• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Privileged Access Management

Centrify's New CEO Has A Compelling Vision For The Future Of Cybersecurity

Centrify’s New CEO Has A Compelling Vision For The Future Of Cybersecurity

By Louis Columbus on November 3, 2020

Bottom Line: Flint Brenton’s vision for the future of Centrify and cybersecurity, in general, prioritizes the need for privileged access management to become core to the multi-cloud architectures and DevOps environments he sees pervading customers’ enterprises today. Every new cybersecurity company CEO is writing their vision of the future by their decisions and the priorities […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify CEO Flint Brenton, Cybersecurity in a COVID-19 World, Cybersecurity strategy, DevOps, Louis Columbus' blog, microservices, Privileged Access Management

Dissecting The Twitter Hack With A Cybersecurity Evangelist

Dissecting The Twitter Hack With A Cybersecurity Evangelist

By Louis Columbus on July 26, 2020

Bottom Line: Shattering the false sense of security in tech, the recent Twitter hack blended altruism, fame, greed, social engineering via SIM swapping and insider threats to steal $120,000 from victims when the economic and political damage could have been far worse. Targeting the most influential celebrities on Twitter, hackers orchestrated a social engineering-based attack […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged AI, apple, Artificial intelligence, Artificial Intelligence Cybersecurity, Centrify, cybersecurity, Louis Columbus, machine learning, Machine learning cybersecurity, Privileged Access Management, SIM Swapping, twitter hack, Uber

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

By Louis Columbus on July 12, 2020

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, endpoint security, Louis Columbus' blog, Machine Learning in Cybersecurity, MFA, Multifactor authentication, Privileged Access Management, Zero Trust Security

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

By Louis Columbus on November 30, 2019

60% of security and IT professionals state that security is the leading challenge with cloud migrations, despite not being clear about who is responsible for securing cloud environments. 71% understand that controlling privileged access to cloud service administrative accounts is a critical concern, yet only 53% cite secure access to cloud workloads as a key […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, AWS Shared Responsibility Model, Centrify, centrify privileged access management, cybersecurity, Louis Columbus' blog, Privileged Access Management, Shared Responsibility Model, Zero Trust Privilege, Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

By Louis Columbus on June 23, 2019

Bottom Line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up. Separating Security Hacks Fact from Fiction It’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged cybersecurity, Louis Columbus' blog, Privileged Access Management, Verizon, Zero Trust Privilege, Zero Trust Security, ZTP, ZTS

How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches

How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches

By Louis Columbus on June 14, 2019

Energy, Technology & Finance are the most mature industries when it comes to Privileged Access Management (PAM) adoption and uses, outscoring peer industries by a wide margin. 58% of organizations do not use Multi-Factor Authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify 2019 Zero Trust Privilege Maturity Model Report, Louis Columbus' blog, PAM, Privileged Access Credential Abuse, privileged access credentials, Privileged Access Management, Zero Trust Privilege, Zero Trust Security

CIO's Guide To Stopping Privileged Access Abuse - Part 2

CIO’s Guide To Stopping Privileged Access Abuse – Part 2

By Louis Columbus on May 3, 2019

Why CIOs Are Prioritizing Privileged Credential Abuse Now Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse. Based […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise software, Gartner Top 10 Security Projects for 2018, Louis Columbus' blog, Privileged Access Abuse, Privileged Access Management, Privileged Credential Abuse, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

CIO's Guide To Stopping Privileged Access Abuse - Part I

CIO’s Guide To Stopping Privileged Access Abuse – Part I

By Louis Columbus on April 21, 2019

CIOs face the paradox of having to protect their businesses while at the same time streamlining access to the information and systems their companies need to grow. The threatscape they’re facing requires an approach to security that is adaptive to the risk context of each access attempt across any threat surface, anytime. Using risk scores […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, gartner, Louis Columbus' blog, Privileged Access Management, Privileged Access Management in the Modern Threatscape, Privileged Credential Abuse, Zero Trust Privilege, Zero Trust Security

5 Things Every Executive Needs To Know About Identity And Access Management

5 Things Every Executive Needs To Know About Identity And Access Management

By Louis Columbus on April 6, 2019

For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter. Organizations need to recognize that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Identity and Access Management, Louis Columbus' blog, MFA, Multi-Factor Authentication, PAM, Privileged Access Management, Zero Trust Privilege, Zero Trust Security

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Introducing Contact Center: Pave the way for more customers by opening more doors of interaction
  • 5 ways to take the “cold” out of cold calling
  • Top 5 reasons why every organization should use an employee management system
  • Developer platforms and their importance
  • App Spotlight: Yeaster P-Series for Zoho CRM
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting
  • SecurePass Email: confidential and password-protected email
  • Introducing Zoho Meeting’s Picture-in-Picture feature
  • Sales productivity tips and tools from experts to get more done in less time
  • Tapping into the contingent labor market

EI Tweets

My Tweets

Popular Posts

  • Apple, Adobe, Punctuated Equilibrium, and Commoditization
  • Synchronicity
  • How is big data faring in the enterprise?
  • Strategy, Business Model, and Who's Your Customer
  • FinancialForce's Spring 2022 Release Defines the Future of FP&A In Services
  • ERP failure: New research and statistics
  • Top 10 Cybersecurity Companies To Watch In 2020
  • Three types of GUIs - past, present and the future

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: