Tech Transformed
Episodes
Tufin: The rise of cloud data breaches
27 Apr 2022
Contributed by Lukas
Breaches are nothing new to the tech world. But since the beginning of the pandemic especially, the world has seen serious security attacks which have...
StreamSets: How to set up your data democratisation strategy
21 Apr 2022
Contributed by Lukas
Data democratisation is the continuous process of enabling company-wide access to data, regardless of technical know-how, in a bid to spread a data-le...
Radiant Logic: The challenges of identity sprawl
20 Apr 2022
Contributed by Lukas
Identity sprawl describes the growth in the many differing and incompatible accounts a user creates to access online services. As the number of a...
Beyond Identity: CIAMs and Hitting a Balance Between Security and Customer Friction
14 Apr 2022
Contributed by Lukas
CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applicatio...
Immersive Labs: Democratising access to cybersecurity
13 Apr 2022
Contributed by Lukas
Cybersecurity has traditionally been the responsibility of the CTO and IT department, casting a company-wide forcefield to protect businesses from ext...
Phishlabs: Social media as a threat channel
07 Apr 2022
Contributed by Lukas
Social media offers an important outline for people of all ages and walks of life to connect, share life experiences and post pictures of their breakf...
Findability Sciences: Why Should We Be Using Wide Data for AI?
06 Apr 2022
Contributed by Lukas
The current state of wide data is that it is not as widely used for Artificial Intelligence as it is for analytics. While analytics needs a treasure t...
Ampito: How Can Technology Modernise Working Practices?
05 Apr 2022
Contributed by Lukas
In this age of technological evolution and industrial resilience following the fallout of the Covid-19 pandemic, businesses have had to modernise work...
NFON: CX and Scalable UC As-A-Service in the Modern Contact Centre
24 Mar 2022
Contributed by Lukas
In this EM360 Podcast, we delve into the use cases and benefits of CX and scalable unified-communications-as-a-service (UCaaS) in the modern contact c...
Tokenisation vs encryption: How plaintext data is fuelling the ransomware boom
23 Mar 2022
Contributed by Lukas
CEO of Evervault, Shane Curran, shares his thoughts on plaintext data and why it is the 'real enemy' when it comes to ransomware attacks.
Why is Edge Computing the missing puzzle piece of decentralisation?
16 Mar 2022
Contributed by Lukas
Edge computing places information processing closer to the consumer, allowing for lower latency and higher reliability to transfer faster and more sec...
The Bridge Episode 4: Secure Agile Networks
03 Mar 2022
Contributed by Lukas
Episode 4 of The Bridge - a Cisco and Exertis production.
The Bridge Episode 3: Optimising Application Experience
03 Mar 2022
Contributed by Lukas
Episode 3 of The Bridge - a Cisco and Exertis production.
The Bridge Episode 2: End to End Security
03 Mar 2022
Contributed by Lukas
Episode 2 of The Bridge - a Cisco and Exertis production.
The Bridge Episode 1: The Future of Work
03 Mar 2022
Contributed by Lukas
Episode 1 of The Bridge - a Cisco and Exertis production.
How the Data-Driven Revolution is Impacting CX with ActionIQ
17 Feb 2022
Contributed by Lukas
The data-driven revolution has enabled brands to achieve true customer centricity — but only if they have the right data analysis and experience orc...