• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

ZTP

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

Machine Learning Is Helping To Stop Security Breaches With Threat Analytics

By Louis Columbus on June 23, 2019

Bottom Line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up. Separating Security Hacks Fact from Fiction It’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged cybersecurity, Louis Columbus' blog, Privileged Access Management, Verizon, Zero Trust Privilege, Zero Trust Security, ZTP, ZTS

How to Improve Privileged User's Security Experiences With Machine Learning

How to Improve Privileged User’s Security Experiences With Machine Learning

By Louis Columbus on May 30, 2019

Bottom Line: One of the primary factors motivating employees to sacrifice security for speed are the many frustrations they face, attempting to re-authenticate who they are so they can get more work done and achieve greater productivity. How Bad Security Experiences Lead to a Breach Every business is facing the paradox of hardening security without sacrificing […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Louis Columbus' blog, machine learning, Zero Trust Privilege, Zero Trust Security, ZTP, ZTS

5 Ways To Demystify Zero Trust Security

5 Ways To Demystify Zero Trust Security

By Louis Columbus on March 24, 2019

Bottom Line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key. Analytics, Zero Trust Dominated RSA Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Akamai, Capgemini, Centrify, Cisco, Ledios Cyber, Louis Columbus' blog, microsoft, MobileIron, Palo Alto Networks, RSA Conference, Symantec, Trend Micro, Zero Trust Privilege, Zero Trust Security, ZTP

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock

74% Of Data Breaches Start With Privileged Credential Abuse

By Louis Columbus on March 5, 2019

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, IBM 2018 Data Breach Study, Louis Columbus' blog, Privileged Access Management in the Modern Threatscape Report, Privileged Credential Abuse, security, Zero Trust Privilege, Zero Trust Security, ZeroTrust, ZTP, ZTS

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • App Spotlight: Yeaster P-Series for Zoho CRM
  • The Story and History behind CA Day Retold by Zoho Books
  • From homemaker to mompreneur: Bhavani’s digital transformation journey
  • 30 minutes is all you need. Change your business forever this MSME Day!
  • 5 ways to make your employees feel valued on their work anniversary
  • Notebook turns six
  • Simplifying your LinkedIn prospecting
  • SecurePass Email: confidential and password-protected email
  • Introducing Zoho Meeting’s Picture-in-Picture feature
  • Sales productivity tips and tools from experts to get more done in less time
  • Tapping into the contingent labor market
  • Democratize decision-making with powerful data storytelling  
  • 9 tips to boost sales for your business
  • Introducing WorkDrive 3.0: Enhanced collaboration. Improved accessibility: Part 2
  • Harmonizing Swiss payment transactions with the QR-bill

EI Tweets

My Tweets

Popular Posts

  • Monday’s Musings: The Controversy Surrounding Gartner’s CRM Market Share Analysis
  • Synchronicity
  • Top 10 Cybersecurity Companies To Watch In 2020
  • The Customer Acquisition Cost (CAC) Ratio: Another Subtle SaaS Metric
  • The Marginal Cost of Software
  • Influence and Business
  • Global Trade Increases Despite Inflation in China/Elsewhere -- Yet We Predict Reversal Later in 2011
  • Three types of GUIs - past, present and the future

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: