• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

security

Diverse group of male and female teens and young adults are studying together around desks in classroom or library. Caucasian, African American and Hispanic students are looking at laptop computer screen and working on assignment together.

It’s Time To Solve K-12’s Cybersecurity Crisis

By Louis Columbus on October 8, 2019

There were a record 160 publicly-disclosed security incidents in K-12 during the summer months of 2019, exceeding the total number of incidents reported in all of 2018 by 30%. 47% of K-12 organizations are making cybersecurity their primary investment, yet 74% do not use encryption. 93% of K-12 organizations rely on native client/patch management tools […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, christy wyatt, cybersecurity, Louis Columbus' blog, security

5 Key Insights From Absolute's 2019 Endpoint Security Trends Report

5 Key Insights From Absolute’s 2019 Endpoint Security Trends Report

By Louis Columbus on September 20, 2019

Endpoint security tools are 24% of all IT security spending, and by 2020 global IT security spending will reach $128B according to Morgan Stanley Research. 70% of all breaches still originate at endpoints, despite the increased IT spending on this threat surface, according to IDC. To better understand the challenges organizations have securing the proliferating number and […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute security, absolute software, cybersecurity, endpoint security, Louis Columbus' blog, security

Absolute's CEO Christy Wyatt On Leading A Cybersecurity Company And The Power Of Resilience

Absolute’s CEO Christy Wyatt On Leading A Cybersecurity Company And The Power Of Resilience

By Louis Columbus on September 2, 2019

Christy Wyatt’s career exemplifies what you would expect from a high-performing tech leader who thrives on turning challenges into growth. Showing persistence, resiliency, and tenacity – she has a long history of scaling high-growth technology companies and infusing them with greater creative energy, ingenuity, and intensity for results. As CEO of Absolute, she’s leading the company […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, christy wyatt, cybersecurity, Louis Columbus' blog, security

How To Secure Mobile Devices In A Zero Trust World

How To Secure Mobile Devices In A Zero Trust World

By Louis Columbus on May 13, 2019

86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types. 48% say they’ve sacrificed security to “get the job done” up from 32% last year. 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Forrester Zero Trust Framework, Identity Access Management, Louis Columbus' blog, machine learning, MobileIron, security, Verizon, Verizon Mobile Security Index, Zero Sign-On, Zero Trust Framework, Zero Trust Privilege, Zero Trust Security

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock

74% Of Data Breaches Start With Privileged Credential Abuse

By Louis Columbus on March 5, 2019

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, IBM 2018 Data Breach Study, Louis Columbus' blog, Privileged Access Management in the Modern Threatscape Report, Privileged Credential Abuse, security, Zero Trust Privilege, Zero Trust Security, ZeroTrust, ZTP, ZTS

Internet Cyber Security digital concept

58% Of All Healthcare Breaches Are Initiated By Insiders

By Louis Columbus on September 10, 2018

58% of healthcare systems breach attempts involve inside actors, which makes this the leading industry for insider threats today. Ransomware leads all malicious code categories, responsible for 70% of breach attempt incidents. Stealing laptops from medical professionals’ cars to obtain privileged access credentials to gain access and install malware on healthcare networks, exfiltrate valuable data […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Accenture, Centrify, cybersecurity, Louis Columbus' blog, security, Verizon’s 2018 Protected Health Information Data Breach Report (PHIDBR)., Zero Trust Security

IBM's 2018 Data Breach Study Shows Why We're In A Zero Trust World Now

IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now

By Louis Columbus on August 6, 2018

Digital businesses that lost less than 1% of their customers due to a data breach incurred a cost of $2.8M, and if 4% or more were lost the cost soared to $6M. U.S. based breaches are the most expensive globally, costing on average $7.91M with the highest global notification cost as well, $740,000. A typical […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise security, IBM 2018 Cost of a Data Breach Study, Louis Columbus, Next-Gen Access, security, Zero Trust Security

Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown

Five Ways Machine Learning Can Save Your Company From A Security Breach Meltdown

By Louis Columbus on April 6, 2018

$86B was spent on security in 2017, yet 66% of companies have still been breached an average of five or more times. Just 55% of CEOs say their organizations have experienced a breach, while 79% of CTOs acknowledge breaches have occurred. One in approximately four CEOs (24%) aren’t aware if their companies have even had a security […]

Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, cybersecurity, machine learning, security, security breach, Zero Trust Security | 1 Response

Some Non-Predictions for 2015

Some Non-Predictions for 2015

By Michael Fauscette on January 7, 2015

It’s that time of new year when you get deluged with analysts / bloggers predictions and prognostications. I join in most years, and of course there’s the IDC predictions process to contend with as well. This year I swore that I was skipping it. I’ve already done the new IDC “Futurescape” document and webcast with my […]

Posted in Featured Posts, Trends & Concepts | Tagged 2015, applications, Big Data, Business, Cloud, CX, data, ESN, mobile, net neutrality, platform, predictions, Privacy, security, Social, strategy, technology

Technology for Good – episode thirty four with Salesforce’s John Tascheck

Technology for Good – episode thirty four with Salesforce’s John Tascheck

By Tom Raftery on October 19, 2014

Welcome to episode thirty four of the Technology for Good hangout. In this week’s episode our guest was SalesForce SVP of Strategy, John Taschek. John and I are both longtime members of the Enterprise Irregulars, but this was the first time John and I had had a conversation outside of email! Some of the more […]

Posted in Technology / Software | Tagged #df14, apps, climate, Comms, Electricity 2.0, GreenMonkTV, Hardware, Internet of Things, IoT, John Taschek, mobility, Open source, Privacy, salesforce.com, security, Sustainability, wearables

Next »

feed mail facebook twitter linkedin

EI Tweets

My Tweets

Popular Posts

  • Thursday’s Tech Showcase: SnapLogic Tackles Cloud/SaaS Integration Challenges
  • Salesforce Sees Surge In $1M+ Deals Powering Record Q1, FY22 Results
  • Cybersecurity CEOs Share How Businesses Can Protect Themselves In 2022
  • Is Social Business Dead?
  • Silicon Valley’s Defining Characteristics
  • Beyond The Three V’s of Big Data – Viscosity and Virality
  • The Architecture of a Social Business
  • Microsoft: A new era of vertical integration?

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos