Discover our expertise areas

At Enterprise Management Associates (EMA), we specialize in providing cutting edge research and expert insights across a wide range of critical areas.

Filters

Filters

{content}
Q-Day Just Got Way More Real
Blog 03/31/2026

Q-Day Just Got Way More Real

The timeline for "Q-Day"—the hypothetical day when quantum computers become powerful enough to break...
Key Takeaways from RSAC 2026
Blog 03/27/2026

Key Takeaways from RSAC 2026

Four themes kept coming up again and again at this year's RSA Conference, and if you're serious abou...
EMA CyberSecurity Awesomeness Podcast
Podcast 03/20/2026

Cybersecurity Awesomeness Podcast – Episode 150: RSAC 2026 Preview: AI Agents, Q-Day, and Cutting Through the Cybersecurity Noise

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler gear up for ...
EmberOT Updates Free OT PCAP Analyzer with PCAPng Support
Impact Brief 03/16/2026

EmberOT Updates Free OT PCAP Analyzer with PCAPng Support

EmberOT recently announced significant updates to its free OT PCAP Analyzer, now including support f...
EMA CyberSecurity Awesomeness Podcast
Podcast 03/13/2026

Cybersecurity Awesomeness Podcast – Episode 149: Effectively Navigate RSAC 2026 with the EMA Vendor Vision

In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for ...
Vendor Vision 2026 - RSAC
Featured 03/09/2026

Vendor Vision 2026 RSAC Edition

Enterprise Management Associates (EMA) has released its fifth annual Vendor Vision report, highlight...
EMA CyberSecurity Awesomeness Podcast
Podcast 03/06/2026

Cybersecurity Awesomeness Podcast – Episode 148: The Shifting Priorities of CISOs

In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler examin...
EMA CyberSecurity Awesomeness Podcast
Podcast 02/20/2026

Cybersecurity Awesomeness Podcast – Episode 146: Demystify Quantum Computing

Chris Steffen and Ken Buckler of Enterprise Management Associates break down quantum computi...
WAN Transformation 2026: Best Practices for Evolving from SD-WAN to SASE
Research Report 02/19/2026

WAN Transformation 2026: Best Practices for Evolving from SD-WAN to SASE

The enterprise networking landscape is currently undergoing its most significant architectural shift...
EMA CyberSecurity Awesomeness Podcast
Podcast 02/13/2026

Cybersecurity Awesomeness Podcast – Episode 145: The Federal Government’s Approach to Cybersecurity

Explore government cybersecurity challenges, conference impact, and workforce trends with EMA expert...
EMA CyberSecurity Awesomeness Podcast
Podcast 02/06/2026

Cybersecurity Awesomeness Podcast – Episode 144: The Critical Visibility Gap in Client-Side Security

Explore why client-side security is a growing risk, how browser changes enable new protections, and ...
Navigating the Identity Crisis: A Data-Driven Analysis of IGA Maturity, Risks, and Future Roadmaps
Research Report 02/02/2026

Navigating the Identity Crisis: A Data-Driven Analysis of IGA Maturity, Risks, and Future Roadmaps

This research report from Enterprise Management Associates (EMA) provides a comprehensive analysis o...
Blog 02/02/2026

The Great Device Reset: Mapping the 2025 Management Landscape, the Linux Management Blind Spot, and the 2026 Shift

Explore EMA research on the 2025–2026 device management shift—from fragmented visibility to AI-nativ...
EMA CyberSecurity Awesomeness Podcast
Podcast 01/30/2026

Cybersecurity Awesomeness Podcast – Episode 143: Using Generative AI to Create More Convincing Fraud

AI-powered scams are getting smarter—and sometimes fail spectacularly. This episode of Cybersecurity...
A Scammer Sent Me His Source Code? A Cautionary Tale of the Dangers of Vibe Coding
Blog 01/27/2026

A Scammer Sent Me His Source Code? A Cautionary Tale of the Dangers of Vibe Coding

A scammer accidentally emails his AI-generated Python source code instead of a scam message, exposin...
EMA CyberSecurity Awesomeness Podcast
Podcast 01/23/2026

Cybersecurity Awesomeness Podcast – Episode 142: Printer and IoT Security

Explore why printer and IoT security are often overlooked and how enterprises can close critical gap...
Opti to Redefine Enterprise Identity Security with AI-Native Automation
Impact Brief 01/21/2026

Opti to Redefine Enterprise Identity Security with AI-Native Automation

Opti recently announced the release of its identity security solution through AI-native automation. ...
Navigating the Identity Crisis: Bridging the Gap Between Strategic Intent and Operational Reality in Identity Governance Administration (IGA)
On-Demand Webinar 01/20/2026

Navigating the Identity Crisis: Bridging the Gap Between Strategic Intent and Operational Reality in Identity Governance Administration (IGA)

Based on new research from Enterprise Management Associates (EMA) surveying 135 IT decision-makers a...