In early 2026, the world of IT fleet management is undergoing its most radical transformation since the 2020 remote work pivot. The original intent of device management solutions was to make managing multiple computers that required the same configuration easier. Today, it has become the frontline of corporate survival.
Ken Buckler
Recent Posts
The Great Device Reset: Mapping the 2025 Management Landscape, the Linux Management Blind Spot, and the 2026 Shift
By Ken Buckler on Feb 2, 2026 11:43:55 AM
A Scammer Sent Me His Source Code? A Cautionary Tale of the Dangers of Vibe Coding
By Ken Buckler on Jan 27, 2026 10:10:03 AM
Late last night, Mr. William Chalmers from Lloyds Banking Group in the United Kingdom sent me quite an unusual email. With the subject “Mutual Investment,” I absolutely expected yet another boring investment scam email which would promptly go into the spam bin. However, upon opening this email I was pleasantly surprised to see that this scammer had not sent me an “investment opportunity” (read that as investment scam) but accidentally emailed me his source code. Oops. I won’t include the full code here, but I will include some interesting snippets.
The "Triple Threat" of 2026: Why Your AI Workforce Is Your Biggest Security Blind Spot
By Ken Buckler on Jan 19, 2026 3:55:52 PM
If 2025 was the year the industry aggressively deployed agentic AI to automate everything from code deployment to customer service, 2026 is shaping up to be the year we pay the security debt for that speed. We have effectively built an "AI-native" enterprise ecosystem, but in doing so, we have introduced a new class of insider threat that doesn't sleep, doesn't take breaks, and crucially doesn't think like a human.
Is 2026 the Year we Finally Master Zero Trust? Or the Year of Agentic Data Breaches?
By Ken Buckler on Dec 23, 2025 11:14:28 AM
Well, 2025 has been an extremely interesting year with what can only be described as a massive explosion of agentic AI. And while agentic might hold a large amount of potential to address deficiencies the industry has struggled with for years, with great power comes great responsibility.
Google’s New Android Developer Verification Will Increase Device Security Risk for Power Users
By Ken Buckler on Oct 6, 2025 12:10:49 PM
Google's upcoming Android Developer Verification Program (ADVP), which launches fully in 2026, requires all developers to register and verify their identities before their applications can be installed on certified Android devices.
With What Snack Food Will You Authenticate? Identity Week 2025
By Ken Buckler on Sep 19, 2025 11:28:32 AM
When I attended the Identity Week conference in Washington, D.C. last year, I noted a heavy focus on biometrics, especially focused on employee onboarding and background checks. While this is an important topic, I was disappointed that there wasn’t more focus on identity security and non-human identities. This year at Identity Week, that changed significantly.
What the Iran conflict means for the cybersecurity industry
By Ken Buckler on Jun 24, 2025 11:45:30 AM
The recent U.S. strikes on Iranian nuclear facilities dramatically reshaped the cyberthreat landscape facing American networks. In the weeks and possibly even months following the bombings, cybersecurity professionals should anticipate a surge in both opportunistic and state-aligned intrusions aimed at disrupting critical systems, stealing sensitive data, or undermining public confidence in digital infrastructure. Understanding the motivations, tactics, and potential targets of these adversaries is essential for organizations seeking to bolster their defenses and maintain operational resilience.
Hack to the Future: AI, Cars, and Quantum Shenanigans at Black Hat Asia 2025
By Ken Buckler on Apr 14, 2025 4:18:52 PM
Black Hat Asia 2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, and plenty of sobering insights about the evolving cybersecurity landscape. Across two packed days, experts from around the globe tackled threats old and new, offering live demonstrations, original research, and thought-provoking commentary on the increasingly blurred lines between digital, physical, and even quantum attack surfaces.
Messaging in Government: Signal, Microsoft Teams, and the Security-Convenience Paradox
By Ken Buckler on Mar 27, 2025 9:45:33 AM
In an era when government operations increasingly rely on digital infrastructure to remain effective, accountable, and secure, messaging platforms emerged as both an enabler and a risk vector. The question of how government agencies communicate—internally, externally, and across jurisdictional lines—is no longer merely a matter of workflow optimization. It is a fundamental aspect of mission assurance, public trust, and operational integrity. Yet even as messaging tools proliferate and mature, the gulf between platforms built for accountability and those designed for privacy remains pronounced. Nowhere is that divide more evident than in the ongoing tension between Microsoft Teams and Signal—two platforms that, while often deployed in parallel, represent fundamentally different answers to the same set of urgent questions about security, control, and digital sovereignty.
Redefining PTaaS: A Goal-Oriented Approach to Include Bug Bounty Programs
By Ken Buckler on Mar 18, 2025 9:53:47 AM
In an era when cybersecurity threats continue to evolve at an unprecedented pace, organizations are seeking robust, goal-oriented solutions to identify and remediate security vulnerabilities effectively. Traditionally, penetration testing as a service (PTaaS) played a critical role in structured, systematic security assessments. However, as the industry shifts toward more dynamic and continuous testing models, it is becoming increasingly clear that PTaaS needs a redefinition—one that includes the advantages of bug bounty programs under its umbrella.

