• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Privilege

How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches

How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches

By Louis Columbus on June 14, 2019

Energy, Technology & Finance are the most mature industries when it comes to Privileged Access Management (PAM) adoption and uses, outscoring peer industries by a wide margin. 58% of organizations do not use Multi-Factor Authentication (MFA) for privileged administrative access to servers, leaving their IT systems and infrastructure exposed to hacking attempts, including unchallenged privileged […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify 2019 Zero Trust Privilege Maturity Model Report, Louis Columbus' blog, PAM, Privileged Access Credential Abuse, privileged access credentials, Privileged Access Management, Zero Trust Privilege, Zero Trust Security

How to Improve Privileged User's Security Experiences With Machine Learning

How to Improve Privileged User’s Security Experiences With Machine Learning

By Louis Columbus on May 30, 2019

Bottom Line: One of the primary factors motivating employees to sacrifice security for speed are the many frustrations they face, attempting to re-authenticate who they are so they can get more work done and achieve greater productivity. How Bad Security Experiences Lead to a Breach Every business is facing the paradox of hardening security without sacrificing […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Louis Columbus' blog, machine learning, Zero Trust Privilege, Zero Trust Security, ZTP, ZTS

How To Improve Supply Chains With Machine Learning: 10 Proven Ways

How To Improve Supply Chains With Machine Learning: 10 Proven Ways

By Louis Columbus on May 20, 2019

Bottom line: Enterprises are attaining double-digit improvements in forecast error rates, demand planning productivity, cost reductions and on-time shipments using machine learning today, revolutionizing supply chain management in the process. Machine learning algorithms and the models they’re based on excel at finding anomalies, patterns and predictive insights in large data sets. Many supply chain challenges are […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged analytics, Artificial intelligence, Centrify, erp, Infor, Inspectorio, Louis Columbus' blog, machine learning, sap, Supplier relationship management, supply chain management, Supply Chains, Zero Trust Privilege

How To Secure Mobile Devices In A Zero Trust World

How To Secure Mobile Devices In A Zero Trust World

By Louis Columbus on May 13, 2019

86% of enterprises are seeing mobile threats growing the fastest this year, outpacing other threat types. 48% say they’ve sacrificed security to “get the job done” up from 32% last year. 41% of those affected say the compromise is having major with lasting repercussions and 43% said that their efforts to remediate the attacks were […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Forrester Zero Trust Framework, Identity Access Management, Louis Columbus' blog, machine learning, MobileIron, security, Verizon, Verizon Mobile Security Index, Zero Sign-On, Zero Trust Framework, Zero Trust Privilege, Zero Trust Security

CIO's Guide To Stopping Privileged Access Abuse - Part 2

CIO’s Guide To Stopping Privileged Access Abuse – Part 2

By Louis Columbus on May 3, 2019

Why CIOs Are Prioritizing Privileged Credential Abuse Now Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse. Based […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, enterprise software, Gartner Top 10 Security Projects for 2018, Louis Columbus' blog, Privileged Access Abuse, Privileged Access Management, Privileged Credential Abuse, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

CIO's Guide To Stopping Privileged Access Abuse - Part I

CIO’s Guide To Stopping Privileged Access Abuse – Part I

By Louis Columbus on April 21, 2019

CIOs face the paradox of having to protect their businesses while at the same time streamlining access to the information and systems their companies need to grow. The threatscape they’re facing requires an approach to security that is adaptive to the risk context of each access attempt across any threat surface, anytime. Using risk scores […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, gartner, Louis Columbus' blog, Privileged Access Management, Privileged Access Management in the Modern Threatscape, Privileged Credential Abuse, Zero Trust Privilege, Zero Trust Security

5 Things Every Executive Needs To Know About Identity And Access Management

5 Things Every Executive Needs To Know About Identity And Access Management

By Louis Columbus on April 6, 2019

For new digital business models to succeed, customers’ privacy preferences need to be secure, and that begins by treating every identity as a new security perimeter. Organizations need to recognize that perimeter-based security, which focuses on securing endpoints, firewalls, and networks, provides no protection against identity and credential-based threats. Until they start implementing identity-centric security […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Identity and Access Management, Louis Columbus' blog, MFA, Multi-Factor Authentication, PAM, Privileged Access Management, Zero Trust Privilege, Zero Trust Security

5 Ways To Demystify Zero Trust Security

5 Ways To Demystify Zero Trust Security

By Louis Columbus on March 24, 2019

Bottom Line: Instead of only relying on security vendors’ claims about Zero Trust, benchmark them on a series of five critical success factors instead, with customer results being key. Analytics, Zero Trust Dominated RSA Analytics dashboards dominated RSA from a visual standpoint, while Zero Trust Security reigned from an enterprise strategy one. Over 60 vendors claimed […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Akamai, Capgemini, Centrify, Cisco, Ledios Cyber, Louis Columbus' blog, microsoft, MobileIron, Palo Alto Networks, RSA Conference, Symantec, Trend Micro, Zero Trust Privilege, Zero Trust Security, ZTP

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock

74% Of Data Breaches Start With Privileged Credential Abuse

By Louis Columbus on March 5, 2019

Centrify’s survey shows organizations are granting too much trust and privilege, opening themselves up to potential internal and externally-driven breaches initiated with compromised privileged access credentials. Photo credit: iStock Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, IBM 2018 Data Breach Study, Louis Columbus' blog, Privileged Access Management in the Modern Threatscape Report, Privileged Credential Abuse, security, Zero Trust Privilege, Zero Trust Security, ZeroTrust, ZTP, ZTS

What IoT Leaders Do To Drive Greater Results

What IoT Leaders Do To Drive Greater Results

By Louis Columbus on February 24, 2019

IoT Leaders are achieving cost and revenue gains of at least 15% or more, while laggards see less than 5%. Pursuing 80% more IoT use cases compared to their peers, IoT Leaders are progressing faster down the learning curve of monetizing their application areas. IoT Leaders anticipate that their IoT use cases will boost their […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Internet of Things, IoT, Louis Columbus' blog, McKinsey, MobileIron, Zero Trust Privilege, Zero Trust Security

« PreviousNext »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Zoho Recruit + SkillSurvey: Better together
  • Zoho Show integrates with Zoho Sprints: Gather project insights through visually compelling reports
  • How organizations can celebrate Employee Appreciation Day virtually
  • Does payroll processing fall under the HR department?
  • Introducing Pop-Ups and Banners in PageSense
  • Zoho Recruit – The G2 Chartbuster
  • The Periodic Table of Marketing Extensions
  • 11 Email marketing best practices for 2021
  • Popular software systems used by HR professionals
  • Why choose TransMail for your transactional emails?
  • Are Tuesdays really the best days to send emails?
  • 7 ways to manage team inboxes like a pro
  • Remove unnecessary error lines and improve language skills? We did both.
  • Top trends that will shape the global workforce in 2021
  • 7 ways to strengthen your relationship with your customer

EI Tweets

My Tweets

Popular Posts

  • 10 Charts That Will Change Your Perspective Of Microsoft Azure’s Growth
  • 10 Ways People Find Relevant Information
  • Workday and Peakon. My take.
  • Strategy, Business Model, and Who's Your Customer
  • Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021
  • 76% Of Enterprises Prioritize AI & Machine Learning In 2021 IT Budgets
  • 10 Ways AI And Machine Learning Are Improving Marketing In 2021
  • Google’s Woes and the Right to Be Pixilated

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: