• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Security

The Top 20 Cybersecurity Startups To Watch In 2021

The Top 20 Cybersecurity Startups To Watch In 2021

By Louis Columbus on March 27, 2021

Cybersecurity, privacy and security startups have raised $1.9 billion in three months this year, on pace to reach $7.6 billion or more in 2021, over four times more than was raised throughout 2010 ($1.7 billion), according to a Crunchbase Pro query today. 22,156 startups who either compete in or rely on cybersecurity, security and privacy […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged cybersecurity, cybersecurity startups, Cybersecurity strategy, Louis Columbus' blog, startups to watch in 2021, Zero Trust, Zero Trust Security | Leave a response

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

What Enterprises Need to Plan for In 2021 When It Comes to Endpoint Security

By Louis Columbus on March 23, 2021

Bottom Line: Today’s largely-distributed enterprises need to make sure they are putting endpoint security first in 2021– which includes closely managing every stage of the device lifecycle, from deployment to decommission, and ensuring all sensitive data remains protected.  There’s a looming paradox facing nearly every organization today of how they’ll secure thousands of remote endpoints […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Chief information officer, Chief Information Security Officer, CISO, Endpoint resilience, endpoint security, enterprise software, Lenovo, Lenovo X1 Carbon laptop, Louis Columbus' blog, Zero Trust, Zero Trust Security | Leave a response

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

The Pandemic Is Teaching Enterprises How To Mind The Cybersecurity Gap

By Louis Columbus on March 21, 2021

30% of US and UK remote workers say their organizations don’t require them to use a secure access tool, including VPN, to log into corporate databases and systems, according to Ivanti’s 2021 Secure Consumer Cyber Report. Plus, 25% of remote workers in the US and UK aren’t required to have specific security software running on […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Apple's Face ID, CISOs, cybersecurity, Ivanti, Louis Columbus' blog, Unified Endpoint Management, VPN, Zero Sign-On (ZSO), Zero Trust Security | Leave a response

Coronavirus vaccines on the production line

10 Ways Cybersecurity Can Protect COVID-19 Vaccine Supply Chains

By Louis Columbus on March 14, 2021

The Pharma industry has lost $14 billion through Intellectual Property (IP) cyber theft worldwide much of it focused on vaccine development, according to the United Kingdom Office of Cyber Security and Information Assurance. 53% of pharmaceutical IP thefts and related breaches are carried out by someone with insider access also according to the United Kingdom […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, Artificial intelligence, Centrify, COVID-19 vaccine supply chain, COVID-19 vaccines, cybersecurity, Cybersecurity & Infrastructure Security Agency (CISA), Illumio, Ivanti, LogicMonitor, Louis Columbus' blog, machine learning, Multi-Factor Authentication, U.S. Homeland Security, Unified Endpoint Management, Zero Trust Security

High quality 3D rendered image, perfectly usable for topics related to big data, global networks, international flight routes or the spread of a pandemic / computer virus.
Textures courtesy of NASA:
https://visibleearth.nasa.gov/images/55167/earths-city-lights,
https://visibleearth.nasa.gov/images/73934/topography

Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021

By Louis Columbus on February 28, 2021

Bottom Line:  Bad actors quickly capitalize on the wide gaps in machine identity security, creating one of the most breachable threat surfaces today. Why Machines Are the Most Challenging Threat Surface To Protect Forrester’s recent webinar on the topic, How To Secure And Govern Non-Human Identities, estimates that machine identities (including bots, robots and IoT) are growing […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, centrify privileged access management, cybersecurity, Forrester, Identity Access Management (IAM), Kount's 2020 Bot Landscape and Impact Report, LogicMonitor, Louis Columbus' blog, Microsoft Active Directory, Privileged Access Management (PAM), Secured-Sockets Layer (SSL), Zero Trust Security

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

By Louis Columbus on January 4, 2021

Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Cybersecurity and Infrastructure Security Agency's (CISA) Alert AA20-352A, FireEye, Identity and Access Management (IAM), Louis Columbus' blog, microsoft, National Institute of Standards and Technology (NIST) Special Publication 800-53, SolarWinds, SolarWinds breach, Zero Trust Security

5 Ways Machine Learning Can Thwart Phishing Attacks

5 Ways Machine Learning Can Thwart Phishing Attacks

By Louis Columbus on August 23, 2020

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged CISO, cybersecurity, google, Louis Columbus' blog, Machine Learning for Cybersecurity, microsoft, MobileIron Mobile Threat Defense, phishing, Stanford Institute for Economic Policy Research (SIEPR), Verizon’s Mobile Security Index 2020, Zero Trust Security

Why Security Needs To Be Integral To DevOps

Why Security Needs To Be Integral To DevOps

By Louis Columbus on July 27, 2020

Bottom Line: DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals. Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Application Security Testing (AST), BMC ADE, CheckMarx, cybersecurity, dev/ops, DevSecOps Global Skills survey, engineering, Louis Columbus' blog, Software Development Lifecycle (SDLC), Zero Trust Security

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

By Louis Columbus on July 12, 2020

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, endpoint security, Louis Columbus' blog, Machine Learning in Cybersecurity, MFA, Multifactor authentication, Privileged Access Management, Zero Trust Security

How To Build A Business Case For Endpoint Security

How To Build A Business Case For Endpoint Security

By Louis Columbus on June 6, 2020

Bottom Line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach. Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, cybersecurity, Gartner cybersecurity, Gartner ISM, Kount, Louis Columbus' blog, microsoft, pandemic, RSA Conference 2020, SIEM, Zero Trust Security

Next »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • Introducing Zoho Meeting’s Interactive Webinar User Interface!
  • Top 5 HR strategies for small businesses
  • Work smarter with these intelligent features in Zoho Projects
  • How to promote gender equality in your organization
  • How Show’s industry-specific templates simplify business presentations
  • Introducing Custom Portals in Zoho Recruit
  • ProTips: 5 no-brainer ways to improve business sales calls
  • Say goodbye to endless CCs and BCCs and hello to a shared inbox
  • Password security 101: Why you need a password manager and how to select one

EI Tweets

My Tweets

Popular Posts

  • The Top 20 Cybersecurity Startups To Watch In 2021
  • The Top 20 Machine Learning Startups To Watch In 2021
  • 10 Ways People Find Relevant Information
  • Lego, enterprise architecture and the job advert.
  • Google’s Woes and the Right to Be Pixilated
  • Three types of GUIs - past, present and the future
  • The Marginal Cost of Software
  • A Memo regarding Corporate Social Media policies

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: