EMA IT & Data Management Research, Industry Analysis & Consulting

Ken Buckler

Kenneth Buckler, CASP, is a research director of information security/risk and compliance management for Enterprise Management Associates, a leading industry analyst and consulting firm that provides deep insight across the full spectrum of IT and data management technologies. Before EMA, he supported a Federal agency’s Enterprise Visibility program, providing security insights and compliance trending for the agency’s national network of computers and devices. He has also served in technical hands-on roles across multiple agencies in the Federal cyber security space and has published three Cyber Security books. Ken holds multiple technical certifications, including CompTIA’s Advanced Security Practitioner (CASP) certification.

Recent Posts

Is 2026 the Year we Finally Master Zero Trust? Or the Year of Agentic Data Breaches?

By Ken Buckler on Dec 23, 2025 11:14:28 AM

Well, 2025 has been an extremely interesting year with what can only be described as a massive  explosion of agentic AI. And while agentic might hold a large amount of potential to address deficiencies the industry has struggled with for years, with great power comes great responsibility.

Continue Reading

Google’s New Android Developer Verification Will Increase Device Security Risk for Power Users

By Ken Buckler on Oct 6, 2025 12:10:49 PM

Google's upcoming Android Developer Verification Program (ADVP), which launches fully in 2026, requires all developers to register and verify their identities before their applications can be installed on certified Android devices.

Continue Reading

With What Snack Food Will You Authenticate? Identity Week 2025

By Ken Buckler on Sep 19, 2025 11:28:32 AM

When I attended the Identity Week conference in Washington, D.C. last year, I noted a heavy focus on biometrics, especially focused on employee onboarding and background checks. While this is an important topic, I was disappointed that there wasn’t more focus on identity security and non-human identities. This year at Identity Week, that changed significantly.

Continue Reading

What the Iran conflict means for the cybersecurity industry

By Ken Buckler on Jun 24, 2025 11:45:30 AM

The recent U.S. strikes on Iranian nuclear facilities dramatically reshaped the cyberthreat landscape facing American networks. In the weeks and possibly even months following the bombings, cybersecurity professionals should anticipate a surge in both opportunistic and state-aligned intrusions aimed at disrupting critical systems, stealing sensitive data, or undermining public confidence in digital infrastructure. Understanding the motivations, tactics, and potential targets of these adversaries is essential for organizations seeking to bolster their defenses and maintain operational resilience.

Continue Reading

Hack to the Future: AI, Cars, and Quantum Shenanigans at Black Hat Asia 2025

By Ken Buckler on Apr 14, 2025 4:18:52 PM

Black Hat Asia 2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, and plenty of sobering insights about the evolving cybersecurity landscape. Across two packed days, experts from around the globe tackled threats old and new, offering live demonstrations, original research, and thought-provoking commentary on the increasingly blurred lines between digital, physical, and even quantum attack surfaces.

Continue Reading

Messaging in Government: Signal, Microsoft Teams, and the Security-Convenience Paradox

By Ken Buckler on Mar 27, 2025 9:45:33 AM

In an era when government operations increasingly rely on digital infrastructure to remain effective, accountable, and secure, messaging platforms emerged as both an enabler and a risk vector. The question of how government agencies communicate—internally, externally, and across jurisdictional lines—is no longer merely a matter of workflow optimization. It is a fundamental aspect of mission assurance, public trust, and operational integrity. Yet even as messaging tools proliferate and mature, the gulf between platforms built for accountability and those designed for privacy remains pronounced. Nowhere is that divide more evident than in the ongoing tension between Microsoft Teams and Signal—two platforms that, while often deployed in parallel, represent fundamentally different answers to the same set of urgent questions about security, control, and digital sovereignty.

Topics: Cybersecurity
Continue Reading

Redefining PTaaS: A Goal-Oriented Approach to Include Bug Bounty Programs

By Ken Buckler on Mar 18, 2025 9:53:47 AM

In an era when cybersecurity threats continue to evolve at an unprecedented pace, organizations are seeking robust, goal-oriented solutions to identify and remediate security vulnerabilities effectively. Traditionally, penetration testing as a service (PTaaS) played a critical role in structured, systematic security assessments. However, as the industry shifts toward more dynamic and continuous testing models, it is becoming increasingly clear that PTaaS needs a redefinition—one that includes the advantages of bug bounty programs under its umbrella.

Topics: Cybersecurity
Continue Reading

Identity Supply Chain – A New Approach to Identity Management and Security

By Ken Buckler on Jan 6, 2025 8:27:01 AM

In today’s interconnected digital landscape, identity has become the cornerstone of both organizational security and user experience. Whether onboarding a new employee or granting a customer access to services, the journey of identity—commonly referred to as the identity supply chain—encompasses a series of critical stages, from initial verification to continuous authentication and authorization.

Continue Reading

Taking Flight: Aviator Soars One Year in at OpenText World 2024

By Ken Buckler on Dec 6, 2024 9:12:29 AM

OpenText World 2024 highlighted the growing role of AI in enterprise transformation, with Aviator, OpenText’s AI platform, as a focal point. Now one year into its deployment, Aviator has demonstrated significant potential in addressing challenges across industries by integrating AI into business processes. The platform reflects OpenText’s broader strategy of “Elevating Human Potential,” focusing on AI, cloud, and security as key drivers of innovation. Aviator’s emphasis on secure, data-driven AI models has positioned it as a useful tool for tackling the complexity of modern information management.

Continue Reading

Bio-whatrics? In the Identity Market, Biometrics Solutions are Gaining Traction, but With Too Narrow a Focus

By Ken Buckler on Sep 17, 2024 9:46:36 AM

I recently had the opportunity to attend Identity Week in Washington, D.C. While this is a smaller conference compared to RSA Conference or Black Hat, some of the conversations were just as powerful and much more focused on the identity market. I was at first encouraged by the large focus of biometrics at the conference, but quickly discouraged upon seeing the limited use cases many of the vendors were promoting.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts