• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Privileged Credential Abuse

CIO's Guide To Stopping Privileged Access Abuse - Part 2

CIO’s Guide To Stopping Privileged Access Abuse – Part 2

By Louis Columbus on May 3, 2019

Why CIOs Are Prioritizing Privileged Credential Abuse Now Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse. Based […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise software, Gartner Top 10 Security Projects for 2018, Louis Columbus' blog, Privileged Access Abuse, Privileged Access Management, Privileged Credential Abuse, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

CIO's Guide To Stopping Privileged Access Abuse - Part I

CIO’s Guide To Stopping Privileged Access Abuse – Part I

By Louis Columbus on April 21, 2019

CIOs face the paradox of having to protect their businesses while at the same time streamlining access to the information and systems their companies need to grow. The threatscape they’re facing requires an approach to security that is adaptive to the risk context of each access attempt across any threat surface, anytime. Using risk scores […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, gartner, Louis Columbus' blog, Privileged Access Management, Privileged Access Management in the Modern Threatscape, Privileged Credential Abuse, Zero Trust Privilege, Zero Trust Security

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock

74% Of Data Breaches Start With Privileged Credential Abuse

By Louis Columbus on March 5, 2019

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, IBM 2018 Data Breach Study, Louis Columbus' blog, Privileged Access Management in the Modern Threatscape Report, Privileged Credential Abuse, security, Zero Trust Privilege, Zero Trust Security, ZeroTrust, ZTP, ZTS

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting
  • SecurePass Email: confidential and password-protected email
  • Introducing Zoho Meeting’s Picture-in-Picture feature
  • Sales productivity tips and tools from experts to get more done in less time
  • Tapping into the contingent labor market
  • Democratize decision-making with powerful data storytelling  
  • 9 tips to boost sales for your business
  • Introducing WorkDrive 3.0: Enhanced collaboration. Improved accessibility: Part 2
  • Harmonizing Swiss payment transactions with the QR-bill
  • 5 Tips for building an amazing team and growing your business

EI Tweets

My Tweets

Popular Posts

  • Monday’s Musings: The Controversy Surrounding Gartner’s CRM Market Share Analysis
  • The Customer Acquisition Cost (CAC) Ratio: Another Subtle SaaS Metric
  • CIO interview: Casey Coleman of the General Services Administration
  • The Marginal Cost of Software
  • Three types of GUIs - past, present and the future
  • Top 10 Cybersecurity Companies To Watch In 2020
  • Influence and Business
  • Global Trade Increases Despite Inflation in China/Elsewhere -- Yet We Predict Reversal Later in 2011

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: