• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Cybersecurity strategy

The Top 20 Cybersecurity Startups To Watch In 2021

The Top 20 Cybersecurity Startups To Watch In 2021

By Louis Columbus on March 27, 2021

Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged cybersecurity, cybersecurity startups, Cybersecurity strategy, Louis Columbus' blog, startups to watch in 2021, Zero Trust, Zero Trust Security | 1 Response

Centrify's New CEO Has A Compelling Vision For The Future Of Cybersecurity

Centrify’s New CEO Has A Compelling Vision For The Future Of Cybersecurity

By Louis Columbus on November 3, 2020

Bottom Line: Flint Brenton’s vision for the future of Centrify and cybersecurity, in general, prioritizes the need for privileged access management to become core to the multi-cloud architectures and DevOps environments he sees pervading customers’ enterprises today. Every new cybersecurity company CEO is writing their vision of the future by their decisions and the priorities […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify CEO Flint Brenton, Cybersecurity in a COVID-19 World, Cybersecurity strategy, DevOps, Louis Columbus' blog, microservices, Privileged Access Management

Protecting Privileged Identities In A Post-COVID-19 World

Protecting Privileged Identities In A Post-COVID-19 World

By Louis Columbus on May 17, 2020

    Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction. The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify Identity Access Management, centrify privileged access management, Cloud, cybersecurity, Cybersecurity in a COVID-19 World, Cybersecurity strategy, dev/ops, Identity Acess Management, Louis Columbus' blog, microservices, Privivleged Access Management, Protecting Privileged Access Credentials, Securing infrastructure, Zero Trust Security, ZTS

10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence

10 Ways Asset Intelligence Improves Cybersecurity Resiliency And Persistence

By Louis Columbus on January 23, 2020

Bottom Line: By securing every endpoint with a persistent connection and the resiliency to autonomously self-heal, CIOs are finding new ways to further improve network security by capitalizing on each IT assets’ intelligence. Capturing real-time data from IT assets is how every organization can grow beyond its existing boundaries with greater security, speed, and trust. Many […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Absolute Persistence Platform, Absolute Resilience Platform, absolute software, Absolute Software Persistence, Absolute Software Resilience, Absolute Software’s 2019 Endpoint Security Trends Report, Asset Intelligence, cybersecurity, Cybersecurity in 2020, Cybersecurity strategy, Geofencing, Louis Columbus' blog, MITRE Cybersecurity research practice

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Improve your efficiency with new ways of automating tasks and accessing apps in Zoho Projects
  • ProTips: 5 ways to maximize form conversions
  • Introducing Contact Center: Pave the way for more customers by opening more doors of interaction
  • 5 ways to take the “cold” out of cold calling
  • Top 5 reasons why every organization should use an employee management system
  • Developer platforms and their importance
  • App Spotlight: Yeaster P-Series for Zoho CRM
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting
  • SecurePass Email: confidential and password-protected email
  • Introducing Zoho Meeting’s Picture-in-Picture feature

EI Tweets

My Tweets

Popular Posts

  • Apple, Adobe, Punctuated Equilibrium, and Commoditization
  • Strategy, Business Model, and Who's Your Customer
  • Three types of GUIs - past, present and the future
  • How is big data faring in the enterprise?
  • FinancialForce's Spring 2022 Release Defines the Future of FP&A In Services
  • 2021 Roundup Of AI And Machine Learning Market Forecasts Show Strong Growth
  • Salesforce Now Has Over 19% Of The CRM Market
  • The Unified Performance, Risk, and Compliance Model - Part IV - Model and Optimize

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: