• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Security

Protecting Privileged Identities In A Post-COVID-19 World

Protecting Privileged Identities In A Post-COVID-19 World

By Louis Columbus on May 17, 2020

    Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction. The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify Identity Access Management, centrify privileged access management, Cloud, cybersecurity, Cybersecurity in a COVID-19 World, Cybersecurity strategy, dev/ops, Identity Acess Management, Louis Columbus' blog, microservices, Privivleged Access Management, Protecting Privileged Access Credentials, Securing infrastructure, Zero Trust Security, ZTS

Machines Protecting Themselves Is The Future Of Cybersecurity

Machines Protecting Themselves Is The Future Of Cybersecurity

By Louis Columbus on April 22, 2020

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves. Any nations’ digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged Centrify, COVID-19 cyberattacks, Cyberattacks, cybersecurity, Louis Columbus' blog, National Cyber Security Centre (NCSC), NIST Zero Trust Special Publication 800-207, United States Department of Homeland Security (DHS), Zero Trust Security

Access control. Fingerprint security. Cybersecurity and information technology. Blue, red background with digital integrated network technology. Printed circuit board. Technology background.

Why Your Biometrics Are Your Best Password

By Louis Columbus on March 18, 2020

Bottom Line: Biometrics are proving to be better than passwords because they’re easier to use, provide greater privacy and security, and are gaining standardization across a broad base of mobile, desktop, and server devices that users rely on to access online services. In keeping with the theme of this year’s RSA Conference of Human Element, […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Apple Biometrics, Apple Face ID, Apple’s Touch ID, Biometrics, Centrify, Entrust Datacard, FIDO2, HID Global, Idaptive, ImageWare, Louis Columbus' blog, microsoft, MobileIron, Passwordless authentication, passwords, RSA Conference, Thales, Windows Hello, Zero Trust Security

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

By Louis Columbus on November 30, 2019

60% of security and IT professionals state that security is the leading challenge with cloud migrations, despite not being clear about who is responsible for securing cloud environments. 71% understand that controlling privileged access to cloud service administrative accounts is a critical concern, yet only 53% cite secure access to cloud workloads as a key […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, AWS Shared Responsibility Model, Centrify, centrify privileged access management, cybersecurity, Louis Columbus' blog, Privileged Access Management, Shared Responsibility Model, Zero Trust Privilege, Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

What’s New On The Zero Trust Security Landscape In 2019

What’s New On The Zero Trust Security Landscape In 2019

By Louis Columbus on November 27, 2019

Forrester added in Checkpoint, Forescout, Google, illumio, MobileIron, Proofpoint, Symantec, and Unisys in their latest Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers this year. Forrester’s 2019 scorecard increased the weight on network security, automation and orchestration, and portfolio growth rate compared to last year, adding in Zero Trust eXtended (ZTX) ecosystem advocacy to the […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Cybersecurity Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Louis Columbus' blog, Mobile Security, MobileIron, mobility, Q4 2019, Zero Trust Security

10 Charts That Will Change Your Perspective Of AI In Security

10 Charts That Will Change Your Perspective Of AI In Security

By Louis Columbus on November 24, 2019

Rapid advances in AI and machine learning are defining cybersecurity’s future daily. Identities are the new security perimeter and Zero Trust Security frameworks are capitalizing on AI’s insights to thwart breaches in milliseconds. Advances in AI and machine learning are also driving the transformation of endpoint security toward greater accuracy and contextually intelligence. 69% of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged AI, AI CyberSecurity, Artificial intelligence, Cyberattacks, cybersecurity, fraud detection, Louis Columbus' blog, machine learning security, Zero Trust Security

Shot of coworkers using their digital devices in synchronicityhttp://195.154.178.81/DATA/i_collage/pi/shoots/805355.jpg

Financial Services Rely On BYOD – How Do They Stay Secure?

By Louis Columbus on November 13, 2019

Bottom Line: 2020 is going to be the year companies launch more digital business initiatives that depend on BYOD than ever before, making Zero Trust Security a key contributor to their success. Financial Services firms are at an inflection point going into 2020. Mobile-first products and services now dominate their product roadmaps for next year, with […]

Posted in Featured Posts, Technology / Software | Tagged BYOD, cybersecurity, Financial services, Louis Columbus' blog, MobileIron, Zero Trust Security, Zero Trust Zero Trust Framework

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

By Louis Columbus on November 11, 2019

Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing Gold Rush of 2019 The intensity private equity (PE) firms have for acquiring and aggregating manufacturing businesses is creating […]

Posted in Featured Posts, Technology / Software | Tagged Centrify, cybersecurity, Enterprise resource planning, erp, Louis Columbus' blog, Manufacturing, Private Equity Firms, PWC, Zero Trust Privilege, Zero Trust Security

10 Ways AI And Machine Learning Are Improving Endpoint Security

10 Ways AI And Machine Learning Are Improving Endpoint Security

By Louis Columbus on October 5, 2019

 Gartner predicts $137.4B will be spent on Information Security and Risk Management in 2019, increasing to $175.5B in 2023, reaching a CAGR of 9.1%. Cloud Security, Data Security, and Infrastructure Protection are the fastest-growing areas of security spending through 2023.  69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks […]

Posted in Business, Featured Posts, Technology / Software | Tagged Absolute Endpoint Security, absolute software, AI, cybersecurity, endpoint security, Louis Columbus' blog, machine learning, MobileIron, Symantec, Zero Trust Framework, Zero Trust Security

« PreviousNext »

feed mail facebook twitter linkedin

EI Tweets

My Tweets

Popular Posts

  • 2021 Roundup Of AI And Machine Learning Market Forecasts Show Strong Growth
  • Process Engine + Social Media -> Thingamy & ESME
  • A Conversation with Andrew McAfee
  • The Marginal Cost of Software
  • There Are No Stars On A Failed Project!
  • Software: Maintenance Revenue: High Margin or High Risk?
  • Google’s Woes and the Right to Be Pixilated
  • Getting chatbot fatigue? Then upgrade to digital associates...

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos