
Ken Buckler - Cyber Security, Caffeinated.
@caffsec
#Cybersecurity Author, Evangelist and Ordained Minister. Tweets not endorsements, all opinions my own. CASP, Security+. Western MD Local News Geek @RFHubCity
ID: 47211120
https://www.kenbuckler.com/ 15-06-2009 00:11:29
92,92K Tweet
4,4K Followers
3,3K Following



Tariffs and taxes don’t just impact the economy—they directly affect #cybersecurity, #IT, and supply chains. Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research discuss in this edition of the #CyberSecurityAwesomeness Podcast devopsdigest.com/cybersecurity-…


The Future Of #ArtificialIntelligence MUST Prioritize #Cybersecurity…Here’s How To Do It ds3-bandwidth.com/2025/03/12/the… #AI Chuck Brooks Nicolas Babin Antonio Grasso Lisa Ventura MBE FCIIS Bob Carver ✠Ken Buckler - Cyber Security, Caffeinated. Cybervizer Tony Moroney Ronald van Loon Jennifer Stirrup #MBA Topics: #AI #Data #Strategy CISO Magazine Global Cybersecurity Forum


Looking to get insights into how government actions on taxes and tariffs are shaping #cybersecurity? Check out this new blog from Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research and listen to the full #CyberSecurityAwesomeness podcast. Read it now! blog.enterprisemanagement.com/cybersecurity-…


Hackers taking the wheel? Literally. Join Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research for this edition of the #CyberSecurityAwesomeness podcast recapping #BlackHatAsia. One session hit hard: hacking your car via Bluetooth. Scary easy. Scary real. devopsdigest.com/cybersecurity-…


#BlackHatAsia2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, and plenty of sobering insights about the evolving #cybersecurity landscape. Get details when you check out this new blog from Ken Buckler - Cyber Security, Caffeinated. from EMA Research. blog.enterprisemanagement.com/black-hat-asia…


Buzzword Bingo at #RSA2025? In this edition of the #CyberSecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research break down the marketing madness, why “AI-powered agentless zero trust” might be a red flag, and how to spot the real tools. devopsdigest.com/cybersecurity-…






🏆 Ember_OT was named a Visionary Vendor in @EMA_Research’s 2025 Vendor Vision report! Jori VanAntwerp was proud to accept the plaque from Ken Buckler - Cyber Security, Caffeinated. during the Sober in Cyber Rockin' Mocktails event at the RSAConference (we were so excited that everyone forgot to snap a pic!)


I just paid $8 for a 20z soda. How? Because while flying Southwest Airlines, I had a layover at San Diego Airport. After getting off my plane I purchased a 20oz soda. Then I follow the signs for gate 11-18, which require you to exit the secure area and go through security again, who of


"Despite the advances we see daily, application security teams are still struggling to adopt AI in a way that helps them improve productivity," said Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research. Read the full FutureCIO article futurecio.tech/agentic-ai-pow… #ai #AgenticAI

In this episode of the #CybersecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research dive into #AgenticAI—what it is, why it matters, and how attackers are already using it. Are defenders ready? Tune in now! devopsdigest.com/cybersecurity-…



What is #cybersecurity maturity and why does it matter? In this #CyberSecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research break down: Why “perfect security” is a myth | How to assess your maturity | #security vs. usability. Tune in: devopsdigest.com/cybersecurity-…


In this new EMA Research blog, Ken Buckler - Cyber Security, Caffeinated. discusses how the Iran conflict is reshaping the #cyberthreat landscape. From hacktivists to nation-state actors, U.S. orgs must prepare for what's next. Learn how: blog.enterprisemanagement.com/what-the-iran-…
