• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust

The Top 20 Cybersecurity Startups To Watch In 2021

The Top 20 Cybersecurity Startups To Watch In 2021

By Louis Columbus on March 27, 2021

Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged cybersecurity, cybersecurity startups, Cybersecurity strategy, Louis Columbus' blog, startups to watch in 2021, Zero Trust, Zero Trust Security | 1 Response

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

By Louis Columbus on March 23, 2021

Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.  There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Chief information officer, Chief Information Security Officer, CISO, Endpoint resilience, endpoint security, enterprise software, Lenovo, Lenovo X1 Carbon laptop, Louis Columbus' blog, Zero Trust, Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

Passwords Are The Weakest Defense In A Zero Trust World

Passwords Are The Weakest Defense In A Zero Trust World

By Louis Columbus on July 22, 2019

90% of security professionals have witnessed security incidents stemming from the theft of credentials, according to a recent MobileIron study conducted by IDG. 86% of CIO, CISO and Security VPs would abandon password authentication if they could. Another survey by EMA found that mobile devices secured by biometric authentication methods present the best option for […]

Posted in Featured Posts, Technology / Software | Tagged Centrify, cybersecurity, Louis Columbus' blog, MobileIron, Zero Trust, Zero Trust Security

CIO's Guide To Stopping Privileged Access Abuse - Part 2

CIO’s Guide To Stopping Privileged Access Abuse – Part 2

By Louis Columbus on May 3, 2019

Why CIOs Are Prioritizing Privileged Credential Abuse Now Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse. Based […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise software, Gartner Top 10 Security Projects for 2018, Louis Columbus' blog, Privileged Access Abuse, Privileged Access Management, Privileged Credential Abuse, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

How To Protect Healthcare Records In A Zero Trust World

How To Protect Healthcare Records In A Zero Trust World

By Louis Columbus on December 27, 2018

There’s been a staggering 298.4% growth in the reported number of patient records breached as a result of insider-wrongdoing this year alone according to Protenus. The total disclosed number of breached patient records has soared from 1.1M in Q1 2018 to 4.4M in Q3 2018 alone, 680K of which were breached by insiders. There were 117 disclosed health […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, healthcare breaches Protenus Breach Barometer, Idaptive, Louis Columbus, privileged access credentials, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTP. ZTS

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Three key aspects of becoming a successful staffing agency
  • App Spotlight: Commercient File SYNC for Zoho CRM
  • 8 questions to ask while evaluating marketing automation software
  • Planned India Datacenter Maintenance on 15th and 22nd May, 2022 from 07:00 AM to 10:00 AM IST
  • Introducing Zoho Campaigns’ exclusive edition for marketing agencies
  • Customer spotlight: FANDELI enables departmental analytics and increases productivity with Zoho Analytics
  • Zoho Campaigns introduces 6 more languages for email marketers
  • App Spotlight: Google Routes for Zoho CRM
  • 5 tips to build your next employee management strategy
  • Zoho Creator’s global Roadshow 2022
  • Expand your talent pool by targeting active and passive candidates
  • Extend remote support beyond your computer screen: Introducing augmented reality remote assistance!
  • 5 simple ways to keep your remote workforce motivated
  • View all your apps in one place with Zoho SalesIQ
  • 6 important trends in marketing automation for 2022

EI Tweets

My Tweets

Popular Posts

  • 10 Charts That Will Change Your Perspective Of Microsoft Azure’s Growth
  • Three types of GUIs - past, present and the future
  • Google’s Woes and the Right to Be Pixilated
  • Which ERP Systems Are Most Popular With Their Users In 2021?
  • News Analysis: Infor’s Cloud Strategy Goes Azure With Infor24
  • A Memo regarding Corporate Social Media policies
  • The Top 10 Trends for 2010 in Analytics, Business Intelligence, and Performance Management
  • Strategy, Business Model, and Who's Your Customer

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: