Tech Transformed
Episodes
The Risks of Generative AI
12 Apr 2023
Contributed by Lukas
Generative AI is the latest tech craze that has set the world on fire. From creating marketing copy and engaging emails to designing logos and co...
Zoho Analytics: Augmented Analytics and Data Storytelling are Shaping the Future of BI
11 Apr 2023
Contributed by Lukas
Augmented Analytics and Data Storytelling are two innovative technologies that are shaping the future of Business Intelligence (BI). Augment...
Workiva: Assessing ESG in Your GRC Strategy is Critical
05 Apr 2023
Contributed by Lukas
Assessing environmental, social, and governance (ESG) factors in your GRC strategy is critical as investors, customers, and regulators increasingly de...
Streamlining Identity Data to Protect Yourself in the Long Term
05 Apr 2023
Contributed by Lukas
Identity data is a valuable commodity in today's digital world. With data breaches and identity theft on the rise, it's more important than ever ...
Ascend.io: Data Pipeline Automation and Rethinking the Modern Data Stack
04 Apr 2023
Contributed by Lukas
Data pipeline automation is revolutionizing the way organisations handle data. This new approach to data management is challenging the traditiona...
Workiva: Balancing the Demands of GRC and ESG
30 Mar 2023
Contributed by Lukas
GRC (governance, risk management, and compliance) and ESG (environmental, social, and governance) are critical for companies to balance in today's bus...
Pivotree: Achieving Frictionless Commerce with DaaS
29 Mar 2023
Contributed by Lukas
Frictionless commerce is the ability to seamlessly find customers, establish trust, and transact and deliver products without any hiccups.However, ent...
How Intelligent Automation and Tooling Will Look in 2023
22 Mar 2023
Contributed by Lukas
Intelligent automation refers to the use of advanced technologies such as artificial intelligence, machine learning, and robotic process automation to...
Radware: Understanding Supply Chain Attacks and Client Side Protection
20 Mar 2023
Contributed by Lukas
Supply chain attacks occur when hackers compromise a third-party vendor's software or hardware, which then infects the vendor's customers. Such attack...
Avantra: Deriving Value from Investing in Hyperautomation and AIOps
15 Mar 2023
Contributed by Lukas
Hyperautomation and AIOps are two of the most important technologies that are driving the digital transformation of businesses across the globe. ...
Controlling and Managing Shadow IT
15 Mar 2023
Contributed by Lukas
Shadow IT refers to the use of technology and IT systems within an organization without the approval or knowledge of the central IT department. T...
Orion Governance: Major Data Management Challenges Faced by Retailers
14 Mar 2023
Contributed by Lukas
Data management is essential for retailers to manage their data effectively to gain valuable insights into customer behavior, preferences, and purchas...
The Do’s and Don’ts of Risk Management
08 Mar 2023
Contributed by Lukas
Risk management is the process of identifying, assessing, and controlling threats to an organisation's capital and earnings. These risks can come in m...
Agile Lab: Implementing Data Mesh Initiatives
06 Mar 2023
Contributed by Lukas
In traditional data architecture, data was always centralised in a data warehouse or a data lake and governed by a centralised team. However, wit...
Echo Analytics: The Time to Invest in Location Intelligence is Now
06 Mar 2023
Contributed by Lukas
Location intelligence. Location intelligence is crucial for a company's data-driven decision-making process, providing insights into the relation...
Honeycomb: Measuring the Success of an Incident Response Program
02 Mar 2023
Contributed by Lukas
Incident response is the action taken to detect, triage, analyse, and remediate problems in software with the ultimate goal of minimising damage ...
Origins of Business Agility and Why Companies Need it
01 Mar 2023
Contributed by Lukas
Business agility refers to the ability of a company to quickly adapt and respond to changes in the market and customer demands. In today's fast-paced ...
The Future of Enterprise Metaverse-as-a-Service
22 Feb 2023
Contributed by Lukas
Companies are using the metaverse in the workplace in a variety of ways. From using virtual reality environments to allow remote employees to wor...
Hyperproof: The Truth Behind Automating Compliance Controls
16 Feb 2023
Contributed by Lukas
Automating compliance controls refers to the use of technology to manage and monitor compliance with regulations and laws. The purpose of automat...
How Enterprises Need to Manage Third-Party Risk in 2023
15 Feb 2023
Contributed by Lukas
Managing third-party risk has become an increasingly important concern for enterprises as the use of third-party vendors and partners continues t...
Informatica: Using Data to Create a 360-Degree View of Your Business
13 Feb 2023
Contributed by Lukas
Data is the backbone of any successful business, and having a 360-degree view of it is crucial to understand the key metrics and drivers of the organi...
Data Ethics Will Shape Company Decisions in 2023
08 Feb 2023
Contributed by Lukas
Data ethics. The ever-changing landscape of how people perceive their personal data - and how companies use it - has been the subject of debate as dat...
Monte Carlo: Establishing Trust through Data Observability
06 Feb 2023
Contributed by Lukas
Data observability refers to the ability to collect, measure, and analyse data from various sources in order to understand the current state and behav...
Avoid Email When Transferring Sensitive Data
01 Feb 2023
Contributed by Lukas
Email security is vitally important for modern companies, with 95% using email as their main communication tool and 80% using email for sensitive data...
Digital Forensic Challenges in the Police Force
25 Jan 2023
Contributed by Lukas
Digital forensics have transformed crime prevention and the handling of cases permanently. With over 5,000 British police officers able to work c...
Chronosphere: The State of Cloud-Native Observability
23 Jan 2023
Contributed by Lukas
Cloud-native observability is a practice of rapidly detecting and remediating issues in complex and distributed systems.Observability of cloud-native ...
How Cyber Warfare is Changing Cybersecurity Forever
18 Jan 2023
Contributed by Lukas
Cyber warfare has changed cybersecurity forever. Rising tensions across the world have seen multiple state-sponsored attacks hit states...
Informatica: Predictive Data Intelligence and Leveling Up Your Business
16 Jan 2023
Contributed by Lukas
Predictive data intelligence is the use of data, AI-driven algorithms, and machine learning techniques to quickly connect data consumers with the most...
Portworx: Driving Data Services and Making Developers’ Lives Easier
12 Jan 2023
Contributed by Lukas
Containerisation is a method of packaging applications in a way that allows them to be easily deployed and run in different computing environments.Con...
Why Companies Need to Care about Contract Lifecycle Management
11 Jan 2023
Contributed by Lukas
Contract Lifecycle Management automates and streamlines everything related to a business' contract processes.From authoring and sharing to signing and...
Low Code, No Code - Revolution or Evolution?
04 Jan 2023
Contributed by Lukas
Low code and no code are popular alternatives to traditional software development that limit the amount of coding needed in a bid to make working on a...
What We Can Expect to See in Cybersecurity in 2023
21 Dec 2022
Contributed by Lukas
The last few years have seen rapid changes in the cybersecurity landscape.From work-from-home cybersecurity becoming a key part of companies’ strate...
What a Cyber-Secure Smart City Looks Like
14 Dec 2022
Contributed by Lukas
The smart city. A modern, urban area where technology is intertwined with and relied on by the overall infrastructure.Traffic flow, footfall, healthca...
Driving Data Adoption and Empowering Data Teams to Fuel Company Growth
07 Dec 2022
Contributed by Lukas
Driving data adoption. From prioritising BI and data-driven decisions to utilising powerful analytics tools, data adoption is key for businesses as th...
How to Avoid Inheriting a Data Breach During a Merger/Acquisition
23 Nov 2022
Contributed by Lukas
Mergers and acquisitions. A practice the tech industry itself is certainly no stranger to, M&A’s happen all the time and mark the consolidation ...
Intermedia: Cloud Migration is the Key to Enterprise Communications
23 Nov 2022
Contributed by Lukas
Enterprise communications consist of everything a company uses to connect its employees. Video meetings, instant messaging, dedicated phone exten...
Keyfactor: Why You Need to Care About Machine Identity
21 Nov 2022
Contributed by Lukas
Machine identity is an essential part of ensuring companies maintain a good level of data security and structural integrity. The management of di...
The New EM360 Website: A Place to Publish, Learn and Earn
16 Nov 2022
Contributed by Lukas
Today's professional networking websites have devolved into the same reposting of social media nonsense.The content has strayed too far from what is r...
Radware: Bot Mitigation is Key for Application Protection
14 Nov 2022
Contributed by Lukas
Bot mitigation helps enterprises to identify and block unwanted bot traffic as it hits your network.And with half of all internet traffic coming from ...
The Critical Role of ESM in Unlocking Seamless EX
09 Nov 2022
Contributed by Lukas
Enterprise service management, or ESM, is the concept of applying IT service management to other areas of the business, with the common goal to improv...
Sifflet: Observability and the Future of Data Engineering
03 Nov 2022
Contributed by Lukas
Data engineering is how companies design and build systems for collecting and using their data at scale.A critical practice as companies are pressured...
Meet Lionfish Tech Advisors
02 Nov 2022
Contributed by Lukas
Who are Lionfish Tech Advisors?A team of premier IT Advisors, Lionfish comprises 25+ industry veterans who endeavour to advise some of the biggest fir...
Egnyte: Keeping Up With The Next Generation of Data Privacy
27 Oct 2022
Contributed by Lukas
Data privacy. The ever-changing landscape of collecting and sharing personal data is complex, with attitudes and regulations constantly being updated....
FaaS and How to Think Like a Cybercriminal
26 Oct 2022
Contributed by Lukas
Fraud-as-a-Service, or FaaS, allows the offer of DDoS attacks, stolen data and social media passwords for sale, and all available with one single clic...
Genestack: Why Data Management is the Key to Success in Life Sciences
24 Oct 2022
Contributed by Lukas
Data management is essential for the enterprise to get right, especially now as firms across all sectors are collecting and using vast amounts of data...
ManageEngine: Thinking Beyond ITSM and Achieving Enterprise Automation
20 Oct 2022
Contributed by Lukas
IT service management, or ITSM, manages the delivery of IT services to employees and customers. A common misconception is that ITSM is basic IT suppor...
The Realm of Confidential Computing
20 Oct 2022
Contributed by Lukas
Confidential computing is a cloud technology that isolates sensitive data in a protected CPU enclave as it's processed. Accessible only to author...
Avantra and Managecore: Using Hyperautomation to Help SAP Customers Grow Their Business
13 Oct 2022
Contributed by Lukas
Hyperautomation is the business philosophy that the modern enterprise is using to rapidly automate SAP tasks and provide value back to the c...
Databricks: Building and Nurturing a Mature Data Culture
13 Oct 2022
Contributed by Lukas
Data culture is becoming an increasingly important philosophy in the modern enterprise. Making data-driven decisions is critical to the success o...
Beyond Identity: Software Supply Chain Attacks and the Best Defence
06 Oct 2022
Contributed by Lukas
A software supply chain attack is when someone infiltrates your system by attacking a third-party provider or partner with access to your data. R...
Anomalo: Beginning your Data Quality Journey
06 Oct 2022
Contributed by Lukas
As data continues becoming a core part of how businesses operate and make decisions, managing data quality has never been so important. Poor data...
Safe Software: Making the Impossible Possible Using Spatial Data
03 Oct 2022
Contributed by Lukas
Spatial data, also known as geospatial data, affects our everyday lives.A term used to describe data related to locations on Earth’s surface, spatia...
Why Hybrid and Multi-Cloud are the New Normal for Data Warehouses
28 Sep 2022
Contributed by Lukas
Data warehouses are centralised repositories of information that can be repeatedly analysed and utilised to make more informed decisions. These a...
Threatlocker: Stay Ahead of the Changing Attack Landscape using Zero Trust
23 Sep 2022
Contributed by Lukas
As an IT Professional, you know that cyberattacks are ever-increasing, and businesses must do everything they can to ensure they remain protected.&nbs...
Omada: The Pitfalls of IGA Deployments
23 Sep 2022
Contributed by Lukas
Identity Governance and Administration (IGA) systems are a fundamental part of an enterprises identity and access management strategy. For compan...
Building an Effective Information Protection Program
21 Sep 2022
Contributed by Lukas
An information security program is the philosophy and group of practices that companies implement to protect essential business processes, data and as...
Anomalo: Why Data Quality Monitoring is Essential
16 Sep 2022
Contributed by Lukas
Data quality monitoring is a process that manages and ensures a high-standard data within an organisation. Performed through strategies like auto...
Orion Governance: Data Governance for the Digital Age
14 Sep 2022
Contributed by Lukas
Data governance in the modern world is the managing, utilising and securing of data in enterprise systems, and it’s becoming increasingly more impor...
Accelerating Trend Towards Personalised Customer Experiences
14 Sep 2022
Contributed by Lukas
Customer experience, or CX, is the impression your customer has from all aspects of their journey, and the way you collect, store and analyse their da...
What is Holding Back Companies’ Potential in Digital Transformation?
07 Sep 2022
Contributed by Lukas
It’s safe to say we’re witnessing a digital transformation revolution. Not just an integration of tech into all areas of a business, true tra...
Trusted Delivery is Vital for Cloud Native
31 Aug 2022
Contributed by Lukas
Cloud-native can mean a lot of different things. Coined by Netflix as they became the world’s largest on-demand consumer content provider, clou...
Incorta: Raw Data and the Art of Real-time Analytics
25 Aug 2022
Contributed by Lukas
Raw data is data that has not yet been processed for practical use. It, of course, has the potential to become real and actionable information - ...
The Future of Work in the Racing Industry
24 Aug 2022
Contributed by Lukas
Networking technology giant Cisco has this year expanded its partnership with McLaren Racing, providing collaboration infrastructure to enhance the F1...
2600Hz: The Evolution of Business Communication
24 Aug 2022
Contributed by Lukas
The evolution of business communication in the last 10 years, even the last 5 years, has been enormous. Trends toward group chat apps and video c...
Brytlyt: Data Discovery and the Next Generation of Business Intelligence
19 Aug 2022
Contributed by Lukas
Data discovery is a subset of business intelligence (BI), referring to the collecting and consolidating of data from multiple databases into a single ...
Why Least Privilege is the Future of Cybersecurity
17 Aug 2022
Contributed by Lukas
Least privilege is the philosophy which restricts access rights for users purely to the essentials. Providing employees with the minimal level of...
Safe Software: How Location Intelligence Powers Real-Time Decisions
16 Aug 2022
Contributed by Lukas
Location Intelligence (LI) is how we use data to answer spacial questions. It goes beyond visualising data on a map - in fact, the analysis of locatio...
The Low-Code Movement of SaaS
10 Aug 2022
Contributed by Lukas
Low-code development platforms have been around for over a decade, and provide an environment in which app software can be created through user interf...
How Deliveroo Used Slack to Deliver 1,000,000 Free Meals to NHS Frontline Staff
03 Aug 2022
Contributed by Lukas
When the pandemic forced employees to work out of their living rooms, companies had to be quick to adapt.Unified communications were needed more than ...
HID Global: Why Authentication is Still Such an Issue
02 Aug 2022
Contributed by Lukas
Authentication is the art of determining whether something is what it says it is. Passwords provide a great way for customers and consumers to ac...
Sensei Labs: The Key to Successful Sustained Transformation
01 Aug 2022
Contributed by Lukas
Sustained transformation allows for enterprises to create new business processes, culture, and customer experiences to meet new market requirements.&n...
Risks and Ethics of Digital Identity Verification
27 Jul 2022
Contributed by Lukas
The traditional face-to-face identity check has exhausted its welcome. Instantaneously proving our identities when online banking and booking fli...
Chronosphere: What to Expect from the Future of Observability
21 Jul 2022
Contributed by Lukas
Observability allows businesses to measure the internal state of a system by assessing its output. Credited with improving the performance of distribu...
Safe Software: How Data Powers our Society and Species for Tomorrow
21 Jul 2022
Contributed by Lukas
The trend of data at our fingertips is continuing. Virtually, everything we do is impacted by data. From driving your car to shopping to fig...
The Convergence of AI and HPC in the Enterprise
20 Jul 2022
Contributed by Lukas
We often hear about the importance of performance when it comes to data.But how can you ensure that storage solutions meet the demand for efficient ac...
Safe Software: How Data Powers our Society and Species for Tomorrow
19 Jul 2022
Contributed by Lukas
The trend of data at our fingertips is continuing. Virtually, everything we do is impacted by data. From driving your car to shopping to fig...
The Widespread Adoption of Business Automation
13 Jul 2022
Contributed by Lukas
From healthcare to finance, manufacturing, energy and more, business automation is taking the enterprise tech world by storm. The ubiquitous nature of...
Brytlyt: Making Deep Learning Available to Data Scientists
12 Jul 2022
Contributed by Lukas
Deep learning is a subgenre of machine learning and AI that mimics human behaviour - lending itself to predictive modelling and statistics. But h...
n8n.io: Rapid Product Development and the No-Code/Low Code Balance
12 Jul 2022
Contributed by Lukas
Rapid Product Development is a method of creation quickly gaining popularity; allowing developers to prove their concept and bring products to market ...
How to Build and Drive a Data Culture
06 Jul 2022
Contributed by Lukas
Enterprises accumulate huge amounts of data every single day. From your marketing departments to sales teams to social media strategies, your company ...
Brytlyt: MLOps and the Critical Role That Databases Play
29 Jun 2022
Contributed by Lukas
Machine Learning Operations, or MLOps, is a set of practices that aims to deploy and maintain machine learning models reliably and efficiently.Similar...
The Unstructured Data Revolution
29 Jun 2022
Contributed by Lukas
Unstructured data refers to the information that isn't arranged according to a pre-set data model, meaning it can’t be stored in a traditional datab...
The Paradox of API Security
22 Jun 2022
Contributed by Lukas
API security is a key component of modern web application security. But due to their common use, and their access to sensitive data, they are quickly ...
Tray.io: The Importance of Hyperautomation
17 Jun 2022
Contributed by Lukas
Hyperautomation refers to the approach businesses can take to rapidly automate as many IT and business processes as possible. Using RPA and low-c...
The Growing Importance of CI/CD
15 Jun 2022
Contributed by Lukas
Continuous integration and continuous delivery/deployment, or CI/CD, refers to the method used to deliver apps by introducing automation into the deve...
The Critical Infrastructure Sector’s Fight Against Ransomware
08 Jun 2022
Contributed by Lukas
Back in March, the FBI revealed that the majority of ransomware attacks against critical infrastructure target the healthcare industry. But why i...
Breaking Down Barriers With Automation
01 Jun 2022
Contributed by Lukas
Automation is well-known for facilitating higher production rates and allowing for more efficient use of materials across the worldwide workforce.But ...
Censys: The World of Attack Surface Management
30 May 2022
Contributed by Lukas
Attack surface management is the sustained monitoring, classifying, and inventory of a businesses IT infrastructure.It sounds as simple as asset manag...
Calamu: The Next Generation of Data Protection
27 May 2022
Contributed by Lukas
Businesses today are under increasing pressure to level up data security as ransomware and data theft continue to rise. Data-first security solutions ...
How can Businesses Fortify the 5G Edge Against new Cyber Threats?
25 May 2022
Contributed by Lukas
The explosion of 5G has resulted in organisations having more efficient signalling for Internet-of-Things (IoT) devices, faster connectivity speeds, a...
Darktrace: The Fast and Furious Nature of Cybersecurity
19 May 2022
Contributed by Lukas
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech ...
Rapid7: How to Swiftly Respond to Modern Cyber Threats
18 May 2022
Contributed by Lukas
In 2021, more than half of all widespread threats began with a zero-day exploit that was targetted by threat actors before vendors could even make pat...
Secureworks: Combining Social Engineering Attacks in a Cyber Kill Chain
17 May 2022
Contributed by Lukas
When it comes to cybercrime and cybersecurity threats, social engineering attacks are unique in the way that they rely on human error versus software ...
Findability Sciences: Adopting the Power of AI
12 May 2022
Contributed by Lukas
Artificial intelligence. The catch-all term defines the machines that can mimic and display sentient cognitive skills such as learning and problem-sol...
Nebulon: Bringing the Cloud Experience On-Premises
11 May 2022
Contributed by Lukas
The cloud experience has had far-reaching benefits on all sectors within the enterprise. Digitally, cloud-based IT has evolved the capabilities of tec...
Sophos: The World of Cyber Insurance
10 May 2022
Contributed by Lukas
Cyber insurance helps to provide critical cover for those who need protection against digital threats.While businesses are responsible for their own c...
Safe Software: Digital Twins and Their Role Within the Data Space
05 May 2022
Contributed by Lukas
Digital twins are virtual models designed to accurately reflect a physical object or process. The real-world applications of this are endless - from c...
F-Secure: How Workforces can Combat Digital Anxiety
04 May 2022
Contributed by Lukas
A recent F-Secure survey of 7,200 internet users showed that two-thirds of remote workers have reported worrying about their online security and priva...
CyberGRX: Cyber Risk Intelligence and the Meaning of a True Risk Exchange
03 May 2022
Contributed by Lukas
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat i...
SHI: Why is Full-Stack Observability so Important?
27 Apr 2022
Contributed by Lukas
Full-stack Observability (FSO) allows real-time monitoring across the whole modern technology stack - bringing applications, software, storage, servic...