Discover our expertise areas
At Enterprise Management Associates (EMA), we specialize in providing cutting edge research and expert insights across a wide range of critical areas.
Filters
Filters
{content}

Q-Day Just Got Way More Real
The timeline for "Q-Day"—the hypothetical day when quantum computers become powerful enough to break...
Key Takeaways from RSAC 2026
Four themes kept coming up again and again at this year's RSA Conference, and if you're serious abou...
Cybersecurity Awesomeness Podcast – Episode 150: RSAC 2026 Preview: AI Agents, Q-Day, and Cutting Through the Cybersecurity Noise
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler gear up for ...
EmberOT Updates Free OT PCAP Analyzer with PCAPng Support
EmberOT recently announced significant updates to its free OT PCAP Analyzer, now including support f...
Cybersecurity Awesomeness Podcast – Episode 149: Effectively Navigate RSAC 2026 with the EMA Vendor Vision
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for ...
Vendor Vision 2026 RSAC Edition
Enterprise Management Associates (EMA) has released its fifth annual Vendor Vision report, highlight...
Cybersecurity Awesomeness Podcast – Episode 148: The Shifting Priorities of CISOs
In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler examin...
Cybersecurity Awesomeness Podcast – Episode 146: Demystify Quantum Computing
Chris Steffen and Ken Buckler of Enterprise Management Associates break down quantum computi...
WAN Transformation 2026: Best Practices for Evolving from SD-WAN to SASE
The enterprise networking landscape is currently undergoing its most significant architectural shift...
Cybersecurity Awesomeness Podcast – Episode 145: The Federal Government’s Approach to Cybersecurity
Explore government cybersecurity challenges, conference impact, and workforce trends with EMA expert...
Cybersecurity Awesomeness Podcast – Episode 144: The Critical Visibility Gap in Client-Side Security
Explore why client-side security is a growing risk, how browser changes enable new protections, and ...
Navigating the Identity Crisis: A Data-Driven Analysis of IGA Maturity, Risks, and Future Roadmaps
This research report from Enterprise Management Associates (EMA) provides a comprehensive analysis o...
The Great Device Reset: Mapping the 2025 Management Landscape, the Linux Management Blind Spot, and the 2026 Shift
Explore EMA research on the 2025–2026 device management shift—from fragmented visibility to AI-nativ...
Cybersecurity Awesomeness Podcast – Episode 143: Using Generative AI to Create More Convincing Fraud
AI-powered scams are getting smarter—and sometimes fail spectacularly. This episode of Cybersecurity...
A Scammer Sent Me His Source Code? A Cautionary Tale of the Dangers of Vibe Coding
A scammer accidentally emails his AI-generated Python source code instead of a scam message, exposin...
Cybersecurity Awesomeness Podcast – Episode 142: Printer and IoT Security
Explore why printer and IoT security are often overlooked and how enterprises can close critical gap...
Opti to Redefine Enterprise Identity Security with AI-Native Automation
Opti recently announced the release of its identity security solution through AI-native automation. ...