In an era when government operations increasingly rely on digital infrastructure to remain effective, accountable, and secure, messaging platforms emerged as both an enabler and a risk vector. The question of how government agencies communicate—internally, externally, and across jurisdictional lines—is no longer merely a matter of workflow optimization. It is a fundamental aspect of mission assurance, public trust, and operational integrity. Yet even as messaging tools proliferate and mature, the gulf between platforms built for accountability and those designed for privacy remains pronounced. Nowhere is that divide more evident than in the ongoing tension between Microsoft Teams and Signal—two platforms that, while often deployed in parallel, represent fundamentally different answers to the same set of urgent questions about security, control, and digital sovereignty.
Messaging in Government: Signal, Microsoft Teams, and the Security-Convenience Paradox
By Ken Buckler on Mar 27, 2025 9:45:33 AM
Cybersecurity Awesomeness Podcast Recap - Episode 102: Insider Threats
By Chris Steffen & Ken Buckler on Mar 24, 2025 12:17:40 PM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
Redefining PTaaS: A Goal-Oriented Approach to Include Bug Bounty Programs
By Ken Buckler on Mar 18, 2025 9:53:47 AM
In an era when cybersecurity threats continue to evolve at an unprecedented pace, organizations are seeking robust, goal-oriented solutions to identify and remediate security vulnerabilities effectively. Traditionally, penetration testing as a service (PTaaS) played a critical role in structured, systematic security assessments. However, as the industry shifts toward more dynamic and continuous testing models, it is becoming increasingly clear that PTaaS needs a redefinition—one that includes the advantages of bug bounty programs under its umbrella.
Cybersecurity Awesomeness Podcast Recap - Episode 101: Tax Scams
By Chris Steffen & Ken Buckler on Mar 14, 2025 9:58:50 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
Cybersecurity Awesomeness Podcast Recap - Episode 100: UK iPhone Privacy Issues
By Chris Steffen & Ken Buckler on Mar 11, 2025 9:36:03 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
Cybersecurity Awesomeness Podcast Recap: Episode 99: Marketing Technical Products
By Chris Steffen & Ken Buckler on Feb 27, 2025 11:16:02 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
BigID Unveils BigID Next
By Chris Steffen on Feb 24, 2025 8:29:53 AM
Organizations are constantly dealing with rapid shifts toward cloud computing, escalating security threats, and regulatory frameworks that have necessitated more robust solutions in data governance. As they continue to accumulate more and more sensitive data, the need for visibility into data assets becomes obvious. Moreover, regulations such as GDPR, HIPAA, ITAR, and PCI impose stringent compliance requirements, compelling organizations to ensure that they can not only manage, but also protect, their data effectively.
Cybersecurity Awesomeness Podcast Recap: Episode 98: DDoS Mitigation
By Chris Steffen & Ken Buckler on Feb 21, 2025 8:57:09 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
Cybersecurity Awesomeness Podcast Recap: Episode 97
By Chris Steffen & Ken Buckler on Feb 14, 2025 11:21:14 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.
Cybersecurity Awesomeness Podcast Recap: Episode 96
By Chris Steffen & Ken Buckler on Feb 11, 2025 9:35:07 AM
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) Podcast. Hosted by Chris Steffen, Vice President of Research and Ken Buckler, Research Director at EMA, the CSA Podcast covers a wide range of cybersecurity topics, from cyber workforce talent shortages to cyber threat intelligence, to current events in technology and security. This short, laidback podcast is for listeners of all skill levels and backgrounds.