Ken Buckler - Cyber Security, Caffeinated. (@caffsec) 's Twitter Profile
Ken Buckler - Cyber Security, Caffeinated.

@caffsec

#Cybersecurity Author, Evangelist and Ordained Minister. Tweets not endorsements, all opinions my own. CASP, Security+. Western MD Local News Geek @RFHubCity

ID: 47211120

linkhttps://www.kenbuckler.com/ calendar_today15-06-2009 00:11:29

92,92K Tweet

4,4K Followers

3,3K Following

EMA Research (@ema_research) 's Twitter Profile Photo

Tariffs and taxes don’t just impact the economy—they directly affect #cybersecurity, #IT, and supply chains. Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research discuss in this edition of the #CyberSecurityAwesomeness Podcast devopsdigest.com/cybersecurity-…

Tariffs and taxes don’t just impact the economy—they directly affect #cybersecurity, #IT, and supply chains. <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> discuss in this edition of the #CyberSecurityAwesomeness Podcast devopsdigest.com/cybersecurity-…
EMA Research (@ema_research) 's Twitter Profile Photo

Looking to get insights into how government actions on taxes and tariffs are shaping #cybersecurity? Check out this new blog from Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research and listen to the full #CyberSecurityAwesomeness podcast. Read it now! blog.enterprisemanagement.com/cybersecurity-…

Looking to get insights into how government actions on taxes and tariffs are shaping #cybersecurity? Check out this new blog from <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> and listen to the full #CyberSecurityAwesomeness podcast. Read it now! blog.enterprisemanagement.com/cybersecurity-…
EMA Research (@ema_research) 's Twitter Profile Photo

Hackers taking the wheel? Literally. Join Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research for this edition of the #CyberSecurityAwesomeness podcast recapping #BlackHatAsia. One session hit hard: hacking your car via Bluetooth. Scary easy. Scary real. devopsdigest.com/cybersecurity-…

Hackers taking the wheel? Literally. Join <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> for this edition of the #CyberSecurityAwesomeness podcast recapping #BlackHatAsia. One session hit hard: hacking your car via Bluetooth. Scary easy. Scary real. devopsdigest.com/cybersecurity-…
EMA Research (@ema_research) 's Twitter Profile Photo

#BlackHatAsia2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, and plenty of sobering insights about the evolving #cybersecurity landscape. Get details when you check out this new blog from Ken Buckler - Cyber Security, Caffeinated. from EMA Research. blog.enterprisemanagement.com/black-hat-asia…

#BlackHatAsia2025 returned to Singapore with a dynamic mix of technical depth, real-world impact, and plenty of sobering insights about the evolving #cybersecurity landscape. Get details when you check out this new blog from <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a>. blog.enterprisemanagement.com/black-hat-asia…
EMA Research (@ema_research) 's Twitter Profile Photo

Buzzword Bingo at #RSA2025? In this edition of the #CyberSecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research break down the marketing madness, why “AI-powered agentless zero trust” might be a red flag, and how to spot the real tools. devopsdigest.com/cybersecurity-…

Buzzword Bingo at #RSA2025? In this edition of the #CyberSecurityAwesomeness podcast, <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> break down the marketing madness, why “AI-powered agentless zero trust” might be a red flag, and how to spot the real tools. devopsdigest.com/cybersecurity-…
Ember_OT (@ember_ot) 's Twitter Profile Photo

🏆 Ember_OT was named a Visionary Vendor in @EMA_Research’s 2025 Vendor Vision report! Jori VanAntwerp was proud to accept the plaque from Ken Buckler - Cyber Security, Caffeinated. during the Sober in Cyber Rockin' Mocktails event at the RSAConference (we were so excited that everyone forgot to snap a pic!)

🏆 <a href="/Ember_OT/">Ember_OT</a> was named a Visionary Vendor in @EMA_Research’s 2025 Vendor Vision report!

<a href="/CSecDaemon/">Jori VanAntwerp</a> was proud to accept the plaque from <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> during the <a href="/SoberInCyber/">Sober in Cyber</a> Rockin' Mocktails event at the <a href="/RSAConference/">RSAConference</a> (we were so excited that everyone forgot to snap a pic!)
Ken Buckler - Cyber Security, Caffeinated. (@caffsec) 's Twitter Profile Photo

I just paid $8 for a 20z soda. How? Because while flying Southwest Airlines, I had a layover at San Diego Airport. After getting off my plane I purchased a 20oz soda. Then I follow the signs for gate 11-18, which require you to exit the secure area and go through security again, who of

I just paid $8 for a 20z soda. How? Because while flying <a href="/SouthwestAir/">Southwest Airlines</a>, I had a layover at <a href="/SanDiegoAirport/">San Diego Airport</a>. After getting off my plane I purchased a 20oz soda. Then I follow the signs for gate 11-18, which require you to exit the secure area and go through security again, who of
EMA Research (@ema_research) 's Twitter Profile Photo

"Despite the advances we see daily, application security teams are still struggling to adopt AI in a way that helps them improve productivity," said Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research. Read the full FutureCIO article futurecio.tech/agentic-ai-pow… #ai #AgenticAI

EMA Research (@ema_research) 's Twitter Profile Photo

In this episode of the #CybersecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research dive into #AgenticAI—what it is, why it matters, and how attackers are already using it. Are defenders ready? Tune in now! devopsdigest.com/cybersecurity-…

In this episode of the #CybersecurityAwesomeness podcast, <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> dive into #AgenticAI—what it is, why it matters, and how attackers are already using it. Are defenders ready? Tune in now! devopsdigest.com/cybersecurity-…
EMA Research (@ema_research) 's Twitter Profile Photo

What is #cybersecurity maturity and why does it matter? In this #CyberSecurityAwesomeness podcast, Christopher M. Steffen, CISSP, CISA & Ken Buckler - Cyber Security, Caffeinated. from EMA Research break down: Why “perfect security” is a myth | How to assess your maturity | #security vs. usability. Tune in: devopsdigest.com/cybersecurity-…

What is #cybersecurity maturity and why does it matter? In this #CyberSecurityAwesomeness podcast, <a href="/CloudSecChris/">Christopher M. Steffen, CISSP, CISA</a> &amp; <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> from <a href="/ema_research/">EMA Research</a> break down: Why “perfect security” is a myth | How to assess your maturity | #security vs. usability.  Tune in: devopsdigest.com/cybersecurity-…
EMA Research (@ema_research) 's Twitter Profile Photo

In this new EMA Research blog, Ken Buckler - Cyber Security, Caffeinated. discusses how the Iran conflict is reshaping the #cyberthreat landscape. From hacktivists to nation-state actors, U.S. orgs must prepare for what's next. Learn how: blog.enterprisemanagement.com/what-the-iran-…

In this new <a href="/ema_research/">EMA Research</a> blog, <a href="/CaffSec/">Ken Buckler - Cyber Security, Caffeinated.</a> discusses how the Iran conflict is reshaping the #cyberthreat landscape. From hacktivists to nation-state actors, U.S. orgs must prepare for what's next.
Learn how: blog.enterprisemanagement.com/what-the-iran-…