• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Security

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

Dissecting The SolarWinds Hack For Greater Insights With A Cybersecurity Evangelist

By Louis Columbus on January 4, 2021

Bottom Line: Cyberattacks enter a new era of lethal impact when threat actors are sophisticated enough to compromise SolarWind’s software supply chain with infected binary code while mimicking legitimate protocol traffic to avoid detection. To gain greater insights into the SolarWinds breach, its implications on cybersecurity strategy in the future and what steps enterprises need […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Cybersecurity and Infrastructure Security Agency's (CISA) Alert AA20-352A, FireEye, Identity and Access Management (IAM), Louis Columbus' blog, microsoft, National Institute of Standards and Technology (NIST) Special Publication 800-53, SolarWinds, SolarWinds breach, Zero Trust Security | Leave a response

5 Ways Machine Learning Can Thwart Phishing Attacks

5 Ways Machine Learning Can Thwart Phishing Attacks

By Louis Columbus on August 23, 2020

Global mobile phishing attempts surged by 37% amid shift to work-from-home for the thousands of businesses needing to adhere to shelter-in-place directives. According to Verizon, over 90% of breaches start with a phishing attack and with more than 60% of emails being read on mobile, mobile phishing is one of the fastest-growing threat categories in […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged CISO, cybersecurity, google, Louis Columbus' blog, Machine Learning for Cybersecurity, microsoft, MobileIron Mobile Threat Defense, phishing, Stanford Institute for Economic Policy Research (SIEPR), Verizon’s Mobile Security Index 2020, Zero Trust Security

Why Security Needs To Be Integral To DevOps

Why Security Needs To Be Integral To DevOps

By Louis Columbus on July 27, 2020

Bottom Line: DevOps and security teams need to leave one-time gating inspections in the past and pursue a more collaborative real-time framework to achieve their shared compliance, security and time-to-market goals. Shorter product lifecycles the need to out-innovate competitors and exceed customer expectations with each new release are a few of the many reasons why […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Application Security Testing (AST), BMC ADE, CheckMarx, cybersecurity, dev/ops, DevSecOps Global Skills survey, engineering, Louis Columbus' blog, Software Development Lifecycle (SDLC), Zero Trust Security

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

5 Mistakes That Threaten Infrastructure Cybersecurity And Resilience

By Louis Columbus on July 12, 2020

Bottom line: With many IT budgets under scrutiny, cybersecurity teams are expected to do more with less, prioritizing spending that delivers the greatest ROI while avoiding the top five mistakes that threaten their infrastructures. In a rush to reduce budgets and spending, cybersecurity teams and the CISOs that lead them need to avoid the mistakes […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, endpoint security, Louis Columbus' blog, Machine Learning in Cybersecurity, MFA, Multifactor authentication, Privileged Access Management, Zero Trust Security

How To Build A Business Case For Endpoint Security

How To Build A Business Case For Endpoint Security

By Louis Columbus on June 6, 2020

Bottom Line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach. Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged absolute software, cybersecurity, Gartner cybersecurity, Gartner ISM, Kount, Louis Columbus' blog, microsoft, pandemic, RSA Conference 2020, SIEM, Zero Trust Security

Protecting Privileged Identities In A Post-COVID-19 World

Protecting Privileged Identities In A Post-COVID-19 World

By Louis Columbus on May 17, 2020

    Bottom Line: Every organization needs to digitally reinvent their business, starting at the system level to safely sell and serve customers with minimal physical interaction. The hard reset every business is going through creates a strong sense of urgency to increase the agility, speed, and scale of selling, as well as customer service […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, Centrify Identity Access Management, centrify privileged access management, Cloud, cybersecurity, Cybersecurity in a COVID-19 World, Cybersecurity strategy, dev/ops, Identity Acess Management, Louis Columbus' blog, microservices, Privivleged Access Management, Protecting Privileged Access Credentials, Securing infrastructure, Zero Trust Security, ZTS

Machines Protecting Themselves Is The Future Of Cybersecurity

Machines Protecting Themselves Is The Future Of Cybersecurity

By Louis Columbus on April 22, 2020

Bottom Line: Existing approaches to securing IT infrastructure are proving unreliable as social engineering and breach attempts succeed in misdirecting human responses to cyber threats, accentuating the need for machines to protect themselves. Any nations’ digital infrastructure and the businesses it supports are its most vital technology resources, as the COVID-19 pandemic makes clear. Cybercriminal […]

Posted in Business, Featured Posts, Startup Lessons, Technology / Software, Trends & Concepts | Tagged Centrify, COVID-19 cyberattacks, Cyberattacks, cybersecurity, Louis Columbus' blog, National Cyber Security Centre (NCSC), NIST Zero Trust Special Publication 800-207, United States Department of Homeland Security (DHS), Zero Trust Security

Access control. Fingerprint security. Cybersecurity and information technology. Blue, red background with digital integrated network technology. Printed circuit board. Technology background.

Why Your Biometrics Are Your Best Password

By Louis Columbus on March 18, 2020

Bottom Line: Biometrics are proving to be better than passwords because they’re easier to use, provide greater privacy and security, and are gaining standardization across a broad base of mobile, desktop, and server devices that users rely on to access online services. In keeping with the theme of this year’s RSA Conference of Human Element, […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Apple Biometrics, Apple Face ID, Apple’s Touch ID, Biometrics, Centrify, Entrust Datacard, FIDO2, HID Global, Idaptive, ImageWare, Louis Columbus' blog, microsoft, MobileIron, Passwordless authentication, passwords, RSA Conference, Thales, Windows Hello, Zero Trust Security

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

How To Excel At Secured Cloud Migrations With A Shared Responsibility Model

By Louis Columbus on November 30, 2019

60% of security and IT professionals state that security is the leading challenge with cloud migrations, despite not being clear about who is responsible for securing cloud environments. 71% understand that controlling privileged access to cloud service administrative accounts is a critical concern, yet only 53% cite secure access to cloud workloads as a key […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, AWS Shared Responsibility Model, Centrify, centrify privileged access management, cybersecurity, Louis Columbus' blog, Privileged Access Management, Shared Responsibility Model, Zero Trust Privilege, Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

Next »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • How a time clock system enhances remote employee management
  • Here’s why HR software is important for your organization
  • The year in stats: the data we loved in 2020

EI Tweets

My Tweets

Popular Posts

  • Top 10 Tech Job Skills Predicted To Grow The Fastest In 2021
  • 76% Of Enterprises Prioritize AI & Machine Learning In 2021 IT Budgets
  • CRM Watchlist 2022: Yes, the Watchlist is back
  • Virtual conference best practices: 2020 in review
  • Three types of GUIs - past, present and the future
  • UiPath will finally find its true path as IPO beckons. Now can its leadership develop some humility to embrace this incredible opportunity?
  • Partner Post: How AI, BI, and DevOps will shape businesses in 2021
  • Beyond The Three V’s of Big Data – Viscosity and Virality

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: