• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Security

The Top 20 Cybersecurity Startups To Watch In 2021

The Top 20 Cybersecurity Startups To Watch In 2021

By Louis Columbus on March 27, 2021

Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged cybersecurity, cybersecurity startups, Cybersecurity strategy, Louis Columbus' blog, startups to watch in 2021, Zero Trust, Zero Trust Security | 1 Response

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

By Louis Columbus on March 23, 2021

Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.  There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Chief information officer, Chief Information Security Officer, CISO, Endpoint resilience, endpoint security, enterprise software, Lenovo, Lenovo X1 Carbon laptop, Louis Columbus' blog, Zero Trust, Zero Trust Security

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

By Louis Columbus on March 21, 2021

30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report. Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Apple's Face ID, CISOs, cybersecurity, Ivanti, Louis Columbus' blog, Unified Endpoint Management, VPN, Zero Sign-On (ZSO), Zero Trust Security

Coronavirus vaccines on the production line

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains

By Louis Columbus on March 14, 2021

The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide much of it focused on vaccine development, according to the United Kingdom Office of Cyber Security and Information Assurance. 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access also according to the United Kingdom […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Artificial intelligence, Centrify, COVID-19 vaccine supply chain, COVID-19 vaccines, cybersecurity, Cybersecurity & Infrastructure Security Agency (CISA), Illumio, Ivanti, LogicMonitor, Louis Columbus' blog, machine learning, Multi-Factor Authentication, U.S. Homeland Security, Unified Endpoint Management, Zero Trust Security

High quality 3D rendered image, perfectly usable for topics related to big data, global networks, international flight routes or the spread of a pandemic / computer virus.
Textures courtesy of NASA:
https://visibleearth.nasa.gov/images/55167/earths-city-lights,
https://visibleearth.nasa.gov/images/73934/topography

Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021

By Louis Columbus on February 28, 2021

Bottom Line:  Bad actors quickly capitalize on the wide gaps in machine identity security, creating one of the most breachable threat surfaces today. Why Machines Are the Most Challenging Threat Surface To Protect Forrester’s recent webinar on the topic, How To Secure And Govern Non-Human Identities, estimates that machine identities (including bots, robots and IoT) are growing […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, centrify privileged access management, cybersecurity, Forrester, Identity Access Management (IAM), Kount's 2020 Bot Landscape and Impact Report, LogicMonitor, Louis Columbus' blog, Microsoft Active Directory, Privileged Access Management (PAM), Secured-Sockets Layer (SSL), Zero Trust Security

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

By Louis Columbus on January 4, 2021

Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Cybersecurity and Infrastructure Security Agency's (CISA) Alert AA20-352A, FireEye, Identity and Access Management (IAM), Louis Columbus' blog, microsoft, National Institute of Standards and Technology (NIST) Special Publication 800-53, SolarWinds, SolarWinds breach, Zero Trust Security

5 Ways Machine Learning Can Thwart Phishing Attacks

5 Ways Machine Learning Can Thwart Phishing Attacks

By Louis Columbus on August 23, 2020

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged CISO, cybersecurity, google, Louis Columbus' blog, Machine Learning for Cybersecurity, microsoft, MobileIron Mobile Threat Defense, phishing, Stanford Institute for Economic Policy Research (SIEPR), Verizon’s Mobile Security Index 2020, Zero Trust Security

Why Security Needs To Be Integral To DevOps

Why Security Needs To Be Integral To DevOps

By Louis Columbus on July 27, 2020

Bottom Line: DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals. Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Application Security Testing (AST), BMC ADE, CheckMarx, cybersecurity, dev/ops, DevSecOps Global Skills survey, engineering, Louis Columbus' blog, Software Development Lifecycle (SDLC), Zero Trust Security

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

By Louis Columbus on July 12, 2020

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, endpoint security, Louis Columbus' blog, Machine Learning in Cybersecurity, MFA, Multifactor authentication, Privileged Access Management, Zero Trust Security

How To Build A Business Case For Endpoint Security

How To Build A Business Case For Endpoint Security

By Louis Columbus on June 6, 2020

Bottom Line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach. Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, cybersecurity, Gartner cybersecurity, Gartner ISM, Kount, Louis Columbus' blog, microsoft, pandemic, RSA Conference 2020, SIEM, Zero Trust Security

Next »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Managing your clients is no longer a difficult task
  • Now, post your articles to Medium and Zoho Connect, Desk, and Sites directly from Writer!
  • Zoho’s leaders kept asking themselves one question: Why?
  • Zoho Sign and eID Easy for eIDAS-compliant digital signatures
  • App Spotlight: VoiceSpin for Zoho
  • ProTips: 4 best times to use texting automation
  • SalesIQ-Haptik integration: AI-powered conversations now made easier
  • Zoho’s Finance apps partner with HSBC: Simplifying Online Business Payments
  • Introducing Auto Top-up, suppression list, and more
  • 6 Ways to improve employee productivity
  • VAT recovery – The why and how
  • Three key aspects of becoming a successful staffing agency
  • App Spotlight: Commercient File SYNC for Zoho CRM
  • 8 questions to ask while evaluating marketing automation software
  • Planned India Datacenter Maintenance on 15th and 22nd May, 2022 from 07:00 AM to 10:00 AM IST

EI Tweets

My Tweets

Popular Posts

  • A Memo regarding Corporate Social Media policies
  • Five tips from inside the Devil's Triangle
  • Can corporate social responsibility affect your company’s bottom line?
  • Strategy, Business Model, and Who's Your Customer
  • Forrester’s Services Procurement Wave -- Do the Means Justify the End? (Part 1)
  • 2021 Roundup Of AI And Machine Learning Market Forecasts Show Strong Growth
  • The Top 20 Machine Learning Startups To Watch In 2021
  • Gartner's Strategic Sourcing Magic Quadrant: We Report, You Read and We All Decide

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: