<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/rss+xml" href="https://feeds.transistor.fm/ema-cybersecurityawesomeness-podcast" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>Cybersecurity Awesomeness Podcast</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/ema-cybersecurityawesomeness-podcast</itunes:new-feed-url>
    <description>The Cybersecurity Awesomeness Podcast from Enterprise Management Asscoaites (EMA) features cybersecurity experts Chris Steffen and Ken Buckler discussing critical cybersecurity issues. They cover everything from the challenges of certificate management and the cyber workforce talent shortage to deep. Available on all major platforms, this podcast offers credible, well-regarded insights into today's top security topics.</description>
    <copyright>Enterprise Management Associates</copyright>
    <podcast:guid>f77a2229-c096-5b4f-8f37-4243827eecbf</podcast:guid>
    <podcast:locked owner="emapodcastaccount@enterprisemanagement.com">no</podcast:locked>
    <language>en</language>
    <pubDate>Fri, 06 Mar 2026 04:00:12 -0700</pubDate>
    <lastBuildDate>Fri, 06 Mar 2026 04:13:49 -0700</lastBuildDate>
    <link>http://www.enterprisemanagement.com</link>
    <image>
      <url>https://img.transistorcdn.com/WRKdXyGyQaYY9oOyh6YB6Gn0J5HebHDf_H0-Sr249h4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM3NTY1LzE2ODAy/ODQ1NTgtYXJ0d29y/ay5qcGc.jpg</url>
      <title>Cybersecurity Awesomeness Podcast</title>
      <link>http://www.enterprisemanagement.com</link>
    </image>
    <itunes:category text="Technology"/>
    <itunes:category text="News">
      <itunes:category text="Tech News"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Enterprise Management Associates </itunes:author>
    <itunes:image href="https://img.transistorcdn.com/WRKdXyGyQaYY9oOyh6YB6Gn0J5HebHDf_H0-Sr249h4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM3NTY1LzE2ODAy/ODQ1NTgtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>The Cybersecurity Awesomeness Podcast from Enterprise Management Asscoaites (EMA) features cybersecurity experts Chris Steffen and Ken Buckler discussing critical cybersecurity issues. They cover everything from the challenges of certificate management and the cyber workforce talent shortage to deep. Available on all major platforms, this podcast offers credible, well-regarded insights into today's top security topics.</itunes:summary>
    <itunes:subtitle>The Cybersecurity Awesomeness Podcast from Enterprise Management Asscoaites (EMA) features cybersecurity experts Chris Steffen and Ken Buckler discussing critical cybersecurity issues.</itunes:subtitle>
    <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
    <itunes:owner>
      <itunes:name>Enterprise Management Associates</itunes:name>
      <itunes:email>emapodcastaccount@enterprisemanagement.com</itunes:email>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 148</title>
      <itunes:episode>148</itunes:episode>
      <podcast:episode>148</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 148</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0eb90ff0-c3bb-4c95-a7e1-76abb124c229</guid>
      <link>https://share.transistor.fm/s/901d7a7d</link>
      <description>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.</p><p>The conversation characterizes AI as a paradox: a tool with "graduate-level intelligence but the gullibility of an eight-year-old." The hosts argue that marginal productivity gains cannot justify catastrophic risks like data destruction or unauthorized access. Ultimately, the episode emphasizes that AI should not be pursued at the expense of foundational security pillars like identity management. CISOs are urged to apply existing human-centric guardrails to AI agents, ensuring these tools remain business enablers rather than liabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.</p><p>The conversation characterizes AI as a paradox: a tool with "graduate-level intelligence but the gullibility of an eight-year-old." The hosts argue that marginal productivity gains cannot justify catastrophic risks like data destruction or unauthorized access. Ultimately, the episode emphasizes that AI should not be pursued at the expense of foundational security pillars like identity management. CISOs are urged to apply existing human-centric guardrails to AI agents, ensuring these tools remain business enablers rather than liabilities.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Mar 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/901d7a7d/473f8079.mp3" length="14061399" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>772</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, hosts Chris Steffen and Ken Buckler explore the shifting priorities of Chief Information Security Officers (CISOs) as they navigate the transition from rapid AI adoption to a more disciplined, risk-aware strategy. As of 2026, the "deploy first, secure later" mentality is facing a reckoning, particularly regarding autonomous or agentic AI. The discussion highlights alarming real-world incidents—such as an AI agent deleting a production database during a code freeze and another wiping a Meta executive's inbox despite repeated "stop" commands—to illustrate the volatility of unmanaged AI.</p><p>The conversation characterizes AI as a paradox: a tool with "graduate-level intelligence but the gullibility of an eight-year-old." The hosts argue that marginal productivity gains cannot justify catastrophic risks like data destruction or unauthorized access. Ultimately, the episode emphasizes that AI should not be pursued at the expense of foundational security pillars like identity management. CISOs are urged to apply existing human-centric guardrails to AI agents, ensuring these tools remain business enablers rather than liabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 147</title>
      <itunes:episode>147</itunes:episode>
      <podcast:episode>147</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 147</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ef43ee04-c7ba-4916-aa9e-8b678de5463b</guid>
      <link>https://share.transistor.fm/s/37cd6954</link>
      <description>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.</p><p>While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for security professionals. Organizations must move beyond traditional binary mindsets to adopt quantum-resistant algorithms, as the transition is a multi-year endeavor rather than an overnight fix. Even for those skeptical of the timeline, the push toward quantum readiness represents a necessary evolution in global security standards. Ultimately, the episode underscores that being quantum ready is no longer a futuristic luxury but a foundational requirement for protecting long-term intellectual property and state secrets in an increasingly complex digital landscape.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.</p><p>While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for security professionals. Organizations must move beyond traditional binary mindsets to adopt quantum-resistant algorithms, as the transition is a multi-year endeavor rather than an overnight fix. Even for those skeptical of the timeline, the push toward quantum readiness represents a necessary evolution in global security standards. Ultimately, the episode underscores that being quantum ready is no longer a futuristic luxury but a foundational requirement for protecting long-term intellectual property and state secrets in an increasingly complex digital landscape.</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Feb 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/37cd6954/dec205bf.mp3" length="14378727" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>803</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler explore the looming reality of quantum computing and its inevitable collision with modern encryption standards. The discussion centers on Q-Day—the theoretical point at which quantum processors reach approximately 100,000 qubits, making current AES-256 encryption vulnerable to near-instantaneous decryption. The hosts emphasize the Harvest Now, Decrypt Later strategy, where adversaries stockpile encrypted sensitive data today in anticipation of tomorrow’s quantum capabilities.</p><p>While acknowledging the Quantum Dividend—the massive potential for breakthroughs in medicine and engineering—the conversation serves as an urgent call to action for security professionals. Organizations must move beyond traditional binary mindsets to adopt quantum-resistant algorithms, as the transition is a multi-year endeavor rather than an overnight fix. Even for those skeptical of the timeline, the push toward quantum readiness represents a necessary evolution in global security standards. Ultimately, the episode underscores that being quantum ready is no longer a futuristic luxury but a foundational requirement for protecting long-term intellectual property and state secrets in an increasingly complex digital landscape.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 146</title>
      <itunes:episode>146</itunes:episode>
      <podcast:episode>146</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 146</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9208234e-7dbf-4cac-86d9-fb917e7883c9</guid>
      <link>https://share.transistor.fm/s/69647f58</link>
      <description>
        <![CDATA[<p>In this "Cybersecurity 101" episode, Chris Steffen and Ken Buckler demystify <strong>quantum computing</strong> and its looming implications for modern encryption. Ken contrasts traditional binary bits—static ones and zeros—with <strong>qubits</strong>, using the analogy of a spinning coin to represent the multiple simultaneous states quantum computers can process. This immense power allows quantum systems to solve complex problems in milliseconds that would take traditional computers lifetimes. However, significant physical hurdles remain, such as the requirement for near-absolute zero cooling environments.</p><p>The most pressing security concern discussed is <strong>"Q-Day"</strong> and the "Harvest Now, Decrypt Later" strategy. Malicious actors are currently stockpiling encrypted government secrets, financial records, and intellectual property, waiting for quantum technology to become viable enough to shatter current encryption standards. The hosts emphasize the urgent necessity of <strong>Post-Quantum Cryptography (PQC)</strong> to protect long-term sensitive data. Chris concludes by noting his upcoming research report on PQC, highlighting how organizations must prepare for a universe where current digital safeguards may soon become obsolete.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this "Cybersecurity 101" episode, Chris Steffen and Ken Buckler demystify <strong>quantum computing</strong> and its looming implications for modern encryption. Ken contrasts traditional binary bits—static ones and zeros—with <strong>qubits</strong>, using the analogy of a spinning coin to represent the multiple simultaneous states quantum computers can process. This immense power allows quantum systems to solve complex problems in milliseconds that would take traditional computers lifetimes. However, significant physical hurdles remain, such as the requirement for near-absolute zero cooling environments.</p><p>The most pressing security concern discussed is <strong>"Q-Day"</strong> and the "Harvest Now, Decrypt Later" strategy. Malicious actors are currently stockpiling encrypted government secrets, financial records, and intellectual property, waiting for quantum technology to become viable enough to shatter current encryption standards. The hosts emphasize the urgent necessity of <strong>Post-Quantum Cryptography (PQC)</strong> to protect long-term sensitive data. Chris concludes by noting his upcoming research report on PQC, highlighting how organizations must prepare for a universe where current digital safeguards may soon become obsolete.</p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Feb 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/69647f58/ff5b0481.mp3" length="16747623" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>923</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this "Cybersecurity 101" episode, Chris Steffen and Ken Buckler demystify <strong>quantum computing</strong> and its looming implications for modern encryption. Ken contrasts traditional binary bits—static ones and zeros—with <strong>qubits</strong>, using the analogy of a spinning coin to represent the multiple simultaneous states quantum computers can process. This immense power allows quantum systems to solve complex problems in milliseconds that would take traditional computers lifetimes. However, significant physical hurdles remain, such as the requirement for near-absolute zero cooling environments.</p><p>The most pressing security concern discussed is <strong>"Q-Day"</strong> and the "Harvest Now, Decrypt Later" strategy. Malicious actors are currently stockpiling encrypted government secrets, financial records, and intellectual property, waiting for quantum technology to become viable enough to shatter current encryption standards. The hosts emphasize the urgent necessity of <strong>Post-Quantum Cryptography (PQC)</strong> to protect long-term sensitive data. Chris concludes by noting his upcoming research report on PQC, highlighting how organizations must prepare for a universe where current digital safeguards may soon become obsolete.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 145</title>
      <itunes:episode>145</itunes:episode>
      <podcast:episode>145</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 145</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">496579a3-69b1-4810-a9c0-6100dd52edf1</guid>
      <link>https://share.transistor.fm/s/4a106984</link>
      <description>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler dissect the federal government’s evolving—and somewhat strained—approach to cybersecurity. A major catalyst for the discussion is the recent withdrawal of agencies like CISA, the FBI, and the NSA from the RSAC conference following former CISA head Jen Easterly’s appointment there. While potentially a move toward fiscal responsibility—given the $5,000 per-person total cost of the event—the hosts warn this retreat could stifle vital public-private partnerships and recruitment efforts.</p><p>The discussion also tackles systemic talent issues within the military. Experts often face a "promotion trap," being moved into management just as they peak technically, while private-sector salaries can reach 10x their military pay. To counter this, units like the Maryland Air National Guard are pivoting from traditional aircraft to dedicated cyber missions. Ultimately, the hosts argue that the government risks falling behind on emerging technology adoption by absenting itself from the industry's largest collaborative forums. This "cyber-isolationism" could leave federal agencies ill-equipped to handle rapidly evolving threats.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler dissect the federal government’s evolving—and somewhat strained—approach to cybersecurity. A major catalyst for the discussion is the recent withdrawal of agencies like CISA, the FBI, and the NSA from the RSAC conference following former CISA head Jen Easterly’s appointment there. While potentially a move toward fiscal responsibility—given the $5,000 per-person total cost of the event—the hosts warn this retreat could stifle vital public-private partnerships and recruitment efforts.</p><p>The discussion also tackles systemic talent issues within the military. Experts often face a "promotion trap," being moved into management just as they peak technically, while private-sector salaries can reach 10x their military pay. To counter this, units like the Maryland Air National Guard are pivoting from traditional aircraft to dedicated cyber missions. Ultimately, the hosts argue that the government risks falling behind on emerging technology adoption by absenting itself from the industry's largest collaborative forums. This "cyber-isolationism" could leave federal agencies ill-equipped to handle rapidly evolving threats.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Feb 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4a106984/3a92b693.mp3" length="16993647" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>879</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler dissect the federal government’s evolving—and somewhat strained—approach to cybersecurity. A major catalyst for the discussion is the recent withdrawal of agencies like CISA, the FBI, and the NSA from the RSAC conference following former CISA head Jen Easterly’s appointment there. While potentially a move toward fiscal responsibility—given the $5,000 per-person total cost of the event—the hosts warn this retreat could stifle vital public-private partnerships and recruitment efforts.</p><p>The discussion also tackles systemic talent issues within the military. Experts often face a "promotion trap," being moved into management just as they peak technically, while private-sector salaries can reach 10x their military pay. To counter this, units like the Maryland Air National Guard are pivoting from traditional aircraft to dedicated cyber missions. Ultimately, the hosts argue that the government risks falling behind on emerging technology adoption by absenting itself from the industry's largest collaborative forums. This "cyber-isolationism" could leave federal agencies ill-equipped to handle rapidly evolving threats.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 144</title>
      <itunes:episode>144</itunes:episode>
      <podcast:episode>144</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 144</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e86ecf69-c3ea-4fd9-b960-7f99ca06a4bf</guid>
      <link>https://share.transistor.fm/s/cee93f01</link>
      <description>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, host Chris Steffen and Simon Wijckmans, CEO of C-side, discuss the critical visibility gap in client-side security. While organizations invest heavily in infrastructure and server-side protection, the user's browser remains a largely unmonitored attack vector. Historically, solutions like Content Security Policies and JavaScript agents have proven brittle or easily bypassed by sophisticated scripts that can hide from crawlers or override security hooks.</p><p>The conversation highlights a major shift driven by PCI DSS 4.0, which now mandates the monitoring and authorization of client-side scripts. Simon explains that modern browser changes regarding third-party cookies finally support more effective proxy-based approaches. This allows security teams to inspect and block malicious third-party scripts before they reach the end user, preventing data exfiltration like credit card skimming. The hosts urge security professionals to move beyond "head in the sand" tactics, emphasizing that robust browser security is now a regulatory and operational necessity for total asset protection.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, host Chris Steffen and Simon Wijckmans, CEO of C-side, discuss the critical visibility gap in client-side security. While organizations invest heavily in infrastructure and server-side protection, the user's browser remains a largely unmonitored attack vector. Historically, solutions like Content Security Policies and JavaScript agents have proven brittle or easily bypassed by sophisticated scripts that can hide from crawlers or override security hooks.</p><p>The conversation highlights a major shift driven by PCI DSS 4.0, which now mandates the monitoring and authorization of client-side scripts. Simon explains that modern browser changes regarding third-party cookies finally support more effective proxy-based approaches. This allows security teams to inspect and block malicious third-party scripts before they reach the end user, preventing data exfiltration like credit card skimming. The hosts urge security professionals to move beyond "head in the sand" tactics, emphasizing that robust browser security is now a regulatory and operational necessity for total asset protection.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Feb 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/cee93f01/3f7baf98.mp3" length="21002031" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>996</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, host Chris Steffen and Simon Wijckmans, CEO of C-side, discuss the critical visibility gap in client-side security. While organizations invest heavily in infrastructure and server-side protection, the user's browser remains a largely unmonitored attack vector. Historically, solutions like Content Security Policies and JavaScript agents have proven brittle or easily bypassed by sophisticated scripts that can hide from crawlers or override security hooks.</p><p>The conversation highlights a major shift driven by PCI DSS 4.0, which now mandates the monitoring and authorization of client-side scripts. Simon explains that modern browser changes regarding third-party cookies finally support more effective proxy-based approaches. This allows security teams to inspect and block malicious third-party scripts before they reach the end user, preventing data exfiltration like credit card skimming. The hosts urge security professionals to move beyond "head in the sand" tactics, emphasizing that robust browser security is now a regulatory and operational necessity for total asset protection.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 143</title>
      <itunes:episode>143</itunes:episode>
      <podcast:episode>143</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 143</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2070b458-2aeb-48f6-b282-50fc13852f76</guid>
      <link>https://share.transistor.fm/s/c72cf3fc</link>
      <description>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler discuss a humorous yet sobering encounter with a failed AI-driven scam. Ken recently received a common "advance fee" investment scam email, but with a unique twist: the attacker accidentally sent the Python source code instead of the intended message. The code contained telltale signs of AI generation, including placeholder instructions like "replace this with the actual import" for the Gemini SDK.</p><p>The hosts explain that while this specific attacker failed "successfully," the incident provides concrete proof that scammers are using generative AI to replace the broken English of past scams with highly literate, convincing phishing lures. This shift makes it increasingly difficult for users to spot fraud through traditional "tells." Chris emphasizes that manual defense is no longer sufficient against automated bot armies. To stay protected, organizations must integrate AI-driven security tools to match the speed and sophistication of these evolving threats. As Ken notes, the future of these attacks will likely escalate into deepfakes and multimodal social engineering.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler discuss a humorous yet sobering encounter with a failed AI-driven scam. Ken recently received a common "advance fee" investment scam email, but with a unique twist: the attacker accidentally sent the Python source code instead of the intended message. The code contained telltale signs of AI generation, including placeholder instructions like "replace this with the actual import" for the Gemini SDK.</p><p>The hosts explain that while this specific attacker failed "successfully," the incident provides concrete proof that scammers are using generative AI to replace the broken English of past scams with highly literate, convincing phishing lures. This shift makes it increasingly difficult for users to spot fraud through traditional "tells." Chris emphasizes that manual defense is no longer sufficient against automated bot armies. To stay protected, organizations must integrate AI-driven security tools to match the speed and sophistication of these evolving threats. As Ken notes, the future of these attacks will likely escalate into deepfakes and multimodal social engineering.</p>]]>
      </content:encoded>
      <pubDate>Fri, 30 Jan 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/c72cf3fc/2cc1538f.mp3" length="14387296" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler discuss a humorous yet sobering encounter with a failed AI-driven scam. Ken recently received a common "advance fee" investment scam email, but with a unique twist: the attacker accidentally sent the Python source code instead of the intended message. The code contained telltale signs of AI generation, including placeholder instructions like "replace this with the actual import" for the Gemini SDK.</p><p>The hosts explain that while this specific attacker failed "successfully," the incident provides concrete proof that scammers are using generative AI to replace the broken English of past scams with highly literate, convincing phishing lures. This shift makes it increasingly difficult for users to spot fraud through traditional "tells." Chris emphasizes that manual defense is no longer sufficient against automated bot armies. To stay protected, organizations must integrate AI-driven security tools to match the speed and sophistication of these evolving threats. As Ken notes, the future of these attacks will likely escalate into deepfakes and multimodal social engineering.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 142</title>
      <itunes:episode>142</itunes:episode>
      <podcast:episode>142</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 142</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25d07a93-fd6a-4053-ab8d-21203a66a14c</guid>
      <link>https://share.transistor.fm/s/dcdea991</link>
      <description>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.</p><p>Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers process highly sensitive data and frequently lack unified management platforms, they offer a 360-degree risk landscape for cybercriminals. The conversation emphasizes that "locking the front door" by declaring a dedicated security owner and integrating print fleets into a unified security strategy is essential. Symphion provides a turnkey solution to bridge this visibility gap, ensuring these "graveyard endpoints" are hardened, monitored, and securely managed.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.</p><p>Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers process highly sensitive data and frequently lack unified management platforms, they offer a 360-degree risk landscape for cybercriminals. The conversation emphasizes that "locking the front door" by declaring a dedicated security owner and integrating print fleets into a unified security strategy is essential. Symphion provides a turnkey solution to bridge this visibility gap, ensuring these "graveyard endpoints" are hardened, monitored, and securely managed.</p>]]>
      </content:encoded>
      <pubDate>Fri, 23 Jan 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/dcdea991/8e486601.mp3" length="13258566" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>831</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler are joined by Jim LaRoe, CEO of Symphion, to discuss the often-ignored threat of printer and IoT security. Jim reveals a startling set of "winning lottery numbers": printers account for 20% of network endpoints, yet 99% remain unprotected. With 67% of organizations reporting a printer-related security incident last year, these devices serve as a critical yet vulnerable vector for lateral movement and credential harvesting.</p><p>Jim explains this widespread neglect through his "Five O's," citing the lack of a formal Owner and their Origin as business equipment rather than IT endpoints. Because printers process highly sensitive data and frequently lack unified management platforms, they offer a 360-degree risk landscape for cybercriminals. The conversation emphasizes that "locking the front door" by declaring a dedicated security owner and integrating print fleets into a unified security strategy is essential. Symphion provides a turnkey solution to bridge this visibility gap, ensuring these "graveyard endpoints" are hardened, monitored, and securely managed.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 141</title>
      <itunes:episode>141</itunes:episode>
      <podcast:episode>141</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 141</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">45161685-a90e-43b0-8208-1a345f20fd3a</guid>
      <link>https://share.transistor.fm/s/ed4d9004</link>
      <description>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.</p><p>A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.</p><p>The discussion also addresses the myth of data anonymization, noting that aggregated consumer data is easily de-anonymized and sold to third parties. The hosts conclude that when a device offers "value-add" connectivity, the consumer’s personal data is often the actual product. They urge listeners to adopt a critical mindset regarding the risk-to-benefit ratio of every connected device they bring into their homes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.</p><p>A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.</p><p>The discussion also addresses the myth of data anonymization, noting that aggregated consumer data is easily de-anonymized and sold to third parties. The hosts conclude that when a device offers "value-add" connectivity, the consumer’s personal data is often the actual product. They urge listeners to adopt a critical mindset regarding the risk-to-benefit ratio of every connected device they bring into their homes.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Jan 2026 04:00:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/ed4d9004/7f79ff34.mp3" length="11801823" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>782</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In this episode, Chris Steffen and Ken Buckler discuss the alarming security and privacy implications of the "Internet of All Things." The hosts highlight how manufacturers are connecting everything—from AI-powered treadmills to smart toothbrushes—often without considering the associated risks.</p><p>A primary concern is the shift toward recurring revenue models, where companies gate-keep hardware features behind monthly subscriptions. Beyond the cost, Ken warns of the physical security threats posed by Bluetooth-enabled appliances. He explains how broadcasting devices can inadvertently signal a resident's presence or daily habits to malicious actors in close proximity.</p><p>The discussion also addresses the myth of data anonymization, noting that aggregated consumer data is easily de-anonymized and sold to third parties. The hosts conclude that when a device offers "value-add" connectivity, the consumer’s personal data is often the actual product. They urge listeners to adopt a critical mindset regarding the risk-to-benefit ratio of every connected device they bring into their homes.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 140</title>
      <itunes:episode>140</itunes:episode>
      <podcast:episode>140</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 140</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e04214bd-6c40-487e-a0b3-0dce95fe2f47</guid>
      <link>https://share.transistor.fm/s/28a7ba89</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Jan 2026 01:35:19 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/28a7ba89/dc6b0301.mp3" length="9849485" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>701</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss privacy concerns around generative AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 139</title>
      <itunes:episode>139</itunes:episode>
      <podcast:episode>139</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 139</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">526c1704-87a6-4192-90ee-c80a3068c50f</guid>
      <link>https://share.transistor.fm/s/a9d3004c</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Dec 2025 02:28:35 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a9d3004c/fc151632.mp3" length="14605973" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>951</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present their 2026 Cybersecurity Predictions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 138</title>
      <itunes:episode>138</itunes:episode>
      <podcast:episode>138</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 138</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8fc71127-87f4-4c2b-b028-61fb81cb4052</guid>
      <link>https://share.transistor.fm/s/0caf064d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss API security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss API security.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Dec 2025 02:25:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0caf064d/1e502bf0.mp3" length="13702853" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>959</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss API security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 137</title>
      <itunes:episode>137</itunes:episode>
      <podcast:episode>137</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 137</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f6a59bf2-8a97-4c98-bc61-7291bf30aa8e</guid>
      <link>https://share.transistor.fm/s/b456b5ce</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.</p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Dec 2025 01:01:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/b456b5ce/b29e17f9.mp3" length="10182941" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>659</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss attacks via SEO outreach on news sites.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 136</title>
      <itunes:episode>136</itunes:episode>
      <podcast:episode>136</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 136</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6281b9fb-9148-457c-8d98-41fd6ff7e25e</guid>
      <link>https://share.transistor.fm/s/83a96940</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Nov 2025 12:53:35 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/83a96940/60a645f7.mp3" length="12977789" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>829</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss what they are thankful for in cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 135</title>
      <itunes:episode>135</itunes:episode>
      <podcast:episode>135</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 135</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">699a6864-6e60-4198-9017-39f2bd517e6c</guid>
      <link>https://share.transistor.fm/s/916cb823</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Nov 2025 01:56:45 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/916cb823/aba375e4.mp3" length="13741973" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the Cloudflare outage and what availability means in the technology space.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 134</title>
      <itunes:episode>134</itunes:episode>
      <podcast:episode>134</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 134</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5c55929-f5e4-4ff5-808c-01cd250ccd89</guid>
      <link>https://share.transistor.fm/s/8ad848c3</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Nov 2025 01:01:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/8ad848c3/c4e884ac.mp3" length="17888789" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>811</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss securing AI LLMs.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 133</title>
      <itunes:episode>133</itunes:episode>
      <podcast:episode>133</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 133</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">11addd84-fb3d-4103-a242-2c3ad60a78fa</guid>
      <link>https://share.transistor.fm/s/3b6c9ff9</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss trends in network security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss trends in network security.</p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Nov 2025 11:46:09 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3b6c9ff9/c14698c3.mp3" length="24310181" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1151</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss trends in network security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 132</title>
      <itunes:episode>132</itunes:episode>
      <podcast:episode>132</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 132</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3cb7ae98-8408-4ec0-be86-244c0089747a</guid>
      <link>https://share.transistor.fm/s/59ddb03f</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 Oct 2025 02:23:09 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/59ddb03f/6cbc6853.mp3" length="17163077" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss phishing and deep fakes for Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 131</title>
      <itunes:episode>131</itunes:episode>
      <podcast:episode>131</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 131</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">91a519d9-c5ef-48f5-9905-3586960258f2</guid>
      <link>https://share.transistor.fm/s/a98b3fc6</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Oct 2025 03:42:41 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a98b3fc6/92f29d34.mp3" length="20981525" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>968</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats for Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 130</title>
      <itunes:episode>130</itunes:episode>
      <podcast:episode>130</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 130</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16f64dc6-a5e3-4036-b4da-87998d50fc18</guid>
      <link>https://share.transistor.fm/s/7a2e2965</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Oct 2025 03:04:08 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/7a2e2965/4d116a5c.mp3" length="16444757" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>975</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss mobile device protection and public Wi-Fi concerns for Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 129</title>
      <itunes:episode>129</itunes:episode>
      <podcast:episode>129</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 129</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f111f9df-81a8-4561-9733-188835119c2f</guid>
      <link>https://share.transistor.fm/s/aa17d087</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data security and software updates for Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data security and software updates for Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Oct 2025 12:04:58 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/aa17d087/59172223.mp3" length="15795725" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>997</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data security and software updates for Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 128</title>
      <itunes:episode>128</itunes:episode>
      <podcast:episode>128</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 128</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">dab58869-839b-4b76-80ce-c021da9017c6</guid>
      <link>https://share.transistor.fm/s/59fc7226</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Thu, 02 Oct 2025 22:24:05 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/59fc7226/a308e36d.mp3" length="13026293" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>852</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss MFA and password managers for Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 127</title>
      <itunes:episode>127</itunes:episode>
      <podcast:episode>127</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 127</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">604b448b-3439-4220-a158-346abf49991a</guid>
      <link>https://share.transistor.fm/s/7b725b67</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Sep 2025 03:00:30 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/7b725b67/9d12c3c3.mp3" length="14240741" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>860</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the government's investment in developing the cybersecurity workforce.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 126</title>
      <itunes:episode>126</itunes:episode>
      <podcast:episode>126</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 126</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d77b6f4a-6a50-4f36-93d4-9006b54d9198</guid>
      <link>https://share.transistor.fm/s/caa47f22</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Sep 2025 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/caa47f22/9dfd5892.mp3" length="13273805" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>800</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the increase in nation state attacks on small and medium sized businesses.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 125</title>
      <itunes:episode>125</itunes:episode>
      <podcast:episode>125</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 125</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">de851a61-9994-4e33-a667-904ceee03f0c</guid>
      <link>https://share.transistor.fm/s/be2608ef</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Sep 2025 01:30:01 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/be2608ef/b39e4533.mp3" length="13259957" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>829</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Ransomware.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 124</title>
      <itunes:episode>124</itunes:episode>
      <podcast:episode>124</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 124</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">789c967b-eb26-4adb-b65b-9bc14c6891f2</guid>
      <link>https://share.transistor.fm/s/10fd220d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss  the largest ever recorded DDoS attack, and the efforts used to stop it.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss  the largest ever recorded DDoS attack, and the efforts used to stop it.</p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Sep 2025 03:24:05 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/10fd220d/5e00669a.mp3" length="18379445" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>829</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss  the largest ever recorded DDoS attack, and the efforts used to stop it.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 123</title>
      <itunes:episode>123</itunes:episode>
      <podcast:episode>123</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 123</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ee3260aa-1b29-4d6f-961a-88cde2295f18</guid>
      <link>https://share.transistor.fm/s/9c9f5439</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity's role at the start the new school year.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity's role at the start the new school year.</p>]]>
      </content:encoded>
      <pubDate>Thu, 28 Aug 2025 18:24:44 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/9c9f5439/29acf1af.mp3" length="19240277" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>869</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity's role at the start the new school year.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 122</title>
      <itunes:episode>122</itunes:episode>
      <podcast:episode>122</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 122</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8930209b-d514-4301-bf59-dceed083b8c1</guid>
      <link>https://share.transistor.fm/s/7bb6379b</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss proactive vs. reactive cybersecurity. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss proactive vs. reactive cybersecurity. </p>]]>
      </content:encoded>
      <pubDate>Fri, 22 Aug 2025 03:10:29 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/7bb6379b/a146f6d5.mp3" length="19014125" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>855</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss proactive vs. reactive cybersecurity. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 121</title>
      <itunes:episode>121</itunes:episode>
      <podcast:episode>121</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 121</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d3036675-2b09-40ac-8a51-170d227ed874</guid>
      <link>https://share.transistor.fm/s/dd7fc652</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a Black Hat 2025 Wrap-Up and discuss AI security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a Black Hat 2025 Wrap-Up and discuss AI security.</p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Aug 2025 12:09:48 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/dd7fc652/8c26e0e7.mp3" length="19585085" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>867</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a Black Hat 2025 Wrap-Up and discuss AI security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 120</title>
      <itunes:episode>120</itunes:episode>
      <podcast:episode>120</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 120</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1af2052c-165a-4859-a858-80f241103e09</guid>
      <link>https://share.transistor.fm/s/5467ca57</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data governance for agentic AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data governance for agentic AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Aug 2025 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5467ca57/36825fd9.mp3" length="20898533" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>957</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss data governance for agentic AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 119</title>
      <itunes:episode>119</itunes:episode>
      <podcast:episode>119</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 119</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">90600c5e-282b-4e4f-8cc2-002a17df860f</guid>
      <link>https://share.transistor.fm/s/f7a310db</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of Black Hat 2025.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of Black Hat 2025.</p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Aug 2025 11:20:07 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f7a310db/dcc86a1f.mp3" length="15625517" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of Black Hat 2025.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 118</title>
      <itunes:episode>118</itunes:episode>
      <podcast:episode>118</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 118</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c18f9eb4-73cc-4ef0-8911-1fc2b213c77b</guid>
      <link>https://share.transistor.fm/s/2d45a476</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest Zero Day attack on SharePoint.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest Zero Day attack on SharePoint.</p>]]>
      </content:encoded>
      <pubDate>Fri, 25 Jul 2025 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2d45a476/3e9a1fca.mp3" length="17803061" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>812</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest Zero Day attack on SharePoint.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 117</title>
      <itunes:episode>117</itunes:episode>
      <podcast:episode>117</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 117</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1667c3d0-0793-4321-bd37-21f2d1a7505e</guid>
      <link>https://share.transistor.fm/s/6344fb52</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: the CIA of security, known as the security triad.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: the CIA of security, known as the security triad.</p>]]>
      </content:encoded>
      <pubDate>Fri, 18 Jul 2025 04:20:42 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/6344fb52/b621089a.mp3" length="15049733" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>940</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: the CIA of security, known as the security triad.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 116</title>
      <itunes:episode>116</itunes:episode>
      <podcast:episode>116</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 116</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0098d70a-ad64-48f9-9911-5a16580267b5</guid>
      <link>https://share.transistor.fm/s/a90be90c</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss having a false sense of cybersecurity with some of the tools people regularly download and use.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss having a false sense of cybersecurity with some of the tools people regularly download and use.</p>]]>
      </content:encoded>
      <pubDate>Fri, 11 Jul 2025 12:41:06 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a90be90c/1d0bcfe7.mp3" length="13416101" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss having a false sense of cybersecurity with some of the tools people regularly download and use.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 115</title>
      <itunes:episode>115</itunes:episode>
      <podcast:episode>115</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 115</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">580ced80-933d-44a6-91b8-8c6157c07ecf</guid>
      <link>https://share.transistor.fm/s/68f9f78f</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the clickbait news cycle, and how it impacts cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the clickbait news cycle, and how it impacts cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Mon, 07 Jul 2025 12:20:24 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/68f9f78f/274b2070.mp3" length="14429285" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>875</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the clickbait news cycle, and how it impacts cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 114</title>
      <itunes:episode>114</itunes:episode>
      <podcast:episode>114</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 114</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">92006a45-e278-4e69-980d-599bfbafb66f</guid>
      <link>https://share.transistor.fm/s/5d8d6b42</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss nation state cyber attacks, specifically in light of current events in the Middle East.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss nation state cyber attacks, specifically in light of current events in the Middle East.</p>]]>
      </content:encoded>
      <pubDate>Thu, 26 Jun 2025 14:10:57 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5d8d6b42/ff1167a7.mp3" length="10891157" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>684</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss nation state cyber attacks, specifically in light of current events in the Middle East.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 113</title>
      <itunes:episode>113</itunes:episode>
      <podcast:episode>113</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 113</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">7de69b04-aaa2-491b-879e-f1b495d83180</guid>
      <link>https://share.transistor.fm/s/3f33ccd4</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the variables between running a workload on premise vs. in the cloud or as a SaaS service.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the variables between running a workload on premise vs. in the cloud or as a SaaS service.</p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Jun 2025 10:35:26 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3f33ccd4/aab854f9.mp3" length="15550997" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>948</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the variables between running a workload on premise vs. in the cloud or as a SaaS service.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 112</title>
      <itunes:episode>112</itunes:episode>
      <podcast:episode>112</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 112</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e730f796-8dd8-4817-ba3a-a8a14f7f5057</guid>
      <link>https://share.transistor.fm/s/7ddcd68e</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss Penetration Testing as a Service.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss Penetration Testing as a Service.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Jun 2025 02:38:04 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/7ddcd68e/e40bcb88.mp3" length="12337613" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>793</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss Penetration Testing as a Service.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 111</title>
      <itunes:episode>111</itunes:episode>
      <podcast:episode>111</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 111</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af1ccf5a-4cc4-4a2d-9db0-a04cfc8b2ad9</guid>
      <link>https://share.transistor.fm/s/4960e084</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Cybersecurity Maturity.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Cybersecurity Maturity.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Jun 2025 02:01:38 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4960e084/693e89f6.mp3" length="13119965" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>812</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: Cybersecurity Maturity.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 110</title>
      <itunes:episode>110</itunes:episode>
      <podcast:episode>110</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 110</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">812d13ca-b30c-4ca8-9e80-7ddfc2f21815</guid>
      <link>https://share.transistor.fm/s/58612be2</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the recent news about extra devices installed on foreign made products that have no purpose other than to be exploited by a bad actor. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the recent news about extra devices installed on foreign made products that have no purpose other than to be exploited by a bad actor. </p>]]>
      </content:encoded>
      <pubDate>Fri, 23 May 2025 02:13:09 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/58612be2/1efd1d41.mp3" length="20199365" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the recent news about extra devices installed on foreign made products that have no purpose other than to be exploited by a bad actor. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 109</title>
      <itunes:episode>109</itunes:episode>
      <podcast:episode>109</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 109</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">16356179-b338-4b7f-ac24-8a771c1e6bfd</guid>
      <link>https://share.transistor.fm/s/9d84d87c</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 May 2025 01:58:20 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/9d84d87c/b318a1ce.mp3" length="15923477" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>714</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how the bad guys are using AI to perform cyberattacks.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 108</title>
      <itunes:episode>108</itunes:episode>
      <podcast:episode>108</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 108</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">17bdc280-8928-488d-9d21-7b7d8a996518</guid>
      <link>https://share.transistor.fm/s/f80675b9</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA recap the RSA Conference.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA recap the RSA Conference.</p>]]>
      </content:encoded>
      <pubDate>Fri, 09 May 2025 02:34:16 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f80675b9/d99ea856.mp3" length="21269621" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>892</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA recap the RSA Conference.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 107</title>
      <itunes:episode>107</itunes:episode>
      <podcast:episode>107</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 107</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2462107d-3114-4e3b-832b-dcf0f01e5edd</guid>
      <link>https://share.transistor.fm/s/c9f64e30</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of the RSA Conference and discuss the EMA Vendor Vision report.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of the RSA Conference and discuss the EMA Vendor Vision report.</p>]]>
      </content:encoded>
      <pubDate>Fri, 25 Apr 2025 02:50:39 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/c9f64e30/b96eb3cb.mp3" length="16926581" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present a preview of the RSA Conference and discuss the EMA Vendor Vision report.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 106</title>
      <itunes:episode>106</itunes:episode>
      <podcast:episode>106</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 106</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">168dea21-2de2-4f4d-9f54-26f62991ec02</guid>
      <link>https://share.transistor.fm/s/bbfa6b4d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the buzzwords generated by marketing to sell cybersecurity products.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the buzzwords generated by marketing to sell cybersecurity products.</p>]]>
      </content:encoded>
      <pubDate>Fri, 18 Apr 2025 02:17:47 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/bbfa6b4d/968d0832.mp3" length="11261237" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>684</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the buzzwords generated by marketing to sell cybersecurity products.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 105</title>
      <itunes:episode>105</itunes:episode>
      <podcast:episode>105</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 105</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">02417fd4-6727-459e-a4df-fb98fa8cff99</guid>
      <link>https://share.transistor.fm/s/6789cd63</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss hacking a modern, computer controlled vehicle.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss hacking a modern, computer controlled vehicle.</p>]]>
      </content:encoded>
      <pubDate>Fri, 11 Apr 2025 02:30:11 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/6789cd63/6c232302.mp3" length="13584101" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>822</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss hacking a modern, computer controlled vehicle.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 104</title>
      <itunes:episode>104</itunes:episode>
      <podcast:episode>104</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 104</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c3858eee-aa44-4825-ad79-7b182b5754f0</guid>
      <link>https://share.transistor.fm/s/febc7646</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impacts that taxes and tariffs have on technology and cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impacts that taxes and tariffs have on technology and cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Fri, 04 Apr 2025 01:02:08 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/febc7646/278f7f76.mp3" length="12352373" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>804</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impacts that taxes and tariffs have on technology and cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 103</title>
      <itunes:episode>103</itunes:episode>
      <podcast:episode>103</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 103</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb2f356e-57a5-433e-8292-9d7162cd728c</guid>
      <link>https://share.transistor.fm/s/8e9d40a0</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the plans to move many cybersecurity controls from the federal level to the state level.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the plans to move many cybersecurity controls from the federal level to the state level.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Mar 2025 00:22:18 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/8e9d40a0/ea4e9ff1.mp3" length="10835021" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>691</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the plans to move many cybersecurity controls from the federal level to the state level.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 102</title>
      <itunes:episode>102</itunes:episode>
      <podcast:episode>102</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 102</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5744e90a-2385-44f1-86a2-bc02caeca6d2</guid>
      <link>https://share.transistor.fm/s/d1e753d2</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats. </p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Mar 2025 02:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d1e753d2/20a1f05d.mp3" length="13803965" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>838</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss insider threats. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 101</title>
      <itunes:episode>101</itunes:episode>
      <podcast:episode>101</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 101</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6dc57d83-5fcf-40c5-b489-afc10e81b6b7</guid>
      <link>https://share.transistor.fm/s/3c614c0b</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss tax season, and the fraud that goes along with it. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss tax season, and the fraud that goes along with it. </p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Mar 2025 01:58:32 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3c614c0b/c4148ab4.mp3" length="12996317" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>820</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss tax season, and the fraud that goes along with it. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 100</title>
      <itunes:episode>100</itunes:episode>
      <podcast:episode>100</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 100</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">38820140-1db0-4501-bc54-32bf487f0748</guid>
      <link>https://share.transistor.fm/s/83190aa6</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest news surround privacy issues in the UK regarding Apple phones.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest news surround privacy issues in the UK regarding Apple phones.</p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Mar 2025 02:12:46 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/83190aa6/ee7447e0.mp3" length="18456797" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>814</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the latest news surround privacy issues in the UK regarding Apple phones.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 99</title>
      <itunes:episode>99</itunes:episode>
      <podcast:episode>99</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 99</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">32e72964-9b15-43d1-9177-6b519bc493b6</guid>
      <link>https://share.transistor.fm/s/97b0aa9d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss marketing and evangelism in technology. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss marketing and evangelism in technology. </p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Feb 2025 02:10:43 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/97b0aa9d/3819e52b.mp3" length="19549731" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>898</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss marketing and evangelism in technology. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 98</title>
      <itunes:episode>98</itunes:episode>
      <podcast:episode>98</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 98</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b239d0ea-51fb-4076-aeca-55a0b87dd50e</guid>
      <link>https://share.transistor.fm/s/22307254</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss DDoS Mitigation solutions. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss DDoS Mitigation solutions. </p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Feb 2025 01:40:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/22307254/0425ebb0.mp3" length="18906603" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>851</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss DDoS Mitigation solutions. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 97</title>
      <itunes:episode>97</itunes:episode>
      <podcast:episode>97</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 97</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">10409454-f7f7-41bf-b374-0d3b367051ce</guid>
      <link>https://share.transistor.fm/s/e2103cf7</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss a recent announcement about organized ransomware attacks. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss a recent announcement about organized ransomware attacks. </p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Feb 2025 01:47:05 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e2103cf7/6f32f866.mp3" length="19399395" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>871</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss a recent announcement about organized ransomware attacks. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 96</title>
      <itunes:episode>96</itunes:episode>
      <podcast:episode>96</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 96</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e24d33b0-ab4f-4296-9a44-e7955ea8413e</guid>
      <link>https://share.transistor.fm/s/4a523b32</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how tribal knowledge is lost during changes in leadership, as well as an update on DeepSeek AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how tribal knowledge is lost during changes in leadership, as well as an update on DeepSeek AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Feb 2025 01:23:18 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4a523b32/e1056e04.mp3" length="22078419" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1013</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss how tribal knowledge is lost during changes in leadership, as well as an update on DeepSeek AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 95</title>
      <itunes:episode>95</itunes:episode>
      <podcast:episode>95</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 95</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">87707621-601e-40d1-9c06-a7955c6d7bdd</guid>
      <link>https://share.transistor.fm/s/e25e66d2</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the changes the new Presidential administration will bring, as well as the latest news about DeepSeek AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the changes the new Presidential administration will bring, as well as the latest news about DeepSeek AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 Jan 2025 00:32:26 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e25e66d2/56e90071.mp3" length="20354259" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>926</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the changes the new Presidential administration will bring, as well as the latest news about DeepSeek AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 94</title>
      <itunes:episode>94</itunes:episode>
      <podcast:episode>94</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 94</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84b69076-4e73-4e58-adea-aa09213f78f8</guid>
      <link>https://share.transistor.fm/s/383b3409</link>
      <description>
        <![CDATA[<p>Jason Garbis from Numberline Security joins Chris Steffen and Ken Buckler from EMA to discuss the Zero Trust Maturity Model. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Jason Garbis from Numberline Security joins Chris Steffen and Ken Buckler from EMA to discuss the Zero Trust Maturity Model. </p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Jan 2025 01:40:46 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/383b3409/28a93e13.mp3" length="26892171" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1347</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Jason Garbis from Numberline Security joins Chris Steffen and Ken Buckler from EMA to discuss the Zero Trust Maturity Model. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 93</title>
      <itunes:episode>93</itunes:episode>
      <podcast:episode>93</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 93</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">28984d51-b280-48ea-8bbd-31b0f9961c52</guid>
      <link>https://share.transistor.fm/s/adedc0c9</link>
      <description>
        <![CDATA[<p>Steve Guilford from AsterionDB joins Chris Steffen and Ken Buckler from EMA to reimagine the way we store files to be more secure (and useable). </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Steve Guilford from AsterionDB joins Chris Steffen and Ken Buckler from EMA to reimagine the way we store files to be more secure (and useable). </p>]]>
      </content:encoded>
      <pubDate>Fri, 17 Jan 2025 01:53:12 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/adedc0c9/9b901b49.mp3" length="20227275" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>866</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Steve Guilford from AsterionDB joins Chris Steffen and Ken Buckler from EMA to reimagine the way we store files to be more secure (and useable). </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 92</title>
      <itunes:episode>92</itunes:episode>
      <podcast:episode>92</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 92</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c412b732-ac2c-447a-a270-89a23c725426</guid>
      <link>https://share.transistor.fm/s/1c1e859d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the 2025 priorities laid out by the CISA and DHS.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the 2025 priorities laid out by the CISA and DHS.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Jan 2025 10:12:31 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/1c1e859d/c71816cb.mp3" length="13465299" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>813</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the 2025 priorities laid out by the CISA and DHS.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 91</title>
      <itunes:episode>91</itunes:episode>
      <podcast:episode>91</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 91</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ddc94e19-2162-48f4-8b54-b08f4672b9a0</guid>
      <link>https://share.transistor.fm/s/4e5bc884</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present 2025 cybersecurity predictions and trends.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present 2025 cybersecurity predictions and trends.</p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Dec 2024 00:59:50 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4e5bc884/d92e1954.mp3" length="14510355" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>917</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present 2025 cybersecurity predictions and trends.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 90</title>
      <itunes:episode>90</itunes:episode>
      <podcast:episode>90</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 90</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6af86c93-823b-44a5-aeb9-1641b42793e2</guid>
      <link>https://share.transistor.fm/s/90bbbdf5</link>
      <description>
        <![CDATA[<p> Chris Steffen and Ken Buckler from EMA present the 2024 cybersecurity and technology events recap.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p> Chris Steffen and Ken Buckler from EMA present the 2024 cybersecurity and technology events recap.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Dec 2024 10:44:53 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/90bbbdf5/3ffc2433.mp3" length="12954915" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>914</itunes:duration>
      <itunes:summary>
        <![CDATA[<p> Chris Steffen and Ken Buckler from EMA present the 2024 cybersecurity and technology events recap.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 89</title>
      <itunes:episode>89</itunes:episode>
      <podcast:episode>89</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 89</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d447c76b-1dab-489d-b962-12fad75324d1</guid>
      <link>https://share.transistor.fm/s/96f59d14</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the data generated by free applications and how technological advances are impacting individual privacy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the data generated by free applications and how technological advances are impacting individual privacy.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Dec 2024 12:00:26 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/96f59d14/f1b71901.mp3" length="15446283" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1009</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the data generated by free applications and how technological advances are impacting individual privacy.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 88</title>
      <itunes:episode>88</itunes:episode>
      <podcast:episode>88</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 88</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb73c1f1-7a9c-49d1-bb8e-45a9905e3e03</guid>
      <link>https://share.transistor.fm/s/bc6fb69c</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the ransomware attacks going on at Starbucks through Blue Yonder.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the ransomware attacks going on at Starbucks through Blue Yonder.</p>]]>
      </content:encoded>
      <pubDate>Fri, 29 Nov 2024 12:05:52 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/bc6fb69c/a346d901.mp3" length="10940499" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>738</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the ransomware attacks going on at Starbucks through Blue Yonder.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 87</title>
      <itunes:episode>87</itunes:episode>
      <podcast:episode>87</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 87</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4878e79c-5c09-4554-88f0-7a0af2314043</guid>
      <link>https://share.transistor.fm/s/ecd23f68</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impact of the 2024 election on cybersecurity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impact of the 2024 election on cybersecurity.</p>]]>
      </content:encoded>
      <pubDate>Fri, 22 Nov 2024 01:01:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/ecd23f68/912e2f1f.mp3" length="17768307" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1108</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the impact of the 2024 election on cybersecurity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 86</title>
      <itunes:episode>86</itunes:episode>
      <podcast:episode>86</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 86</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">573a4cb4-54cd-4498-9862-4b2801ed4602</guid>
      <link>https://share.transistor.fm/s/eb4849b8</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss real-world cybersecurity AI use cases.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss real-world cybersecurity AI use cases.</p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Nov 2024 10:30:26 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/eb4849b8/d0d61427.mp3" length="17148699" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1074</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss real-world cybersecurity AI use cases.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 85</title>
      <itunes:episode>85</itunes:episode>
      <podcast:episode>85</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 85</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">978ec9c7-18df-48dc-900b-278aab666b3a</guid>
      <link>https://share.transistor.fm/s/4925aa14</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss end of year planning and budgeting for cybersecurity next year.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss end of year planning and budgeting for cybersecurity next year.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Nov 2024 03:12:39 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4925aa14/d3e73830.mp3" length="14271915" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>822</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss end of year planning and budgeting for cybersecurity next year.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 84</title>
      <itunes:episode>84</itunes:episode>
      <podcast:episode>84</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 84</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ecc447f9-0729-4be7-bbb6-7138e58034b0</guid>
      <link>https://share.transistor.fm/s/dd72339d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss using AI to influence elections and election security in general.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss using AI to influence elections and election security in general.</p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Nov 2024 10:58:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/dd72339d/cb12f8af.mp3" length="10984947" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>684</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss using AI to influence elections and election security in general.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 83</title>
      <itunes:episode>83</itunes:episode>
      <podcast:episode>83</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 83</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ae2524a6-21c0-466a-9a6f-bd495ecf20c2</guid>
      <link>https://share.transistor.fm/s/3d7395f5</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss communications security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss communications security. </p>]]>
      </content:encoded>
      <pubDate>Fri, 25 Oct 2024 02:35:18 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3d7395f5/a3452ee1.mp3" length="18686691" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>865</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss communications security. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 82</title>
      <itunes:episode>82</itunes:episode>
      <podcast:episode>82</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 82</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4af956d8-a933-48a5-b1b3-6f3d3327d9cb</guid>
      <link>https://share.transistor.fm/s/14df1513</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity maturity. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity maturity. </p>]]>
      </content:encoded>
      <pubDate>Fri, 18 Oct 2024 03:08:53 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/14df1513/df36b1e2.mp3" length="19228563" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>884</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss cybersecurity maturity. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 81</title>
      <itunes:episode>81</itunes:episode>
      <podcast:episode>81</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 81</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">26b4f99d-0d50-4070-867c-78b524755e78</guid>
      <link>https://share.transistor.fm/s/0a8550f7</link>
      <description>
        <![CDATA[<p>In Part 2 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Part 2 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month. </p>]]>
      </content:encoded>
      <pubDate>Fri, 11 Oct 2024 00:09:53 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0a8550f7/eb562e33.mp3" length="19312155" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>912</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In Part 2 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 80</title>
      <itunes:episode>80</itunes:episode>
      <podcast:episode>80</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 80</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4cb7049-f0e6-4ac7-a5cc-420d7b8abea1</guid>
      <link>https://share.transistor.fm/s/6f22f560</link>
      <description>
        <![CDATA[<p>In Part 1 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In Part 1 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.</p>]]>
      </content:encoded>
      <pubDate>Fri, 04 Oct 2024 02:44:52 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/6f22f560/192e2a2d.mp3" length="18838419" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>915</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>In Part 1 of a 2-part series, Chris Steffen and Ken Buckler from EMA compile a list of points that people should be thinking about during Cybersecurity Awareness Month.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 79</title>
      <itunes:episode>79</itunes:episode>
      <podcast:episode>79</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 79</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">457060c7-492f-49f0-8f0f-ba0dffedd7c7</guid>
      <link>https://share.transistor.fm/s/87226879</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: physical access control and biometrics.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: physical access control and biometrics.</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Sep 2024 03:55:38 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/87226879/d9a2e776.mp3" length="19251843" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>849</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA present Cybersecurity 101: physical access control and biometrics.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 78</title>
      <itunes:episode>78</itunes:episode>
      <podcast:episode>78</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 78</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">384c8ce0-0447-4172-9cba-c0016b28186b</guid>
      <link>https://share.transistor.fm/s/e4c1d5a2</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the exploding pager attacks in the Middle East, and why they are cybersecurity attacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the exploding pager attacks in the Middle East, and why they are cybersecurity attacks.</p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Sep 2024 03:34:53 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e4c1d5a2/529b3501.mp3" length="12280923" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>779</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the exploding pager attacks in the Middle East, and why they are cybersecurity attacks.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 77</title>
      <itunes:episode>77</itunes:episode>
      <podcast:episode>77</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 77</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5b3b0426-e561-4f3c-925b-496849741a1c</guid>
      <link>https://share.transistor.fm/s/57fa55f1</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss election security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss election security. </p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Sep 2024 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/57fa55f1/6cd3820e.mp3" length="11375883" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>830</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss election security. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 76</title>
      <itunes:episode>76</itunes:episode>
      <podcast:episode>76</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 76</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">646e7abc-2942-410a-90d4-1973d742df98</guid>
      <link>https://share.transistor.fm/s/0dda3e00</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the VERY minor vulnerability found in Yubico YubiKeys, and why it is important to properly evaluate the impacts of these types of vulnerabilities.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the VERY minor vulnerability found in Yubico YubiKeys, and why it is important to properly evaluate the impacts of these types of vulnerabilities.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Sep 2024 03:29:30 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0dda3e00/ab9a117e.mp3" length="13800243" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>885</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the VERY minor vulnerability found in Yubico YubiKeys, and why it is important to properly evaluate the impacts of these types of vulnerabilities.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 75</title>
      <itunes:episode>75</itunes:episode>
      <podcast:episode>75</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 75</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">bd00b7b1-e67b-4c08-b476-b4fbb3a475da</guid>
      <link>https://share.transistor.fm/s/a8fd0dc2</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the importance of identity solutions as part of a cyber security strategy.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the importance of identity solutions as part of a cyber security strategy.</p>]]>
      </content:encoded>
      <pubDate>Fri, 30 Aug 2024 02:21:08 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a8fd0dc2/d6e053e7.mp3" length="14030331" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>821</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA discuss the importance of identity solutions as part of a cyber security strategy.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 74</title>
      <itunes:episode>74</itunes:episode>
      <podcast:episode>74</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 74</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6253edb4-9fce-4074-9a29-8ba3a0ecd833</guid>
      <link>https://share.transistor.fm/s/d62a9706</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA compare one-off best-in-class tools vs. all-in-one security solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA compare one-off best-in-class tools vs. all-in-one security solutions.</p>]]>
      </content:encoded>
      <pubDate>Fri, 23 Aug 2024 02:14:21 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d62a9706/1e9023d6.mp3" length="13744371" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>857</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA compare one-off best-in-class tools vs. all-in-one security solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 73</title>
      <itunes:episode>73</itunes:episode>
      <podcast:episode>73</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 73</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5db20b4e-e828-4473-84f8-0c90c0301304</guid>
      <link>https://share.transistor.fm/s/c9b2f2f0</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA provide a recap of the Black Hat and DEF CON conferences.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA provide a recap of the Black Hat and DEF CON conferences.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Aug 2024 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/c9b2f2f0/ecea7413.mp3" length="12275187" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>765</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA provide a recap of the Black Hat and DEF CON conferences.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 72</title>
      <itunes:episode>72</itunes:episode>
      <podcast:episode>72</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 72</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f00e8c4c-795d-461b-a67a-c4c5bd9cc09c</guid>
      <link>https://share.transistor.fm/s/cb00ae8d</link>
      <description>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA to discuss the Microsoft DDoS attack and the CrowdStrike outage.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA to discuss the Microsoft DDoS attack and the CrowdStrike outage.</p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Aug 2024 11:20:44 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/cb00ae8d/0932d549.mp3" length="16679667" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1040</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen and Ken Buckler from EMA to discuss the Microsoft DDoS attack and the CrowdStrike outage.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 71</title>
      <itunes:episode>71</itunes:episode>
      <podcast:episode>71</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 71</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d9f78658-a747-41f0-ab4b-d1b5d0b4bce9</guid>
      <link>https://share.transistor.fm/s/bc971742</link>
      <description>
        <![CDATA[<p>Maggie MacAlpine, Director of Cybersecurity Partnerships and Cybersecurity Evangelism at Seceon, joins Chris Steffen and Ken Buckler from EMA to discuss how managed security service providers (MSSPs) can improve their security offerings with the right security solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Maggie MacAlpine, Director of Cybersecurity Partnerships and Cybersecurity Evangelism at Seceon, joins Chris Steffen and Ken Buckler from EMA to discuss how managed security service providers (MSSPs) can improve their security offerings with the right security solutions.</p>]]>
      </content:encoded>
      <pubDate>Fri, 02 Aug 2024 02:19:48 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/bc971742/d4a19fd4.mp3" length="18042867" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1125</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Maggie MacAlpine, Director of Cybersecurity Partnerships and Cybersecurity Evangelism at Seceon, joins Chris Steffen and Ken Buckler from EMA to discuss how managed security service providers (MSSPs) can improve their security offerings with the right security solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 70</title>
      <itunes:episode>70</itunes:episode>
      <podcast:episode>70</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 70</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3a96200c-24ff-4479-91ff-71f694f23dcd</guid>
      <link>https://share.transistor.fm/s/039ca5c8</link>
      <description>
        <![CDATA[<p>Stephan Jou, Sr. Director, Security Analytics at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss using AI in your XDR solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Stephan Jou, Sr. Director, Security Analytics at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss using AI in your XDR solutions.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Jul 2024 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/039ca5c8/433262f8.mp3" length="14028147" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>874</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Stephan Jou, Sr. Director, Security Analytics at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss using AI in your XDR solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 69</title>
      <itunes:episode>69</itunes:episode>
      <podcast:episode>69</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 69</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">52117ad7-c6e4-4e79-a07f-3a159d8c1b2e</guid>
      <link>https://share.transistor.fm/s/6dd6751c</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses how to best correlate and utilize your vast enterprise data stores using a data fabric with Nicole Bucala, Databee CEO, and Paul Kivikink, Databee SVP of Products and Alliances.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses how to best correlate and utilize your vast enterprise data stores using a data fabric with Nicole Bucala, Databee CEO, and Paul Kivikink, Databee SVP of Products and Alliances.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Jul 2024 12:02:04 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/6dd6751c/c544402b.mp3" length="17160051" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1070</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses how to best correlate and utilize your vast enterprise data stores using a data fabric with Nicole Bucala, Databee CEO, and Paul Kivikink, Databee SVP of Products and Alliances.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 68</title>
      <itunes:episode>68</itunes:episode>
      <podcast:episode>68</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 68</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8eff9fff-0e83-4436-a453-8f555d9a300a</guid>
      <link>https://share.transistor.fm/s/abc82d04</link>
      <description>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss leveraging AI for audits of Static Application Security Testing (SAST).</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss leveraging AI for audits of Static Application Security Testing (SAST).</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Jul 2024 02:30:12 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/abc82d04/2b98f6ec.mp3" length="14034291" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>875</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss leveraging AI for audits of Static Application Security Testing (SAST).</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 67</title>
      <itunes:episode>67</itunes:episode>
      <podcast:episode>67</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 67</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1f6b1e4a-44f1-40b9-b819-c10d2320fabd</guid>
      <link>https://share.transistor.fm/s/00bfb76d</link>
      <description>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss getting your data ready for AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss getting your data ready for AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Jul 2024 11:05:58 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/00bfb76d/deec91fc.mp3" length="14041971" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>875</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Sam Kumarsamy, Director of Product Marketing at OpenText, joins Chris Steffen and Ken Buckler from EMA to discuss getting your data ready for AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 66</title>
      <itunes:episode>66</itunes:episode>
      <podcast:episode>66</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 66</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">923c70b9-e004-490e-822b-490c4ab413e8</guid>
      <link>https://share.transistor.fm/s/22e15488</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the role of the tech evangelist.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the role of the tech evangelist.</p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Jul 2024 11:56:56 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/22e15488/3ac710cd.mp3" length="15306113" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>954</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the role of the tech evangelist.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 65</title>
      <itunes:episode>65</itunes:episode>
      <podcast:episode>65</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 65</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b1f66e01-dc6b-4283-87c5-e3a6775fdaea</guid>
      <link>https://share.transistor.fm/s/d39cd204</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Jun 2024 01:20:22 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d39cd204/54590db5.mp3" length="19512595" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1357</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Cisco and Splunk conferences with special guest Shamus McGillicuddy, EMA VP of Research, Network Infrastructure and Operations.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 64</title>
      <itunes:episode>64</itunes:episode>
      <podcast:episode>64</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 64</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b2612a6f-5743-41e3-b792-6b7ea1f3e005</guid>
      <link>https://share.transistor.fm/s/fcf5b085</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss AI use cases.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss AI use cases.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Jun 2024 01:00:17 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/fcf5b085/ed02fa4d.mp3" length="15365045" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>958</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss AI use cases.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 63</title>
      <itunes:episode>63</itunes:episode>
      <podcast:episode>63</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 63</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">922145b6-6fd3-4a05-aa82-47d2dd920fd3</guid>
      <link>https://share.transistor.fm/s/29ed3b62</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss fundamentals of data security. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss fundamentals of data security. </p>]]>
      </content:encoded>
      <pubDate>Sat, 08 Jun 2024 12:47:22 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/29ed3b62/154b632a.mp3" length="15698692" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1090</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss fundamentals of data security. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 62</title>
      <itunes:episode>62</itunes:episode>
      <podcast:episode>62</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 62</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3f9f4e65-dd95-4188-a2c5-5433962a4430</guid>
      <link>https://share.transistor.fm/s/317866ac</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the cybersecurity careers in the market right now.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the cybersecurity careers in the market right now.</p>]]>
      </content:encoded>
      <pubDate>Fri, 31 May 2024 02:03:26 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/317866ac/46b78988.mp3" length="12536749" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>831</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the cybersecurity careers in the market right now.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 61</title>
      <itunes:episode>61</itunes:episode>
      <podcast:episode>61</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 61</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41ebaf28-71c8-46be-b050-c5c9af1678a0</guid>
      <link>https://share.transistor.fm/s/83fd790f</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the importance of understanding the human side of cybersecurity.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the importance of understanding the human side of cybersecurity.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 24 May 2024 11:37:38 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/83fd790f/bea5394b.mp3" length="13179061" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>887</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the importance of understanding the human side of cybersecurity.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 60</title>
      <itunes:episode>60</itunes:episode>
      <podcast:episode>60</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 60</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">248a95bc-f177-4748-bd20-9dd6b282e818</guid>
      <link>https://share.transistor.fm/s/d3c88097</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap the 2024 RSA Conference. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap the 2024 RSA Conference. </p>]]>
      </content:encoded>
      <pubDate>Fri, 17 May 2024 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d3c88097/39600b7b.mp3" length="12397569" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>810</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap the 2024 RSA Conference. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 59</title>
      <itunes:episode>59</itunes:episode>
      <podcast:episode>59</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 59</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5cdca45-fe92-4304-b18f-c054601ffa6b</guid>
      <link>https://share.transistor.fm/s/0032042d</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, celebrate Star Wars Day and discuss how the evil Empire failed due to security immaturity.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, celebrate Star Wars Day and discuss how the evil Empire failed due to security immaturity.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 May 2024 03:45:41 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0032042d/0c2050b6.mp3" length="12446018" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>825</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, celebrate Star Wars Day and discuss how the evil Empire failed due to security immaturity.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 58</title>
      <itunes:episode>58</itunes:episode>
      <podcast:episode>58</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 58</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">0123e313-5c3f-49f5-a8db-5744f3f196c2</guid>
      <link>https://share.transistor.fm/s/712f9f32</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, preview the 2024 RSA conference.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, preview the 2024 RSA conference.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Apr 2024 03:25:14 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/712f9f32/c9259b48.mp3" length="14273598" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>994</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, preview the 2024 RSA conference.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 57</title>
      <itunes:episode>57</itunes:episode>
      <podcast:episode>57</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 57</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e4516f82-7e5c-49b2-ac8a-fd6e6aebb879</guid>
      <link>https://share.transistor.fm/s/95a17777</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss IoT vulnerabilities for consumers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss IoT vulnerabilities for consumers.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Apr 2024 10:49:22 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/95a17777/a0e40edc.mp3" length="11346057" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>780</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss IoT vulnerabilities for consumers.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 56</title>
      <itunes:episode>56</itunes:episode>
      <podcast:episode>56</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 56</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b8f5ed88-3fdf-457a-81a8-c64121135be4</guid>
      <link>https://share.transistor.fm/s/6153ed25</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss tax fraud and how to be aware of it.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss tax fraud and how to be aware of it.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Apr 2024 12:54:08 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/6153ed25/dd7c7624.mp3" length="11864864" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>808</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss tax fraud and how to be aware of it.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 55</title>
      <itunes:episode>55</itunes:episode>
      <podcast:episode>55</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 55</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2ddea5ce-5871-465d-bfb4-e890fc617d4b</guid>
      <link>https://share.transistor.fm/s/1611bc32</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest Linux SSH attacks and their impact on supply chain.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest Linux SSH attacks and their impact on supply chain.</p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Apr 2024 02:19:57 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/1611bc32/ae96376f.mp3" length="10199599" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>691</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest Linux SSH attacks and their impact on supply chain.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 54</title>
      <itunes:episode>54</itunes:episode>
      <podcast:episode>54</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 54</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5192a82a-abe9-4d2c-b8c0-48483ef14b00</guid>
      <link>https://share.transistor.fm/s/64af8a6c</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss a recent phishing attack at EMA, and what organizations can do about phishing.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss a recent phishing attack at EMA, and what organizations can do about phishing.</p>]]>
      </content:encoded>
      <pubDate>Fri, 29 Mar 2024 14:24:23 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/64af8a6c/44e6e699.mp3" length="12100538" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>784</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss a recent phishing attack at EMA, and what organizations can do about phishing.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 53</title>
      <itunes:episode>53</itunes:episode>
      <podcast:episode>53</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 53</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">948908c8-e76d-4a6f-9dda-4180aa7c7297</guid>
      <link>https://share.transistor.fm/s/a5c7536c</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the updated PCI DSS standards.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the updated PCI DSS standards.</p>]]>
      </content:encoded>
      <pubDate>Fri, 22 Mar 2024 01:01:00 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a5c7536c/6392a62b.mp3" length="12517366" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>780</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the updated PCI DSS standards.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 52</title>
      <itunes:episode>52</itunes:episode>
      <podcast:episode>52</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 52</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">63f7cfdf-b809-4bb0-b2f3-1e6c16443f51</guid>
      <link>https://share.transistor.fm/s/3154b479</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Microsegmentation.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Microsegmentation.</p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Mar 2024 10:43:39 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3154b479/8a598a0d.mp3" length="9317889" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>580</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Microsegmentation.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 51</title>
      <itunes:episode>51</itunes:episode>
      <podcast:episode>51</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 51</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">575b6633-7c15-43d6-b198-19a8533f5242</guid>
      <link>https://share.transistor.fm/s/d7042115</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss third party identity providers.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss third party identity providers.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Mar 2024 00:33:28 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d7042115/36fb7375.mp3" length="12970016" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>808</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss third party identity providers.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 50</title>
      <itunes:episode>50</itunes:episode>
      <podcast:episode>50</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 50</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">27a4f053-5dee-4c41-8e05-9fb603102c8e</guid>
      <link>https://share.transistor.fm/s/8c4b45cd</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss supply chain security concerns and revisit the latest CMMC guidance. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss supply chain security concerns and revisit the latest CMMC guidance. </p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Mar 2024 01:44:14 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/8c4b45cd/40aaf25a.mp3" length="11169030" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>696</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss supply chain security concerns and revisit the latest CMMC guidance. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 49</title>
      <itunes:episode>49</itunes:episode>
      <podcast:episode>49</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 49</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e2a4da38-ed49-49f0-ba60-ce59f1576430</guid>
      <link>https://share.transistor.fm/s/1a4e8718</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the most recent data showing that ransomware attacks are decreasing, while other more focused attacks are increasing.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the most recent data showing that ransomware attacks are decreasing, while other more focused attacks are increasing.</p>]]>
      </content:encoded>
      <pubDate>Fri, 23 Feb 2024 10:12:34 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/1a4e8718/dd2fae0f.mp3" length="14579995" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>909</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the most recent data showing that ransomware attacks are decreasing, while other more focused attacks are increasing.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 48</title>
      <itunes:episode>48</itunes:episode>
      <podcast:episode>48</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 48</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b6d3700f-2559-439e-a90b-02c5d2db0195</guid>
      <link>https://share.transistor.fm/s/1feb2a12</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Zero Day Attacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Zero Day Attacks.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Feb 2024 01:01:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/1feb2a12/7f1e3dbb.mp3" length="13156426" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>820</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: Zero Day Attacks.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 47</title>
      <itunes:episode>47</itunes:episode>
      <podcast:episode>47</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 47</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5d02a760-af18-46e2-9e73-42868502e942</guid>
      <link>https://share.transistor.fm/s/5c762cc6</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the the latest Ransomware attacks in the news.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the the latest Ransomware attacks in the news.</p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Feb 2024 01:11:18 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5c762cc6/96fefd5f.mp3" length="13554628" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>843</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the the latest Ransomware attacks in the news.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 46</title>
      <itunes:episode>46</itunes:episode>
      <podcast:episode>46</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 46</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">61772cb4-4c98-40a3-a90e-a111a86c0367</guid>
      <link>https://share.transistor.fm/s/0e243284</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the media hype surrounding the "Mother of All Breaches."</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the media hype surrounding the "Mother of All Breaches."</p>]]>
      </content:encoded>
      <pubDate>Fri, 02 Feb 2024 00:58:21 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0e243284/082f6755.mp3" length="11465240" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>732</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the media hype surrounding the "Mother of All Breaches."</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 45</title>
      <itunes:episode>45</itunes:episode>
      <podcast:episode>45</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 45</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2498d088-0258-4235-b08c-4f31a3d8171d</guid>
      <link>https://share.transistor.fm/s/5b6dc2e5</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest changes impacting Cybersecurity Maturity Model Certification (CMMC) assessments.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest changes impacting Cybersecurity Maturity Model Certification (CMMC) assessments.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 Jan 2024 01:07:29 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5b6dc2e5/9480b485.mp3" length="17248202" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1176</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest changes impacting Cybersecurity Maturity Model Certification (CMMC) assessments.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 44</title>
      <itunes:episode>44</itunes:episode>
      <podcast:episode>44</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 44</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">69225335-3399-422f-ac57-07d1899134fc</guid>
      <link>https://share.transistor.fm/s/970ffa85</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: how to get started on a cybersecurity career.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: how to get started on a cybersecurity career.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 Jan 2024 01:01:00 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/970ffa85/c00aeec0.mp3" length="12690518" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>816</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, present Security 101 Basics: how to get started on a cybersecurity career.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 43</title>
      <itunes:episode>43</itunes:episode>
      <podcast:episode>43</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 43</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f0f71c6c-1c5f-4944-b465-ba4de3945f4b</guid>
      <link>https://share.transistor.fm/s/7a369c88</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest social media hack of the SEC Twitter account.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest social media hack of the SEC Twitter account.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Jan 2024 10:24:33 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/7a369c88/ab64b3a1.mp3" length="12139826" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>765</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest social media hack of the SEC Twitter account.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 42</title>
      <itunes:episode>42</itunes:episode>
      <podcast:episode>42</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 42</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1da3b21d-a3e5-4d66-9f16-b881ed1b772e</guid>
      <link>https://share.transistor.fm/s/ba0f3f5f</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss public infrastructure security.   </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss public infrastructure security.   </p>]]>
      </content:encoded>
      <pubDate>Fri, 05 Jan 2024 01:38:25 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/ba0f3f5f/5bf353de.mp3" length="12330956" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>769</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss public infrastructure security.   </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 41</title>
      <itunes:episode>41</itunes:episode>
      <podcast:episode>41</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 41</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">114512d0-a650-451f-b488-e2cbbbc50503</guid>
      <link>https://share.transistor.fm/s/ec2b9ba4</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, make 2024 cybersecurity predictions.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, make 2024 cybersecurity predictions.  </p>]]>
      </content:encoded>
      <pubDate>Wed, 20 Dec 2023 16:26:06 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/ec2b9ba4/e6c796da.mp3" length="14698277" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>916</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, make 2024 cybersecurity predictions.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 40</title>
      <itunes:episode>40</itunes:episode>
      <podcast:episode>40</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 40</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">af00e2db-91b7-41cf-bb68-ca5d2345125b</guid>
      <link>https://share.transistor.fm/s/b1d48176</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security impacts of the latest court ruling about the Apple and Google App Stores.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security impacts of the latest court ruling about the Apple and Google App Stores.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 15 Dec 2023 10:32:47 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/b1d48176/667799ee.mp3" length="11634636" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>725</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security impacts of the latest court ruling about the Apple and Google App Stores.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 39</title>
      <itunes:episode>39</itunes:episode>
      <podcast:episode>39</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 39</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5ce0ad09-14ef-4256-8ea9-e76b1a5c781e</guid>
      <link>https://share.transistor.fm/s/f0badcaa</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the AI Alliance.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the AI Alliance.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Dec 2023 01:52:51 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f0badcaa/267bc977.mp3" length="11342065" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>707</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the AI Alliance.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 38</title>
      <itunes:episode>38</itunes:episode>
      <podcast:episode>38</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 38</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d5096f3c-d7e2-4ada-a6f4-eda85e3825c2</guid>
      <link>https://share.transistor.fm/s/e9ce6926</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of the new Apple iOS NameDrop feature.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of the new Apple iOS NameDrop feature.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Dec 2023 00:12:02 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e9ce6926/8bbd4701.mp3" length="12043401" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>751</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of the new Apple iOS NameDrop feature.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 37</title>
      <itunes:episode>37</itunes:episode>
      <podcast:episode>37</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 37</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a5ffe971-3ec7-48da-a57d-3dc7cea07ace</guid>
      <link>https://share.transistor.fm/s/423b36f2</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss data security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss data security.</p>]]>
      </content:encoded>
      <pubDate>Fri, 24 Nov 2023 10:26:58 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/423b36f2/8f845208.mp3" length="12419982" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>774</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss data security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 36</title>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 36</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">95e65ef5-8c1e-4390-816c-eddd73209451</guid>
      <link>https://share.transistor.fm/s/3d4d1ee8</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cloud security.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cloud security.</p>]]>
      </content:encoded>
      <pubDate>Sat, 18 Nov 2023 10:52:28 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/3d4d1ee8/85e50ea2.mp3" length="12026282" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cloud security.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 35</title>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 35</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">627f74d6-891c-4d67-b770-3bf0956debd8</guid>
      <link>https://share.transistor.fm/s/2bdebe2a</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cybersecurity freemium solutions.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cybersecurity freemium solutions.</p>]]>
      </content:encoded>
      <pubDate>Fri, 10 Nov 2023 10:03:50 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2bdebe2a/2000c221.mp3" length="13943450" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>876</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cybersecurity freemium solutions.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 34</title>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 34</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">35ac6b00-8eab-4da6-ad10-6aad56b3ab1e</guid>
      <link>https://share.transistor.fm/s/f76b9f7b</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cyber regulations, such as AI and Facebook changes in the EU.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cyber regulations, such as AI and Facebook changes in the EU.</p>]]>
      </content:encoded>
      <pubDate>Fri, 03 Nov 2023 02:25:59 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f76b9f7b/2d0e6ca1.mp3" length="11597762" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>699</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss cyber regulations, such as AI and Facebook changes in the EU.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 33</title>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 33</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e6b381f1-82a0-42f6-828c-56b4a858ef55</guid>
      <link>https://share.transistor.fm/s/4bfa6c00</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: What is Third Party Risk Management (TPRM)?</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: What is Third Party Risk Management (TPRM)?</p>]]>
      </content:encoded>
      <pubDate>Fri, 27 Oct 2023 01:14:56 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4bfa6c00/84b8ee50.mp3" length="12426890" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: What is Third Party Risk Management (TPRM)?</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 32</title>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 32</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">42f25bac-f0a8-40e0-a927-47a6e3189abc</guid>
      <link>https://share.transistor.fm/s/98e9b867</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the business impacts of the cyber war.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the business impacts of the cyber war.</p>]]>
      </content:encoded>
      <pubDate>Fri, 20 Oct 2023 11:46:45 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/98e9b867/245db7b4.mp3" length="12250634" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the business impacts of the cyber war.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 31</title>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 31</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3d1ba269-20ae-46c5-b030-7a11b81319c5</guid>
      <link>https://share.transistor.fm/s/116ba879</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the changing role and importance of the industry analyst.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the changing role and importance of the industry analyst.</p>]]>
      </content:encoded>
      <pubDate>Fri, 13 Oct 2023 02:16:23 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/116ba879/224ad4c8.mp3" length="21640586" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1350</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the changing role and importance of the industry analyst.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 30</title>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 30</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a7be4eef-a886-47db-a912-c6e88ac67289</guid>
      <link>https://share.transistor.fm/s/f5159f34</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Data Security Basics.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Data Security Basics.</p>]]>
      </content:encoded>
      <pubDate>Fri, 06 Oct 2023 02:04:33 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f5159f34/6d3d3913.mp3" length="13463306" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>839</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Data Security Basics.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 29</title>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 29</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">6aa72a2c-1a08-4dd1-87b0-ffbb0158b75d</guid>
      <link>https://share.transistor.fm/s/4c2ac4ae</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: Cybersecurity Certifications.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: Cybersecurity Certifications.</p>]]>
      </content:encoded>
      <pubDate>Thu, 28 Sep 2023 12:01:46 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/4c2ac4ae/20cc211d.mp3" length="13288586" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>828</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Security 101 Basics: Cybersecurity Certifications.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 28</title>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 28</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5a2c62e3-ac36-443a-a031-2c2bbd741824</guid>
      <link>https://share.transistor.fm/s/2c35af02</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the aging cybersecurity workforce.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the aging cybersecurity workforce.</p>]]>
      </content:encoded>
      <pubDate>Thu, 21 Sep 2023 12:50:20 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2c35af02/9ce8144a.mp3" length="10183538" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>795</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the aging cybersecurity workforce.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 27</title>
      <itunes:episode>27</itunes:episode>
      <podcast:episode>27</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 27</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">d777adcd-b817-4b6a-b921-b1b895d311a4</guid>
      <link>https://share.transistor.fm/s/e9347518</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the MGM Resorts cyberattack, along with special guests Shamus McGillicuddy, VP of Research at EMA; Valerie O’Connell, Research Director at EMA; and Rick Sturm, CEO and Founder of EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the MGM Resorts cyberattack, along with special guests Shamus McGillicuddy, VP of Research at EMA; Valerie O’Connell, Research Director at EMA; and Rick Sturm, CEO and Founder of EMA.</p>]]>
      </content:encoded>
      <pubDate>Tue, 12 Sep 2023 11:06:13 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e9347518/9b09d3bc.mp3" length="11145050" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>888</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the MGM Resorts cyberattack, along with special guests Shamus McGillicuddy, VP of Research at EMA; Valerie O’Connell, Research Director at EMA; and Rick Sturm, CEO and Founder of EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 26</title>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 26</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e2437419-c65d-4511-b268-cbeaa9f8da50</guid>
      <link>https://share.transistor.fm/s/61bb9089</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the ending support for TLS 1.0 and 1.1 standards.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the ending support for TLS 1.0 and 1.1 standards.</p>]]>
      </content:encoded>
      <pubDate>Fri, 08 Sep 2023 03:37:19 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/61bb9089/bd330dcc.mp3" length="10749218" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>816</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the ending support for TLS 1.0 and 1.1 standards.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 25</title>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 25</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f33f365a-2caa-4ac7-8ecf-6ad78cc9aaa0</guid>
      <link>https://share.transistor.fm/s/2220061f</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of return to office mandates. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of return to office mandates. </p>]]>
      </content:encoded>
      <pubDate>Fri, 01 Sep 2023 01:53:23 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2220061f/b650c33e.mp3" length="11706098" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>909</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security implications of return to office mandates. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 24</title>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 24</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21ff87f4-4a67-4c82-b35e-14ae838eaf03</guid>
      <link>https://share.transistor.fm/s/5a13bb3c</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get your organization quantum ready.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get your organization quantum ready.</p>]]>
      </content:encoded>
      <pubDate>Fri, 25 Aug 2023 02:20:22 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5a13bb3c/a68dfb55.mp3" length="17709194" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1105</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get your organization quantum ready.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 23</title>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 23</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5c95b177-9374-4aba-978a-a547dd9b4ee3</guid>
      <link>https://share.transistor.fm/s/0f1e690b</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap Black Hat 2023.   </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap Black Hat 2023.   </p>]]>
      </content:encoded>
      <pubDate>Fri, 18 Aug 2023 02:13:46 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0f1e690b/9902e18d.mp3" length="14008586" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>873</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, recap Black Hat 2023.   </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 22</title>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 22</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">2f25e1f3-45af-4b18-9cbb-afbd05c57543</guid>
      <link>https://share.transistor.fm/s/5d1647ec</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the upcoming 90 day expiration of SSL certificates.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the upcoming 90 day expiration of SSL certificates.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 11 Aug 2023 01:19:51 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/5d1647ec/51f79b1c.mp3" length="12904202" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>804</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the upcoming 90 day expiration of SSL certificates.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 21</title>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 21</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a2e9387a-5141-48dd-8fdc-efe6e49fb37c</guid>
      <link>https://share.transistor.fm/s/9d631913</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest SEC cybersecurity reporting and leadership requirements.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest SEC cybersecurity reporting and leadership requirements.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 04 Aug 2023 01:30:13 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/9d631913/48bf4b2c.mp3" length="13709066" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>855</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the latest SEC cybersecurity reporting and leadership requirements.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 20</title>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 20</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3c97256d-27f7-4df6-b51a-5c74c9d81476</guid>
      <link>https://share.transistor.fm/s/491e8790</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Black Hat USA 2023.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Black Hat USA 2023.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Jul 2023 01:20:40 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/491e8790/d4190460.mp3" length="10558250" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>782</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Black Hat USA 2023.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 19</title>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 19</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">e9507518-fe29-48b4-b4bb-6d10e0f812fd</guid>
      <link>https://share.transistor.fm/s/e934e53f</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss embracing AI tech.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss embracing AI tech.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Jul 2023 01:41:03 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/e934e53f/76950410.mp3" length="11346266" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>902</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss embracing AI tech.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 18</title>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 18</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">554123fe-f28d-4550-bb29-425913291ec2</guid>
      <link>https://share.transistor.fm/s/2d073d8f</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss technology mergers and acquisitions.  </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss technology mergers and acquisitions.  </p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Jul 2023 10:19:39 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2d073d8f/0167b7a4.mp3" length="10561394" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>838</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss technology mergers and acquisitions.  </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 17</title>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 17</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">44e51896-24bf-4428-aa8a-53ef11bb5c4e</guid>
      <link>https://share.transistor.fm/s/f0c99de7</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get started on your Zero Trust. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get started on your Zero Trust. </p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Jul 2023 11:55:46 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f0c99de7/37445597.mp3" length="13501802" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss how to get started on your Zero Trust. </p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 16</title>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 16</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f5af6bb1-64e9-4737-8e52-14d5b0f9ba1d</guid>
      <link>https://share.transistor.fm/s/f17b9072</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Zero Trust and the SME Market.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Zero Trust and the SME Market.</p>]]>
      </content:encoded>
      <pubDate>Fri, 30 Jun 2023 02:17:50 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/f17b9072/eabca30c.mp3" length="16854410" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1051</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Zero Trust and the SME Market.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 15</title>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 15</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">df602f3c-e32c-46d0-8916-ddabb63ec39b</guid>
      <link>https://share.transistor.fm/s/67b2068d</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss MoveIt Attacks.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss MoveIt Attacks.</p>]]>
      </content:encoded>
      <pubDate>Fri, 23 Jun 2023 09:12:03 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/67b2068d/535bca65.mp3" length="12355466" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>770</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss MoveIt Attacks.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 14</title>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 14</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eb033741-dddc-4e66-a844-48ccecd02445</guid>
      <link>https://share.transistor.fm/s/d0a007bc</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Role of the CISO.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Role of the CISO.</p>]]>
      </content:encoded>
      <pubDate>Fri, 16 Jun 2023 02:14:18 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d0a007bc/1abbc2d5.mp3" length="12435338" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>775</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the Role of the CISO.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 13</title>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 13</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">be1b4b36-5546-451a-9260-97d0e1a87ef3</guid>
      <link>https://share.transistor.fm/s/b4e4db7e</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss security uses of AI.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss security uses of AI.</p>]]>
      </content:encoded>
      <pubDate>Fri, 09 Jun 2023 03:00:26 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/b4e4db7e/51eb2276.mp3" length="12230426" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>727</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss security uses of AI.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 12</title>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 12</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fafbf279-968f-4693-8339-b02348ad779e</guid>
      <link>https://share.transistor.fm/s/0ada2ce5</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Organized Ransomware.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Organized Ransomware.</p>]]>
      </content:encoded>
      <pubDate>Fri, 02 Jun 2023 02:04:33 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/0ada2ce5/1793b390.mp3" length="11961866" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>745</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss Organized Ransomware.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 11</title>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 11</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a6ab084b-6b71-4ff5-a985-a2a83eb4de48</guid>
      <link>https://share.transistor.fm/s/81aa360b</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss GDPR Enforcement.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss GDPR Enforcement.</p>]]>
      </content:encoded>
      <pubDate>Fri, 26 May 2023 02:21:49 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/81aa360b/034436c3.mp3" length="12179594" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>759</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss GDPR Enforcement.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 10</title>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 10</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">105b0ba1-9a13-4fe0-a8c1-bbfdcfb186b7</guid>
      <link>https://share.transistor.fm/s/8b1084c2</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss 90 day certificates.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss 90 day certificates.</p>]]>
      </content:encoded>
      <pubDate>Fri, 19 May 2023 00:43:37 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/8b1084c2/e7fd04ad.mp3" length="12171314" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>722</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss 90 day certificates.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 9</title>
      <itunes:episode>9</itunes:episode>
      <podcast:episode>9</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 9</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">41d564b3-0516-47dd-83b3-29eb6af023aa</guid>
      <link>https://share.transistor.fm/s/feedfe64</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security talent shortage.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security talent shortage.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 May 2023 01:14:54 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/feedfe64/098a728d.mp3" length="14017608" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>793</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, discuss the security talent shortage.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 8</title>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 8</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c7a68556-ab04-4c06-bb43-5fcfc41669fb</guid>
      <link>https://share.transistor.fm/s/cdf807af</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, provide a wrap-up of the RSA conference.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, provide a wrap-up of the RSA conference.</p>]]>
      </content:encoded>
      <pubDate>Fri, 05 May 2023 10:48:45 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/cdf807af/ddb2e8d1.mp3" length="15423096" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>820</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA, provide a wrap-up of the RSA conference.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 7</title>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 7</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">9b9276e0-63bc-42e1-808c-f902a94c6b1f</guid>
      <link>https://share.transistor.fm/s/933601b3</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA present a special edition of the podcast in observance of Star Wars Day - May 4th.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA present a special edition of the podcast in observance of Star Wars Day - May 4th.</p>]]>
      </content:encoded>
      <pubDate>Wed, 03 May 2023 03:08:54 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/933601b3/f9ba3679.mp3" length="12445906" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>705</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA and Ken Buckler, Research Analyst covering Information Security at EMA present a special edition of the podcast in observance of Star Wars Day - May 4th.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 6</title>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 6</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">307512d6-8829-48c8-b59a-60fa2cbce4d9</guid>
      <link>https://share.transistor.fm/s/ad313ddd</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses Cyber Threat Intelligence with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses Cyber Threat Intelligence with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Fri, 28 Apr 2023 02:02:25 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/ad313ddd/23bfa0e1.mp3" length="14662296" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>816</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses Cyber Threat Intelligence with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 5</title>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 5</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3783bea6-2ce3-484d-b058-f6afa089911e</guid>
      <link>https://share.transistor.fm/s/a246aa87</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses API Security and the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses API Security and the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Fri, 21 Apr 2023 02:09:37 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/a246aa87/f236b7d0.mp3" length="12593873" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>697</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses API Security and the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 4</title>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 4</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">82e0b991-b9d2-4456-a1b4-2f8e27237338</guid>
      <link>https://share.transistor.fm/s/bd59b041</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Fri, 14 Apr 2023 02:32:47 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/bd59b041/33f6e6f9.mp3" length="14729729" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>798</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the RSA Conference 2023 with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 3</title>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 3</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a0165525-978b-4d9f-ba2f-64c5d2633343</guid>
      <link>https://share.transistor.fm/s/51ad77fa</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses tax scams with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses tax scams with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Fri, 07 Apr 2023 02:55:39 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/51ad77fa/1f14bc86.mp3" length="13605127" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>764</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses tax scams with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title> Cybersecurity Awesomeness Podcast - Episode 2</title>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title> Cybersecurity Awesomeness Podcast - Episode 2</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1631a2c1-7273-4538-b45f-bfc81969c030</guid>
      <link>https://share.transistor.fm/s/d9af34fe</link>
      <description>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the security ramifications of ChatGPT with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the security ramifications of ChatGPT with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Sun, 02 Apr 2023 22:23:52 -0600</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/d9af34fe/3277b139.mp3" length="11521599" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>718</itunes:duration>
      <itunes:summary>
        <![CDATA[<p>Chris Steffen, Vice President of Research Covering Information Security, Risk, and Compliance Management at EMA discusses the security ramifications of ChatGPT with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </itunes:summary>
      <itunes:keywords>Cybersecurity, Information Security, Tech News, Security, SecOps</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Cybersecurity Awesomeness Podcast - Episode 1</title>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Cybersecurity Awesomeness Podcast - Episode 1</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">104b5ad7-9341-48af-a94a-5a21524ce392</guid>
      <link>https://share.transistor.fm/s/2ce0649c</link>
      <description>
        <![CDATA[<p>Chris Steffen, Managing Research Director for Information Security, Risk and Compliance Management at Enterprise Management Associates (EMA) discusses the new Quantum Computing Cybersecurity Preparedness Act and other cybersecurity considerations with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Chris Steffen, Managing Research Director for Information Security, Risk and Compliance Management at Enterprise Management Associates (EMA) discusses the new Quantum Computing Cybersecurity Preparedness Act and other cybersecurity considerations with Ken Buckler, Research Analyst covering Information Security at EMA.</p>]]>
      </content:encoded>
      <pubDate>Mon, 09 Jan 2023 02:36:02 -0700</pubDate>
      <author>Enterprise Management Associates </author>
      <enclosure url="https://media.transistor.fm/2ce0649c/a72ce2bf.mp3" length="21781354" type="audio/mpeg"/>
      <itunes:author>Enterprise Management Associates </itunes:author>
      <itunes:duration>1233</itunes:duration>
      <itunes:summary>Chris Steffen, Managing Research Director for Information Security, Risk and Compliance Management at Enterprise Management Associates (EMA) discusses the new Quantum Computing Cybersecurity Preparedness Act and other cybersecurity considerations with Ken Buckler, Research Analyst covering Information Security at EMA.</itunes:summary>
      <itunes:subtitle>Chris Steffen, Managing Research Director for Information Security, Risk and Compliance Management at Enterprise Management Associates (EMA) discusses the new Quantum Computing Cybersecurity Preparedness Act and other cybersecurity considerations with Ken</itunes:subtitle>
      <itunes:keywords>DevOps, DevSecOps, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
