Discover our expertise areas
At Enterprise Management Associates (EMA), we specialize in providing cutting edge research and expert insights across a wide range of critical areas.
Filters
Filters
{content}

Cybersecurity Awesomeness Podcast – Episode 150: RSAC 2026 Preview: AI Agents, Q-Day, and Cutting Through the Cybersecurity Noise
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler gear up for ...
EmberOT Updates Free OT PCAP Analyzer with PCAPng Support
EmberOT recently announced significant updates to its free OT PCAP Analyzer, now including support f...
Cybersecurity Awesomeness Podcast – Episode 149: Effectively Navigate RSAC 2026 with the EMA Vendor Vision
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for ...
Vendor Vision 2026 RSAC Edition
Enterprise Management Associates (EMA) has released its fifth annual Vendor Vision report, highlight...
Cybersecurity Awesomeness Podcast – Episode 148: The Shifting Priorities of CISOs
In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler examin...
Cybersecurity Awesomeness Podcast – Episode 147: Quantum Computing’s Inevitable Collision with Modern Encryption Standards
Explore how quantum computing threatens modern encryption, the risks of “Harvest Now, Decrypt Later”...
Cybersecurity Awesomeness Podcast – Episode 146: Demystify Quantum Computing
Chris Steffen and Ken Buckler of Enterprise Management Associates break down quantum computi...
Cybersecurity Awesomeness Podcast – Episode 145: The Federal Government’s Approach to Cybersecurity
Explore government cybersecurity challenges, conference impact, and workforce trends with EMA expert...
Navigating the Identity Crisis: A Data-Driven Analysis of IGA Maturity, Risks, and Future Roadmaps
This research report from Enterprise Management Associates (EMA) provides a comprehensive analysis o...
The Great Device Reset: Mapping the 2025 Management Landscape, the Linux Management Blind Spot, and the 2026 Shift
Explore EMA research on the 2025–2026 device management shift—from fragmented visibility to AI-nativ...
Cybersecurity Awesomeness Podcast – Episode 143: Using Generative AI to Create More Convincing Fraud
AI-powered scams are getting smarter—and sometimes fail spectacularly. This episode of Cybersecurity...
A Scammer Sent Me His Source Code? A Cautionary Tale of the Dangers of Vibe Coding
A scammer accidentally emails his AI-generated Python source code instead of a scam message, exposin...
Cybersecurity Awesomeness Podcast – Episode 142: Printer and IoT Security
Explore why printer and IoT security are often overlooked and how enterprises can close critical gap...
Opti to Redefine Enterprise Identity Security with AI-Native Automation
Opti recently announced the release of its identity security solution through AI-native automation. ...
Navigating the Identity Crisis: Bridging the Gap Between Strategic Intent and Operational Reality in Identity Governance Administration (IGA)
Based on new research from Enterprise Management Associates (EMA) surveying 135 IT decision-makers a...
The “Triple Threat” of 2026: Why Your AI Workforce Is Your Biggest Security Blind Spot
In 2026, AI agents create a new security blind spot as agentic risk, identity governance gaps, and v...
Cybersecurity Awesomeness Podcast – Episode 141: Internet of All Things
Cybersecurity Awesomeness Podcast explores IoT privacy and security risks revealed at CES, highlight...