Chris Steffen and Ken Buckler from EMA discuss the recent news about extra devices installed on foreign made products that have no purpose other than to be exploited by a bad actor.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA present a preview of the RSA Conference and discuss the EMA Vendor Vision report.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the buzzwords generated by marketing to sell cybersecurity products.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the impacts that taxes and tariffs have on technology and cybersecurity.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the plans to move many cybersecurity controls from the federal level to the state level.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the latest news surround privacy issues in the UK regarding Apple phones.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss a recent announcement about organized ransomware attacks.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss how tribal knowledge is lost during changes in leadership, as well as an update on DeepSeek AI.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the changes the new Presidential administration will bring, as well as the latest news about DeepSeek AI.By Enterprise Management Associates + DEVOPSdigest
Jason Garbis from Numberline Security joins Chris Steffen and Ken Buckler from EMA to discuss the Zero Trust Maturity Model.By Enterprise Management Associates + DEVOPSdigest
Steve Guilford from AsterionDB joins Chris Steffen and Ken Buckler from EMA to reimagine the way we store files to be more secure (and useable).By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the data generated by free applications and how technological advances are impacting individual privacy.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the ransomware attacks going on at Starbucks through Blue Yonder.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss end of year planning and budgeting for cybersecurity next year.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss using AI to influence elections and election security in general.By Enterprise Management Associates + DEVOPSdigest
In Part 2 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.By Enterprise Management Associates + DEVOPSdigest
In Part 1 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: physical access control and biometrics.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the exploding pager attacks in the Middle East, and why they are cybersecurity attacks.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the VERY minor vulnerability found in Yubico YubiKeys, and why it is important to properly evaluate the impacts of these types of vulnerabilities.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA discuss the importance of identity solutions as part of a cyber security strategy.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA compare one-off best-in-class tools vs. all-in-one security solutions.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen and Ken Buckler from EMA to discuss the Microsoft DDoS attack and the CrowdStrike outage.By Enterprise Management Associates + DEVOPSdigest
Maggie MacAlpine, Director of Cybersecurity Partnerships and Cybersecurity Evangelism at Seceon, joins Chris Steffen and Ken Buckler from EMA to discuss how managed security service providers (MSSPs) can improve their security offerings with the right security solutions.By Enterprise Management Associates + DEVOPSdigest
Stephan Jou, Sr. Director, Security Analytics at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss using AI in your XDR solutions.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses how to best correlate and utilize your vast enterprise data stores using a data fabric with Nicole Bucala, Databee CEO, and Paul Kivikink, Databee SVP of Products and Alliances.By Enterprise Management Associates + DEVOPSdigest
Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss leveraging AI for audits of Static Application Security Testing (SAST).By Enterprise Management Associates + DEVOPSdigest
Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss getting your data ready for AI.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the role of the tech evangelist.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.…
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss AI use cases.By Enterprise Management Associates + DEVOPSdigest
Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss fundamentals of data security.By Enterprise Management Associates + DEVOPSdigest