In cybersecurity, every move is critical. “The Security Strategist” podcast delves into the depths of the cybercriminal underworld, revealing practical strategies to keep you one step ahead. We explore the latest trends and threats in cybersecurity, providing insights on how to protect your organisation effectively. Our discussions, featuring thought leaders and pioneering organisations, cover the most pressing issues businesses face today. Tune in as we dissect major threats, explore emergi ...
…
continue reading
This podcast is your go-to source for all things AI and emerging technologies. We explore how tech is shaping the future of business and share best practices for implementing these innovations. With expert interviews, in-depth analysis, and practical advice, you'll stay ahead of the curve and make informed decisions for your enterprise. Join us to debunk myths, dive into the latest trends, and cut through the AI noise with “Tech Transformed.” Tune in and transform your understanding of techn ...
…
continue reading
Making the most out of your data can feel overwhelming. Not only do many businesses have more data than they know what to do with, but they also often struggle to gain insights from some of the most valuable data in their possession, leading to many of their crucial data assets going unused. Whether it's issues with data quality, visualization, or management, getting lost in the sea of enterprise data at your possession can make it impossible to make smart, data-driven decisions that improve ...
…
continue reading
1
Hackers: Heroes vs Villains – The Code Wars
21:30
21:30
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
21:30
Ethical hacking, or penetration testing, plays a key role in protecting businesses from cyber threats by identifying vulnerabilities before malicious hackers can exploit them. As AI becomes more embedded in critical operations, it becomes a prime target for cybercriminals. Ethical hackers are stepping up to defend these systems, using their skills …
…
continue reading
1
Identity - a quick win in your Zero Trust roadmap
17:41
17:41
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:41
Traditional security models are no longer enough. Identity and Zero Trust have become essential pillars of modern information security strategies. By focusing on “never trust, always verify,” Zero Trust ensures that no user or device is trusted by default—whether inside or outside the network—identity management, meanwhile, safeguards access by ver…
…
continue reading
1
Infiltration Insights: Red Team Operations
21:43
21:43
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
21:43
Red teaming is a proactive cybersecurity approach where ethical hackers simulate real-world attacks to test an organisation’s defences. Unlike traditional testing, red teaming mimics sophisticated threats to expose vulnerabilities in networks, systems, and even human factors. This process helps organisations identify weaknesses, strengthen their se…
…
continue reading
1
Optimising Network Traffic Costs with Vantage
18:43
18:43
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
18:43
Managing network traffic efficiently is essential to control cloud costs. Network flow reports are critical in providing detailed insights into data movement across cloud environments. These reports help organisations identify usage patterns, track bandwidth consumption, and uncover inefficiencies that may lead to higher expenses. With a clear unde…
…
continue reading
1
AI and Data Security: How to Protect What’s Powering the Future
21:50
21:50
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
21:50
Protecting sensitive data requires a robust approach, with Data Security Posture Management (DSPM) and Data Loss Prevention (DLP) at the forefront. DSPM aligns security policies with data architecture, while DLP prevents unauthorised access and leaks. Understanding data classification and custodianship is key to this, as it ensures that sensitive d…
…
continue reading
1
How FME is Revolutionizing Omaha's Mobility Projects
19:32
19:32
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:32
Safe Software’s FME is transforming Omaha’s approach to urban mobility with groundbreaking solutions for asset management, e-scooter tracking, and parking management. FME’s robust data integration capabilities are at the core of Omaha’s advancements. The data integration platform enables real-time tracking of e-scooters, offering precise data on th…
…
continue reading
1
AI, Data, and the Compliance Maze: Keeping It Real!
22:43
22:43
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
22:43
As AI technologies become more integrated into business operations, they bring opportunities and challenges. AI’s ability to process vast amounts of data can enhance decision-making but also raise concerns about data privacy, security, and regulatory compliance. Ensuring that AI-driven systems adhere to data protection laws, such as GDPR and CCPA, …
…
continue reading
1
The Dark Side of Cloud: Tackling Data Security Challenges
19:11
19:11
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:11
As organisations increasingly migrate to cloud environments, they face a critical challenge: ensuring the security and privacy of their data. Cloud technologies offer many benefits, including scalability, cost savings, and flexibility. However, they also introduce new risks, such as potential data breaches, unauthorised access, and compliance issue…
…
continue reading
1
Fraud Rings and Crypto Scams: How to Outsmart the Bad Guys
25:55
25:55
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
25:55
Fraud networks are becoming more sophisticated, posing a significant threat to the financial, iGaming and crypto sectors. As fraudsters’ tactics evolve, these industries face growing challenges in identifying, disrupting, and preventing their activities. According to Sumsub internal research, every 100th user was involved in fraudulent networks in …
…
continue reading
1
Neural Networks at Risk: AI and Cyber Threats
19:08
19:08
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:08
New cybersecurity risks threaten critical data and systems as organisations increasingly adopt AI-driven technologies, particularly neural networks and Gen-AI. These advanced AI models, while powerful, are vulnerable to a range of attacks, including adversarial manipulation, data poisoning, and model inversion, where attackers can reverse-engineer …
…
continue reading
1
Predict, Prevent, Prosper: How AI Transforms MSPs into IT Superheroes
15:16
15:16
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
15:16
Managed Service Providers (MSPs) are evolving beyond traditional IT support, becoming strategic partners in driving business growth. By embracing AI technologies, MSPs are improving operational efficiency, streamlining service delivery, and offering smarter solutions to meet modern challenges. As businesses navigate digital transformation, MSPs are…
…
continue reading
1
Authenticating Users with Traditional SSO is Not Enough
21:48
21:48
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
21:48
Traditional workforce access methods are increasingly vulnerable to account takeovers, highlighting the urgent need for zero-trust access. Infinipoint addresses these vulnerabilities by offering one-click remediation for device security posture checks. This innovative solution ensures that only devices meeting strict security standards can access c…
…
continue reading
1
AI Exposed: Finding the Sweet Spot Between Transparency and Security
17:42
17:42
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:42
Balancing transparency in AI systems with the need to protect sensitive data is crucial. Transparency helps build trust, ensures fairness, and meets regulatory requirements. However, it also poses challenges, such as the risk of exposing sensitive information, increasing security vulnerabilities, and navigating privacy concerns. In this episode, Pa…
…
continue reading
1
Trusted AI: The Foundation for Transparent and Value-Add Systems
25:42
25:42
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
25:42
Trusted AI ensures that people, data, and AI systems work together transparently to create real value. This requires a focus on performance, innovation, and cost-effectiveness, all while maintaining transparency. However, challenges such as misaligned business strategies and data readiness can undermine trust in AI systems. To build trusted AI, it’…
…
continue reading
1
SCION: The Future of Critical Infrastructure Defence
17:32
17:32
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:32
As the number of connected devices grows, so does the vulnerability of our digital infrastructure. Traditional security measures need help to keep up with the increasingly sophisticated threats targeting critical networks in sectors like utilities and finance. To address these challenges, there is a pressing need for a new approach to Internet secu…
…
continue reading
1
DoubleCloud: Mastering Real-Time Data with Open-Source
17:18
17:18
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:18
Open source technologies are transforming how businesses manage real-time data on cloud platforms. By leveraging flexible, scalable, and cost-effective open-source tools, organisations can process and analyse large volumes of data with speed and precision. These technologies offer unmatched transparency, customisation, and community-driven innovati…
…
continue reading
1
How is Proactive CDR Revolutionising Cloud Security
16:13
16:13
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
16:13
As cloud adoption accelerates, the demand for effective cloud threat detection solutions is snowballing. Organisations face increasing challenges in securing their cloud environments due to the complexity of modern infrastructures and cyber threats. Traditional security measures often fail to identify and respond to sophisticated cloud-based attack…
…
continue reading
1
AI Adoption: Data Literacy, Governance, and Business Impact with Kevin Petrie
23:05
23:05
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:05
As organisations adopt AI, data literacy has become more critical than ever. Understanding data—how it's collected, analysed, and used—is the foundation for leveraging AI effectively. Without strong data literacy, businesses risk making misguided decisions, misinterpreting AI outputs, and missing out on AI’s transformative benefits. By fostering a …
…
continue reading
Big Data LDN 2024, the UK’s leading data, analytics, and AI event, is less than a week away – promising two days filled with ground-breaking stories, expert insights, and endless innovation. Taking place at the Kensington Olympia in London on September 18-19, this year’s event features fifteen theatres and over 300 expert speakers sharing insights …
…
continue reading
1
Data Labelling: The Secret Sauce Behind AI Models
17:48
17:48
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:48
Data labelling is a critical step in developing AI models, providing the foundation for accurate predictions and smart decision-making. Labelled data helps machine learning algorithms understand input data by assigning meaningful tags to raw data—such as images, text, or audio—ensuring that AI models can recognise patterns and make informed decisio…
…
continue reading
1
Defend Like a Pro: Comprehensive Threat Detection & Response with Proactive Risk Management
18:47
18:47
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
18:47
Critical Start's Managed Detection and Response (MDR) service is designed to provide 24x7x365 monitoring, human-driven threat investigation, and flexible deployment across IT and OT environments. By leveraging deep technical expertise, robust API integrations, and contractual SLAs, they offer comprehensive protection against evolving cyber thre…
…
continue reading
1
Beyond KYC: Revolutionising Fraud Prevention
22:09
22:09
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
22:09
Traditional KYC processes are inadequate against modern fraud tactics. While KYC helps with initial identity checks, it doesn't cover evolving threats like AI-generated deepfakes or ongoing account takeovers. Curious about how to protect your business from the latest threats like fake IDs, account takeovers, and AI-generated deep fakes? Tune in to …
…
continue reading
1
Sustainable Sourcing: Why Accurate Data Matters
23:28
23:28
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:28
Sustainable sourcing is essential for businesses committed to environmental and social responsibility, but achieving it requires accurate and reliable data. Master Data Management (MDM) ensures that all sourcing data—such as supplier information, certifications, and compliance records—is consistent and up-to-date. This enables organisations to make…
…
continue reading
1
AI in Contact Centres: Enhancing Customer Experience and Driving Innovation
17:55
17:55
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:55
AI is revolutionising contact centres by automating routine tasks, reducing response times, and enhancing customer experience. AI is built to handle simple inquiries efficiently and at scale. It helps contact centres close the gap between customer expectations and conventional customer service by enabling engagement through digital channels. AI-dri…
…
continue reading
1
The Data Trail: Why Provenance Matters for Your Business
19:03
19:03
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
19:03
Data provenance is essential for maintaining trust and integrity in data management. It involves tracking the origin of data and understanding how it has been processed and handled over time. By focusing on fundamental principles such as identity, timestamps, and the content of the data, organisations can ensure that their data remains accurate, co…
…
continue reading
1
Cutting Through the Noise: Redefining Detection and Response With Secureworks
23:32
23:32
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
23:32
When looking for the right cybersecurity to keep your organization safe, it’s easy to get overwhelmed by the acronyms and solutions on the market today. EDR. MDR. XDR. NDR. How can organizations really identify not only what they need, but what solutions can evolve with their strategies? In this episode of the EM360 Podcast, Chris Steffen, EMA's Vi…
…
continue reading
1
FME’s Role in the Pacific Disaster Center’s Maui Response
18:58
18:58
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
18:58
FME is a vital tool in disaster management and response. It enables the integration and transformation of geospatial data for real-time tracking of disasters and hazards. By ensuring accurate and timely data analysis, it provides essential decision support for disaster management professionals. During the Maui wildfires, FME and the Pacific Disaste…
…
continue reading
1
We Can Do Anything! Women in Tech and Gaming with Kelly Vero
26:12
26:12
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
26:12
Join us in this exciting episode of Tech Transformed, where we talk to Kelly Vero, a pioneering game developer, digital leader, and visionary in the metaverse. With a career spanning 30 years and a resume that includes contributions to legendary franchises like Tomb Raider and Halo 3, Kelly brings a wealth of knowledge and experience to the table. …
…
continue reading
1
Open Source Strategies for Real-Time Analytics
17:20
17:20
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
17:20
Open source real-time analytics offers unparalleled advantages, providing businesses with freedom and independence to maintain operations seamlessly, even if a vendor issue arises. However, the journey isn't without its challenges. Open source solutions can often be clunky and require specialised expertise to manage effectively. This is where Doubl…
…
continue reading
1
What Would 1% Do to Your Business: ML for Optimal Security Strategies
25:36
25:36
Later Afspelen
Later Afspelen
Lijsten
Vind ik leuk
Leuk
25:36
Understanding the key differences between approaches in the EU and the US can help unlock maximum value with the right security strategies. Traditional methods often fall short, but integrating Machine Learning (ML) into your security framework can transform your defence against modern threats. Embrace a dynamic approach to security that adapts to …
…
continue reading