecurity Forever

18 Jan 2023

Contributed by Lukas

Cyber warfare has changed cybersecurity forever. Rising tensions across the world have seen multiple state-sponsored attacks hit states...

Informatica: Predictive Data Intelligence and Leveling Up Your Business

16 Jan 2023

Contributed by Lukas

Predictive data intelligence is the use of data, AI-driven algorithms, and machine learning techniques to quickly connect data consumers with the most...

Portworx: Driving Data Services and Making Developers’ Lives Easier

12 Jan 2023

Contributed by Lukas

Containerisation is a method of packaging applications in a way that allows them to be easily deployed and run in different computing environments.Con...

Why Companies Need to Care about Contract Lifecycle Management

11 Jan 2023

Contributed by Lukas

Contract Lifecycle Management automates and streamlines everything related to a business' contract processes.From authoring and sharing to signing and...

Low Code, No Code - Revolution or Evolution?

04 Jan 2023

Contributed by Lukas

Low code and no code are popular alternatives to traditional software development that limit the amount of coding needed in a bid to make working on a...

What We Can Expect to See in Cybersecurity in 2023

21 Dec 2022

Contributed by Lukas

The last few years have seen rapid changes in the cybersecurity landscape.From work-from-home cybersecurity becoming a key part of companies’ strate...

What a Cyber-Secure Smart City Looks Like

14 Dec 2022

Contributed by Lukas

The smart city. A modern, urban area where technology is intertwined with and relied on by the overall infrastructure.Traffic flow, footfall, healthca...

Driving Data Adoption and Empowering Data Teams to Fuel Company Growth

07 Dec 2022

Contributed by Lukas

Driving data adoption. From prioritising BI and data-driven decisions to utilising powerful analytics tools, data adoption is key for businesses as th...

How to Avoid Inheriting a Data Breach During a Merger/Acquisition

23 Nov 2022

Contributed by Lukas

Mergers and acquisitions. A practice the tech industry itself is certainly no stranger to, M&A’s happen all the time and mark the consolidation ...

Intermedia: Cloud Migration is the Key to Enterprise Communications

23 Nov 2022

Contributed by Lukas

Enterprise communications consist of everything a company uses to connect its employees. Video meetings, instant messaging, dedicated phone exten...

Keyfactor: Why You Need to Care About Machine Identity

21 Nov 2022

Contributed by Lukas

Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of di...

The New EM360 Website: A Place to Publish, Learn and Earn

16 Nov 2022

Contributed by Lukas

Today's professional networking websites have devolved into the same reposting of social media nonsense.The content has strayed too far from what is r...

Radware: Bot Mitigation is Key for Application Protection

14 Nov 2022

Contributed by Lukas

Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from ...

The Critical Role of ESM in Unlocking Seamless EX

09 Nov 2022

Contributed by Lukas

Enterprise service management, or ESM, is the concept of applying IT service management to other areas of the business, with the common goal to improv...

Sifflet: Observability and the Future of Data Engineering

03 Nov 2022

Contributed by Lukas

Data engineering is how companies design and build systems for collecting and using their data at scale.A critical practice as companies are pressured...

Meet Lionfish Tech Advisors

02 Nov 2022

Contributed by Lukas

Who are Lionfish Tech Advisors?A team of premier IT Advisors, Lionfish comprises 25+ industry veterans who endeavour to advise some of the biggest fir...

Egnyte: Keeping Up With The Next Generation of Data Privacy

27 Oct 2022

Contributed by Lukas

Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated....

FaaS and How to Think Like a Cybercriminal

26 Oct 2022

Contributed by Lukas

Fraud-as-a-Service, or FaaS, allows the offer of DDoS attacks, stolen data and social media passwords for sale, and all available with one single clic...

Genestack: Why Data Management is the Key to Success in Life Sciences

24 Oct 2022

Contributed by Lukas

Data management is essential for the enterprise to get right, especially now as firms across all sectors are collecting and using vast amounts of data...

ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation

20 Oct 2022

Contributed by Lukas

IT service management, or ITSM, manages the delivery of IT services to employees and customers. A common misconception is that ITSM is basic IT suppor...

The Realm of Confidential Computing

20 Oct 2022

Contributed by Lukas

Confidential computing is a cloud technology that isolates sensitive data in a protected CPU enclave as it's processed. Accessible only to author...

Avantra and Managecore: Using Hyperautomation to Help SAP Customers Grow Their Business

13 Oct 2022

Contributed by Lukas

Hyperautomation is the business philosophy that the modern enterprise is using to rapidly automate SAP tasks and provide value back to the c...

Databricks: Building and Nurturing a Mature Data Culture

13 Oct 2022

Contributed by Lukas

Data culture is becoming an increasingly important philosophy in the modern enterprise. Making data-driven decisions is critical to the success o...

Beyond Identity: Software Supply Chain Attacks and the Best Defence

06 Oct 2022

Contributed by Lukas

A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. R...

Anomalo: Beginning your Data Quality Journey

06 Oct 2022

Contributed by Lukas

As data continues becoming a core part of how businesses operate and make decisions, managing data quality has never been so important. Poor data...

Safe Software: Making the Impossible Possible Using Spatial Data

03 Oct 2022

Contributed by Lukas

Spatial data, also known as geospatial data, affects our everyday lives.A term used to describe data related to locations on Earth’s surface, spatia...

Why Hybrid and Multi-Cloud are the New Normal for Data Warehouses

28 Sep 2022

Contributed by Lukas

Data warehouses are centralised repositories of information that can be repeatedly analysed and utilised to make more informed decisions. These a...

Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust

23 Sep 2022

Contributed by Lukas

As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbs...

Omada: The Pitfalls of IGA Deployments

23 Sep 2022

Contributed by Lukas

Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For compan...

Building an Effective Information Protection Program

21 Sep 2022

Contributed by Lukas

An information security program is the philosophy and group of practices that companies implement to protect essential business processes, data and as...

Anomalo: Why Data Quality Monitoring is Essential

16 Sep 2022

Contributed by Lukas

Data quality monitoring is a process that manages and ensures a high-standard data within an organisation. Performed through strategies like auto...

Orion Governance: Data Governance for the Digital Age

14 Sep 2022

Contributed by Lukas

Data governance in the modern world is the managing, utilising and securing of data in enterprise systems, and it’s becoming increasingly more impor...

Accelerating Trend Towards Personalised Customer Experiences

14 Sep 2022

Contributed by Lukas

Customer experience, or CX, is the impression your customer has from all aspects of their journey, and the way you collect, store and analyse their da...

What is Holding Back Companies’ Potential in Digital Transformation?

07 Sep 2022

Contributed by Lukas

It’s safe to say we’re witnessing a digital transformation revolution. Not just an integration of tech into all areas of a business, true tra...

Trusted Delivery is Vital for Cloud Native

31 Aug 2022

Contributed by Lukas

Cloud-native can mean a lot of different things. Coined by Netflix as they became the world’s largest on-demand consumer content provider, clou...

Incorta: Raw Data and the Art of Real-time Analytics

25 Aug 2022

Contributed by Lukas

Raw data is data that has not yet been processed for practical use. It, of course, has the potential to become real and actionable information - ...

The Future of Work in the Racing Industry

24 Aug 2022

Contributed by Lukas

Networking technology giant Cisco has this year expanded its partnership with McLaren Racing, providing collaboration infrastructure to enhance the F1...

2600Hz: The Evolution of Business Communication

24 Aug 2022

Contributed by Lukas

The evolution of business communication in the last 10 years, even the last 5 years, has been enormous. Trends toward group chat apps and video c...

Brytlyt: Data Discovery and the Next Generation of Business Intelligence

19 Aug 2022

Contributed by Lukas

Data discovery is a subset of business intelligence (BI), referring to the collecting and consolidating of data from multiple databases into a single ...

Why Least Privilege is the Future of Cybersecurity

17 Aug 2022

Contributed by Lukas

Least privilege is the philosophy which restricts access rights for users purely to the essentials. Providing employees with the minimal level of...

Safe Software: How Location Intelligence Powers Real-Time Decisions

16 Aug 2022

Contributed by Lukas

Location Intelligence (LI) is how we use data to answer spacial questions. It goes beyond visualising data on a map - in fact, the analysis of locatio...

The Low-Code Movement of SaaS

10 Aug 2022

Contributed by Lukas

Low-code development platforms have been around for over a decade, and provide an environment in which app software can be created through user interf...

How Deliveroo Used Slack to Deliver 1,000,000 Free Meals to NHS Frontline Staff

03 Aug 2022

Contributed by Lukas

When the pandemic forced employees to work out of their living rooms, companies had to be quick to adapt.Unified communications were needed more than ...

HID Global: Why Authentication is Still Such an Issue

02 Aug 2022

Contributed by Lukas

Authentication is the art of determining whether something is what it says it is. Passwords provide a great way for customers and consumers to ac...

Sensei Labs: The Key to Successful Sustained Transformation

01 Aug 2022

Contributed by Lukas

Sustained transformation allows for enterprises to create new business processes, culture, and customer experiences to meet new market requirements.&n...

Risks and Ethics of Digital Identity Verification

27 Jul 2022

Contributed by Lukas

The traditional face-to-face identity check has exhausted its welcome. Instantaneously proving our identities when online banking and booking fli...

Chronosphere: What to Expect from the Future of Observability

21 Jul 2022

Contributed by Lukas

Observability allows businesses to measure the internal state of a system by assessing its output. Credited with improving the performance of distribu...

Safe Software: How Data Powers our Society and Species for Tomorrow

21 Jul 2022

Contributed by Lukas

The trend of data at our fingertips is continuing. Virtually, everything we do is impacted by data. From driving your car to shopping to fig...

The Convergence of AI and HPC in the Enterprise

20 Jul 2022

Contributed by Lukas

We often hear about the importance of performance when it comes to data.But how can you ensure that storage solutions meet the demand for efficient ac...

Safe Software: How Data Powers our Society and Species for Tomorrow

19 Jul 2022

Contributed by Lukas

The trend of data at our fingertips is continuing. Virtually, everything we do is impacted by data. From driving your car to shopping to fig...

The Widespread Adoption of Business Automation

13 Jul 2022

Contributed by Lukas

From healthcare to finance, manufacturing, energy and more, business automation is taking the enterprise tech world by storm. The ubiquitous nature of...

Brytlyt: Making Deep Learning Available to Data Scientists

12 Jul 2022

Contributed by Lukas

Deep learning is a subgenre of machine learning and AI that mimics human behaviour - lending itself to predictive modelling and statistics. But h...

n8n.io: Rapid Product Development and the No-Code/Low Code Balance

12 Jul 2022

Contributed by Lukas

Rapid Product Development is a method of creation quickly gaining popularity; allowing developers to prove their concept and bring products to market ...

How to Build and Drive a Data Culture

06 Jul 2022

Contributed by Lukas

Enterprises accumulate huge amounts of data every single day. From your marketing departments to sales teams to social media strategies, your company ...

Brytlyt: MLOps and the Critical Role That Databases Play

29 Jun 2022

Contributed by Lukas

Machine Learning Operations, or MLOps, is a set of practices that aims to deploy and maintain machine learning models reliably and efficiently.Similar...

The Unstructured Data Revolution

29 Jun 2022

Contributed by Lukas

Unstructured data refers to the information that isn't arranged according to a pre-set data model, meaning it can’t be stored in a traditional datab...

The Paradox of API Security

22 Jun 2022

Contributed by Lukas

API security is a key component of modern web application security. But due to their common use, and their access to sensitive data, they are quickly ...

Tray.io: The Importance of Hyperautomation

17 Jun 2022

Contributed by Lukas

Hyperautomation refers to the approach businesses can take to rapidly automate as many IT and business processes as possible. Using RPA and low-c...

The Growing Importance of CI/CD

15 Jun 2022

Contributed by Lukas

Continuous integration and continuous delivery/deployment, or CI/CD, refers to the method used to deliver apps by introducing automation into the deve...

The Critical Infrastructure Sector’s Fight Against Ransomware

08 Jun 2022

Contributed by Lukas

Back in March, the FBI revealed that the majority of ransomware attacks against critical infrastructure target the healthcare industry. But why i...

Breaking Down Barriers With Automation

01 Jun 2022

Contributed by Lukas

Automation is well-known for facilitating higher production rates and allowing for more efficient use of materials across the worldwide workforce.But ...

Censys: The World of Attack Surface Management

30 May 2022

Contributed by Lukas

Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset manag...

Calamu: The Next Generation of Data Protection

27 May 2022

Contributed by Lukas

Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions ...

How can Businesses Fortify the 5G Edge Against new Cyber Threats?

25 May 2022

Contributed by Lukas

The explosion of 5G has resulted in organisations having more efficient signalling for Internet-of-Things (IoT) devices, faster connectivity speeds, a...

Darktrace: The Fast and Furious Nature of Cybersecurity

19 May 2022

Contributed by Lukas

The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech ...

Rapid7: How to Swiftly Respond to Modern Cyber Threats

18 May 2022

Contributed by Lukas

In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make pat...

Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain

17 May 2022

Contributed by Lukas

When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software ...

Findability Sciences: Adopting the Power of AI

12 May 2022

Contributed by Lukas

Artificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-sol...

Nebulon: Bringing the Cloud Experience On-Premises

11 May 2022

Contributed by Lukas

The cloud experience has had far-reaching benefits on all sectors within the enterprise. Digitally, cloud-based IT has evolved the capabilities of tec...

Sophos: The World of Cyber Insurance

10 May 2022

Contributed by Lukas

Cyber insurance helps to provide critical cover for those who need protection against digital threats.While businesses are responsible for their own c...

Safe Software: Digital Twins and Their Role Within the Data Space

05 May 2022

Contributed by Lukas

Digital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from c...

F-Secure: How Workforces can Combat Digital Anxiety

04 May 2022

Contributed by Lukas

A recent F-Secure survey of 7,200 internet users showed that two-thirds of remote workers have reported worrying about their online security and priva...

CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange

03 May 2022

Contributed by Lukas

Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat i...

SHI: Why is Full-Stack Observability so Important?

27 Apr 2022

Contributed by Lukas

Full-stack Observability (FSO) allows real-time monitoring across the whole modern technology stack - bringing applications, software, storage, servic...

«« ← Prev Page 3 of 4 Next → »»