• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Centrify

Coronavirus vaccines on the production line

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains

By Louis Columbus on March 14, 2021

The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide much of it focused on vaccine development, according to the United Kingdom Office of Cyber Security and Information Assurance. 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access also according to the United Kingdom […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Artificial intelligence, Centrify, COVID-19 vaccine supply chain, COVID-19 vaccines, cybersecurity, Cybersecurity & Infrastructure Security Agency (CISA), Illumio, Ivanti, LogicMonitor, Louis Columbus' blog, machine learning, Multi-Factor Authentication, U.S. Homeland Security, Unified Endpoint Management, Zero Trust Security

High quality 3D rendered image, perfectly usable for topics related to big data, global networks, international flight routes or the spread of a pandemic / computer virus.
Textures courtesy of NASA:
https://visibleearth.nasa.gov/images/55167/earths-city-lights,
https://visibleearth.nasa.gov/images/73934/topography

Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021

By Louis Columbus on February 28, 2021

Bottom Line:  Bad actors quickly capitalize on the wide gaps in machine identity security, creating one of the most breachable threat surfaces today. Why Machines Are the Most Challenging Threat Surface To Protect Forrester’s recent webinar on the topic, How To Secure And Govern Non-Human Identities, estimates that machine identities (including bots, robots and IoT) are growing […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, centrify privileged access management, cybersecurity, Forrester, Identity Access Management (IAM), Kount's 2020 Bot Landscape and Impact Report, LogicMonitor, Louis Columbus' blog, Microsoft Active Directory, Privileged Access Management (PAM), Secured-Sockets Layer (SSL), Zero Trust Security

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

By Louis Columbus on January 4, 2021

Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Cybersecurity and Infrastructure Security Agency's (CISA) Alert AA20-352A, FireEye, Identity and Access Management (IAM), Louis Columbus' blog, microsoft, National Institute of Standards and Technology (NIST) Special Publication 800-53, SolarWinds, SolarWinds breach, Zero Trust Security

12 Cybersecurity CEOs On What Each Learned Leading During The Pandemic

12 Cybersecurity CEOs On What Each Learned Leading During The Pandemic

By Louis Columbus on December 21, 2020

Bottom Line: Cybersecurity CEOs’ lessons learned from navigating the pandemic provide a valuable framework for leading and growing a business through anxious, uncertain times. How each cybersecurity CEO responds to the challenges of keeping employees safe, customers secure, and product release cycles on schedule while still achieving customer success – all virtually – provide valuable […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged absolute software, Centrify, Evernym, Founder Shield, Gramener: Insights as Data Stories, Hexnode, Kount, Louis Columbus' blog, MobileIron, Osborne Global Security, Prometeo, Qohash, RapidSpace

Centrify's New CEO Has A Compelling Vision For The Future Of Cybersecurity

Centrify’s New CEO Has A Compelling Vision For The Future Of Cybersecurity

By Louis Columbus on November 3, 2020

Bottom Line: Flint Brenton’s vision for the future of Centrify and cybersecurity, in general, prioritizes the need for privileged access management to become core to the multi-cloud architectures and DevOps environments he sees pervading customers’ enterprises today. Every new cybersecurity company CEO is writing their vision of the future by their decisions and the priorities […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify CEO Flint Brenton, Cybersecurity in a COVID-19 World, Cybersecurity strategy, DevOps, Louis Columbus' blog, microservices, Privileged Access Management

83% Of Enterprises Transformed Their Cybersecurity In 2020

83% Of Enterprises Transformed Their Cybersecurity In 2020

By Louis Columbus on November 1, 2020

73% of enterprises (over 500 employees) accelerated their cloud migration plans to support the shift to remote working across their organizations due to the pandemic. 81% of enterprises accelerated their IT modernization processes due to the pandemic. 48% of all companies surveyed have accelerated their cloud migration plans, 49% have sped up their IT modernization […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged AI in cybersecurity, Centrify, centrify privileged access management, CISO, cybersecurity, Louis Columbus' blog

Dissecting The Twitter Hack With A Cybersecurity Evangelist

Dissecting The Twitter Hack With A Cybersecurity Evangelist

By Louis Columbus on July 26, 2020

Bottom Line: Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse. Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged AI, apple, Artificial intelligence, Artificial Intelligence Cybersecurity, Centrify, cybersecurity, Louis Columbus, machine learning, Machine learning cybersecurity, Privileged Access Management, SIM Swapping, twitter hack, Uber

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

By Louis Columbus on July 12, 2020

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, endpoint security, Louis Columbus' blog, Machine Learning in Cybersecurity, MFA, Multifactor authentication, Privileged Access Management, Zero Trust Security

Debunking The Myth That Greater Compliance Makes IT More Secure

Debunking The Myth That Greater Compliance Makes IT More Secure

By Louis Columbus on June 22, 2020

Bottom Line:  Excelling at compliance doesn’t protect any business from being hacked, yet pursuing a continuous risk management strategy helps. With a few exceptions (such as spearphishing), cyberattacks are, by nature, brutally opportunistic and random. They are driven to disrupt operations at best and steal funds, records, and privileged access credentials at worst. Conversely, the […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, Amazon Web Services Security, Centrify, Cyberattacks, Identity-Centric PAM, Identity-Centric Privileged Access Management, Louis Columbus' blog, microsoft, Palo Alto Networks

Protecting Privileged Identities In A Post-COVID-19 World

Protecting Privileged Identities In A Post-COVID-19 World

By Louis Columbus on May 17, 2020

    Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction. The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify Identity Access Management, centrify privileged access management, Cloud, cybersecurity, Cybersecurity in a COVID-19 World, Cybersecurity strategy, dev/ops, Identity Acess Management, Louis Columbus' blog, microservices, Privivleged Access Management, Protecting Privileged Access Credentials, Securing infrastructure, Zero Trust Security, ZTS

Next »

feed mail facebook twitter linkedin

EI Tweets

My Tweets

Popular Posts

  • Centrify’s Tim Steinkopf On How To Think Like A Cybersecurity CEO
  • Thursday’s Tech Showcase: SnapLogic Tackles Cloud/SaaS Integration Challenges
  • Beyond The Three V’s of Big Data – Viscosity and Virality
  • Why Trust Is Emerging As The Most Powerful Catalyst Of Selling Effectiveness
  • Gartner Predicts Public Cloud Services Market Will Reach $397.4B by 2022
  • Microsoft: A new era of vertical integration?
  • How To Deal With Ransomware In A Zero Trust World
  • A Memo regarding Corporate Social Media policies

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos