• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Privilege

10 Ways To Own Your Cybersecurity In 2020

10 Ways To Own Your Cybersecurity In 2020

By Louis Columbus on January 30, 2020

Bottom Line: One of the best New Year’s resolutions anyone can make is to learn new ways to secure their personal and professional lives online, starting with ten proven ways they can take greater control over their own cybersecurity. For many professionals, their personal and professional lives have blended together thanks to the growing number […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Echo, bring-your-own-device, Centrify Zero Trust Privilege. Centrify, cybersecurity, Dashlane, Google Home, lastpass, Louis Columbus' blog, MFA, Multi-Factor Authentication, OneLogin, Privileged Access Management (PAM) World Password Day, Zero Trust Privilege

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

By Louis Columbus on November 30, 2019

60% of security and IT professionals state that security is the leading challenge with cloud migrations, despite not being clear about who is responsible for securing cloud environments. 71% understand that controlling privileged access to cloud service administrative accounts is a critical concern, yet only 53% cite secure access to cloud workloads as a key […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, AWS Shared Responsibility Model, Centrify, centrify privileged access management, cybersecurity, Louis Columbus' blog, Privileged Access Management, Shared Responsibility Model, Zero Trust Privilege, Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

By Louis Columbus on November 11, 2019

Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing Gold Rush of 2019 The intensity private equity (PE) firms have for acquiring and aggregating manufacturing businesses is creating […]

Posted in Featured Posts, Technology / Software | Tagged Centrify, cybersecurity, Enterprise resource planning, erp, Louis Columbus' blog, Manufacturing, Private Equity Firms, PWC, Zero Trust Privilege, Zero Trust Security

The Truth About Privileged Access Security On AWS And Other Public Clouds

The Truth About Privileged Access Security On AWS And Other Public Clouds

By Louis Columbus on August 25, 2019

Bottom Line: Amazon’s Identity and Access Management (IAM) centralizes identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today. AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, aws cybersecurity, AWS Security, Centrify, cybersecurity, Louis Columbus' blog, Zero Trust Privilege, Zero Trust Security

Your Mobile Phone Is Your Identity. How Do You Protect It?

Your Mobile Phone Is Your Identity. How Do You Protect It?

By Louis Columbus on August 10, 2019

The average cost of a data breach has risen 12% over the past 5 years and is now $3.92M. U.S.-based breaches average $8.19M in losses, leading all nations. Not integrating mobile phone platforms and protecting them with a Zero Trust Security framework can add up to $240K to the cost of a breach. Companies that […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Louis Columbus' blog, MobileIron, Zero Trust Privilege, Zero Trust Security

Black keyboard where the enter key is glowing red showing the word ransomware cybersecurity concept 3D illustration

How To Deal With Ransomware In A Zero Trust World

By Louis Columbus on August 9, 2019

Lake City, Florida’s city government paid ransomware attackers about $530,000 or 42 Bitcoins, to restore access to systems and data last month. The City of Riviera Beach, Florida, paid ransomware attackers about $600,000 to regain access to their systems last month. Earlier this month, LaPorte County, Indiana paid over $130,000 worth of Bitcoins to ransomware […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged centrify privileged access management, cybersecurity, Louis Columbus' blog, Zero Trust Privilege, Zero Trust Security

Roadmap To Zero Trust For Small Businesses

Roadmap To Zero Trust For Small Businesses

By Louis Columbus on July 27, 2019

Bottom Line:  Small businesses don’t need to sacrifice security due to budget constraints or productivity requirements – a Zero Trust roadmap can help them keep growing and stop breaches. Having worked my way through college in a series of small businesses and having neighbors and friends who operate several today, I see how cloud, databases, and […]

Posted in Featured Posts, Technology / Software | Tagged centrify privileged access management, cybersecurity, Louis Columbus' blog, Zero Trust Privilege, Zero Trust Security

Top 10 Cybersecurity Companies To Watch In 2019

Top 10 Cybersecurity Companies To Watch In 2019

By Louis Columbus on June 23, 2019

Gartner predicts worldwide spending on information security products and services will reach $124B in 2019, growing 8.7% over the $114B invested in 2018. Cloud Security platform and application sales are projected to grow at a 35.3% Compound Annual Growth Rate (CAGR) between 2017 to 2019, becoming a $459M market this year. Security Services is projected to be […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, centrify privileged access management, cybersecurity, Kount, Louis Columbus' blog, MobileIron, Zero Trust Privilege, Zero Trust Security

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

By Louis Columbus on June 23, 2019

Bottom Line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up. Separating Security Hacks Fact from Fiction It’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged cybersecurity, Louis Columbus' blog, Privileged Access Management, Verizon, Zero Trust Privilege, Zero Trust Security, ZTP, ZTS

Next »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Shared inbox versus distribution list: which to choose?
  • The difference between customer engagement and customer experience, and how they go hand-in-hand
  • Improve your efficiency with new ways of automating tasks and accessing apps in Zoho Projects
  • ProTips: 5 ways to maximize form conversions
  • Introducing Contact Center: Pave the way for more customers by opening more doors of interaction
  • 5 ways to take the “cold” out of cold calling
  • Top 5 reasons why every organization should use an employee management system
  • Developer platforms and their importance
  • App Spotlight: Yeaster P-Series for Zoho CRM
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting

EI Tweets

My Tweets

Popular Posts

  • Apple, Adobe, Punctuated Equilibrium, and Commoditization
  • 2021 Roundup Of AI And Machine Learning Market Forecasts Show Strong Growth
  • Three types of GUIs - past, present and the future
  • The Best Tech Companies For Remote Jobs In 2021 According To Glassdoor
  • Salesforce Now Has Over 19% Of The CRM Market
  • Strategy, Business Model, and Who's Your Customer
  • Oracle OpenWorld 2010 - The Recap
  • FinancialForce's Spring 2022 Release Defines the Future of FP&A In Services

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: