Generative AI hype has permeated the world of IT operations. My latest research found that 96% of IT pros who have evaluated or used generative AI for IT management use cases believe it can make people in their organizations more productive.
Dimensions: 672384147 cm
Other Resources:
See All ResourcesBlog 06/12/2025
Cybersecurity Awesomeness Podcast Recap – Episode 111: Penetration Testing
In the rapidly evolving landscape of cybersecurity, penetration testing stands out as a crucial comp...Blog 05/27/2025
Cybersecurity Awesomeness Podcast Recap – Episode 110: Supply Chain Attacks
In this Cybersecurity Awesomeness Podcast blog recap, EMA cybersecurity experts Chris Steffen and Ke...Blog 05/20/2025
Cybersecurity Awesomeness Podcast Recap – Episode 109: Using AI for Cyberattacks
This Cybersecurity Awesomeness blog recap focuses on the intricacies of agentic AI, shedding light o...Blog 05/12/2025
Cybersecurity Awesomeness Podcast Recap – Episode 108: RSAC Recap
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 04/14/2025
Cybersecurity Awesomeness Podcast Recap – Episode 105: Hacking a Computer-Controlled Vehicle
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 04/14/2025
Hack to the Future: AI, Cars, and Quantum Shenanigans at Black Hat Asia 2025
Black Hat Asia 2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, ...By Ken Buckler
Blog 04/07/2025
Cybersecurity Awesomeness Podcast Recap – Episode 104: Taxes and Tariffs
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 03/27/2025
Messaging in Government: Signal, Microsoft Teams, and the Security-Convenience Paradox
In an era when government operations increasingly rely on digital infrastructure to remain effective...By Ken Buckler
Blog 03/24/2025
Cybersecurity Awesomeness Podcast Recap – Episode 102: Insider Threats
Welcome to the recap of the Enterprise Management Associates (EMA) Cybersecurity Awesomeness (CSA) P...Blog 03/18/2025
Redefining PTaaS: A Goal-Oriented Approach to Include Bug Bounty Programs
In an era when cybersecurity threats continue to evolve at an unprecedented pace, organizations are ...By Ken Buckler