Apica Ascent 2.16 Positions Telemetry Pipelines as the Control Layer for Agentic-Ready Operations
PUBLISHED:
PUBLISHED:
PUBLISHED:
Agentic AI is pushing observability beyond insight into autonomous action.
In this episode of the Enterprise Automation Excellence podcast, Dan Twing and Tom O’Rourke sit down with Arturo Oliver, Senior Director, Market Strategy and Analyst Relations at ScienceLogic to explore how observability is evolving from reactive diagnosis to proactive prevention powered by AI agents.
Key shifts discussed:
But the real challenge ahead? Connecting agents across tools and systems and building the trust, transparency, and institutional knowledge required to make agentic operations work at scale.
Key takeaway for automation leaders: Don’t wait for perfection. Start finding practical agentic AI wins now while prioritizing prevention, context, and verifiable AI outcomes.
Listen to the full episode to learn how observability is becoming the foundation for autonomous IT operations.PUBLISHED:
PUBLISHED:
In conversations with network teams, one theme keeps emerging: AI-powered management tools are no longer a “nice to have.” Engineers want agentic interfaces that can gather data, detect issues, and help respond to problems across DNS, DHCP, and IP address management (DDI) environments.
EMA’s DDI Directions 2026 research shows:
The challenge? Most DDI vendors are still early in their AI journey.
As agentic capabilities begin to arrive over the next 6–12 months, network teams will need to balance innovation with caution. Early adopters already report challenges validating AI insights — making governance and verification critical.
The message is clear: the future of core network services is agentic, but evaluation and trust will matter as much as automation.
PUBLISHED:
DNS may be known as the “phone book of the internet,” but it’s quickly becoming one of the most exploited layers of enterprise infrastructure.
In this episode of the Mean Time to Insight podcast, EMA’s VP of Research Shamus McGillicuddy explores why DNS security is rising as a critical concern for network and security teams — from real-world misconfiguration risks to AI-enhanced attacks targeting DNS environments.
Key insights include:The takeaway: DNS isn’t just networking plumbing, it’s a frontline cybersecurity asset.
Listen to the full episode to learn how organizations can strengthen DNS security and reduce hidden risk.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
Quantum computing is rapidly moving from theoretical possibility to operational reality, and its impact on cybersecurity could be profound. In this episode of the Cybersecurity Awesomeness Podcast, EMA's security experts Chris Steffen and Ken Buckler examine the concept of Q-Day, the moment when quantum processors may become powerful enough to break today’s encryption standards, including AES-256.
The discussion explores the growing threat of “Harvest Now, Decrypt Later” attacks, where adversaries collect encrypted data today with plans to unlock it once quantum capabilities mature. While quantum technology promises transformative advances across industries — the so-called Quantum Dividend — it also introduces urgent security challenges that organizations must begin addressing now.
Listeners will gain insight into why quantum readiness requires a long-term strategy, how quantum-resistant cryptography is reshaping security planning, and why preparing for a post-quantum world is becoming essential for protecting sensitive data, intellectual property, and national security interests.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
Artificial intelligence is fundamentally reshaping how organizations build, manage, and govern data and analytics systems. While no-code and self-service platforms once promised democratization, many enterprises discovered that ease of use often came at the cost of governance, consistency, and trust.
Today, AI is changing the equation. As large language models generate and reason about code, “as-code” architectures — once limited to highly technical teams — are becoming the foundation for scalable, auditable, and AI-ready operations.
In this blog, EMA Research Director Herb Blecher explores why AI is accelerating the shift toward declarative, version-controlled systems across the modern data stack, from transformation and observability to analytics and orchestration. Readers will learn how AI agents interact with structured environments, why text-based systems are inherently more compatible with AI, and how organizations can balance self-service usability with the governance required for trusted automation.
PUBLISHED:
PUBLISHED:
In this episode of the Cybersecurity Awesomeness Podcast from Enterprise Management Associates (EMA), cybersecurity experts Chris Steffen and Ken Buckler explain how quantum computers differ from traditional systems, what qubits are, and why post-quantum cryptography (PQC) is rapidly becoming a priority for enterprises, governments, and financial institutions. They explore how advances from major technology players such as Google signal accelerating progress and why organizations must prepare now for the potential disruption quantum computing could bring to modern encryption.
The discussion covers the “harvest now, decrypt later” threat, the concept of “Q-Day,” and what security leaders should be thinking about today to protect sensitive data in a post-quantum world.
Whether you’re a security practitioner, IT leader, or technology strategist, this episode delivers a clear, practical introduction to one of cybersecurity’s most transformative emerging challenges.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
Join EMA security experts Chris Steffen and Ken Buckler for this Cybersecurity Awesomeness podcast, where they discuss government approaches to cybersecurity, recruitment, and the impact of withdrawing from major conferences like RSAC on skills, technology adoption, and public-private collaboration. Learn how these shifts affect cybersecurity strategy, workforce development, and industry partnerships.
Listen now to explore expert insights and stay ahead in the evolving cybersecurity landscape.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
In this episode of the Cybersecurity Awesomeness Podcast, EMA cybersecurity experts Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to examine one of the most overlooked threats in enterprise security: printer and IoT device vulnerabilities. While organizations focus heavily on servers, endpoints, and cloud infrastructure, printers—often operating with default configurations and little ownership—remain a major attack vector.
The discussion explores why printers are uniquely exposed within enterprise environments, how their IoT nature creates visibility and governance gaps, and what real-world threats organizations are facing today. LaRoe breaks down the root causes behind poor printer security adoption, including organizational silos, lack of accountability, and misconceptions about risk, while highlighting practical steps enterprises can take to bring print fleets and other IoT devices into a unified security strategy.
This episode is a must-listen for security leaders, IT professionals, and risk managers looking to close critical blind spots in their cybersecurity posture and better protect sensitive data across the extended enterprise.
PUBLISHED:
As organizations race to automate data quality and observability with AI, many are overlooking the most critical factor in trustworthy data: human judgment. This blog explores why data analysts—often the people who know the data best—are essential to maintaining trust, context, and usability as data volumes and automation scale.
Drawing on EMA research and real-world examples, the piece argues that data quality is less about technical perfection and more about reducing confusion, misinterpretation, and friction between humans and data. It examines empathy as a core analytical skill, the risks of removing humans from decision-making loops, and why “human-in-the-loop” design is not a limitation but a necessity.
Ultimately, the blog makes the case that the best data quality tools don’t replace analysts—they amplify their judgment, contextual knowledge, and ability to anticipate how data will actually be used and understood.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
Network infrastructure and operations teams are entering a period of rapid change. As enterprises accelerate investments in AI, cloud, and automation, the demands on network teams are growing and traditional approaches are no longer enough.
In this Mean Time To Insight podcase, EMA Vice President of Research Shamus McGillicuddy shares his top predictions for how network teams will evolve in 2026. Learn why strong data foundations, tighter cross-functional collaboration, and smarter tools will define the next generation of high-performing organizations, and how you can start preparing today to stay ahead of what’s coming.
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED:
PUBLISHED: