Chris Steffen and Ken Buckler from EMA discuss the ransomware attacks going on at Starbucks through Blue Yonder.
Dimensions: 672384147 cm
Contributors
Other Resources:
See All Resources
Featured 04/02/2026
Enterprise Automation Excellence – Episode 32: The Shift to Agentic Observability: From Insight to Autonomous Action
In this episode of the Enterprise Automation Excellence podcast, Dan Twing and Tom O’Rourke sit down...By Dan Twing

Featured 03/30/2026
Mean Time To Insight – Episode 22: DNS Security
In this episode of the Mean Time to Insight podcast, EMA’s VP of Research Shamus McGillicuddy explo...
Podcast 03/20/2026
Cybersecurity Awesomeness Podcast – Episode 150: RSAC 2026 Preview: AI Agents, Q-Day, and Cutting Through the Cybersecurity Noise
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler gear up for ...
Podcast 03/18/2026
Enterprise Automation Excellence – Episode 31: Governed Agentic AI: Orchestrating ERP Transformation Without Replacement
In this episode of the Enterprise Automation Excellence podcast, Rich Corbridge (CIO, SEGRO plc) joi...By Dan Twing

Podcast 03/13/2026
Cybersecurity Awesomeness Podcast – Episode 149: Effectively Navigate RSAC 2026 with the EMA Vendor Vision
In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler prepare for ...
Podcast 03/10/2026
Are You Scaling Intelligence — or Just Scaling Errors?
This podcast challenges a common belief in enterprise tech – that gathering everything ensures insig...By Herb Blecher

Podcast 03/06/2026
Cybersecurity Awesomeness Podcast – Episode 148: The Shifting Priorities of CISOs
In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler examin...
Podcast 03/05/2026
Enterprise Automation Excellence – Episode 30: From Order Taker to Change Agent
In this episode of the Enterprise Automation Excellence podcast, Dan Twing and Tom O'Rourke discuss ...By Dan Twing

Podcast 02/27/2026
Cybersecurity Awesomeness Podcast – Episode 147: Quantum Computing’s Inevitable Collision with Modern Encryption Standards
Explore how quantum computing threatens modern encryption, the risks of “Harvest Now, Decrypt Later”...
Podcast 02/20/2026


