• Home
  • Blog
  • Who We Are
  • Contact
  • Sponsors
Enterprise Irregulars
Smart Thinking for the Smart Enterprise
  • Featured Posts
  • Business
  • Technology / Software
  • Trends & Concepts
  • Startup Lessons

Zero Trust Security

7 Signs It’s Time To Get Focused On Zero Trust

7 Signs It’s Time To Get Focused On Zero Trust

By Louis Columbus on November 29, 2019

When an experienced hacker can gain access to a company’s accounting and financial systems in 7 minutes or less after obtaining privileged access credentials, according to Ponemon, it’s time to get focused on Zero Trust Security. 2019 is on its way to being a record year for ransomware attacks, which grew 118% in Q1 of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Breach, Breaches, Centrify, cybersecurity, hackers, Louis Columbus' blog, passwords, Privileged Access Management, Zero Trust, Zero Trust Privilege, Zero Trust Security, ZTS

What’s New On The Zero Trust Security Landscape In 2019

What’s New On The Zero Trust Security Landscape In 2019

By Louis Columbus on November 27, 2019

Forrester added in Checkpoint, Forescout, Google, illumio, MobileIron, Proofpoint, Symantec, and Unisys in their latest Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers this year. Forrester’s 2019 scorecard increased the weight on network security, automation and orchestration, and portfolio growth rate compared to last year, adding in Zero Trust eXtended (ZTX) ecosystem advocacy to the […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Cybersecurity Forrester Wave™: Zero Trust eXtended Ecosystem Platform Providers, Louis Columbus' blog, Mobile Security, MobileIron, mobility, Q4 2019, Zero Trust Security

10 Charts That Will Change Your Perspective Of AI In Security

10 Charts That Will Change Your Perspective Of AI In Security

By Louis Columbus on November 24, 2019

Rapid advances in AI and machine learning are defining cybersecurity’s future daily. Identities are the new security perimeter and Zero Trust Security frameworks are capitalizing on AI’s insights to thwart breaches in milliseconds. Advances in AI and machine learning are also driving the transformation of endpoint security toward greater accuracy and contextually intelligence. 69% of […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged AI, AI CyberSecurity, Artificial intelligence, Cyberattacks, cybersecurity, fraud detection, Louis Columbus' blog, machine learning security, Zero Trust Security

Shot of coworkers using their digital devices in synchronicityhttp://195.154.178.81/DATA/i_collage/pi/shoots/805355.jpg

Financial Services Rely On BYOD – How Do They Stay Secure?

By Louis Columbus on November 13, 2019

Bottom Line: 2020 is going to be the year companies launch more digital business initiatives that depend on BYOD than ever before, making Zero Trust Security a key contributor to their success. Financial Services firms are at an inflection point going into 2020. Mobile-first products and services now dominate their product roadmaps for next year, with […]

Posted in Featured Posts, Technology / Software | Tagged BYOD, cybersecurity, Financial services, Louis Columbus' blog, MobileIron, Zero Trust Security, Zero Trust Zero Trust Framework

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

Securing Multi-Cloud Manufacturing Systems In A Zero Trust World

By Louis Columbus on November 11, 2019

Bottom Line: Private equity firms are snapping up manufacturing companies at a quick pace, setting off a merger and acquisition gold rush, while leaving multi-cloud manufacturing systems unprotected in a Zero Trust world. Securing the Manufacturing Gold Rush of 2019 The intensity private equity (PE) firms have for acquiring and aggregating manufacturing businesses is creating […]

Posted in Featured Posts, Technology / Software | Tagged Centrify, cybersecurity, Enterprise resource planning, erp, Louis Columbus' blog, Manufacturing, Private Equity Firms, PWC, Zero Trust Privilege, Zero Trust Security

10 Ways AI And Machine Learning Are Improving Endpoint Security

10 Ways AI And Machine Learning Are Improving Endpoint Security

By Louis Columbus on October 5, 2019

 Gartner predicts $137.4B will be spent on Information Security and Risk Management in 2019, increasing to $175.5B in 2023, reaching a CAGR of 9.1%. Cloud Security, Data Security, and Infrastructure Protection are the fastest-growing areas of security spending through 2023.  69% of enterprise executives believe artificial intelligence (AI) will be necessary to respond to cyberattacks […]

Posted in Business, Featured Posts, Technology / Software | Tagged Absolute Endpoint Security, absolute software, AI, cybersecurity, endpoint security, Louis Columbus' blog, machine learning, MobileIron, Symantec, Zero Trust Framework, Zero Trust Security

Mobile Identity Is The New Security Perimeter

Mobile Identity Is The New Security Perimeter

By Louis Columbus on September 2, 2019

86% of enterprise executives say that mobile threats are growing faster than any other according to Verizon’s Mobile Security Index 2019 and 67% of enterprise execs are less confident about the security of their mobile devices compared to other IT assets. Mobile devices are hackers’ favorite platform to target, with over 905,000 malware packages installed in Q1 […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged cybersecurity, Louis Columbus' blog, MobileIron, Smartphones, zero trust network, Zero Trust Security

The Truth About Privileged Access Security On AWS And Other Public Clouds

The Truth About Privileged Access Security On AWS And Other Public Clouds

By Louis Columbus on August 25, 2019

Bottom Line: Amazon’s Identity and Access Management (IAM) centralizes identity roles, policies and Config Rules yet doesn’t go far enough to provide a Zero Trust-based approach to Privileged Access Management (PAM) that enterprises need today. AWS provides a baseline level of support for Identity and Access Management at no charge as part of their AWS instances, as do […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Amazon Web Services, aws, aws cybersecurity, AWS Security, Centrify, cybersecurity, Louis Columbus' blog, Zero Trust Privilege, Zero Trust Security

Your Mobile Phone Is Your Identity. How Do You Protect It?

Your Mobile Phone Is Your Identity. How Do You Protect It?

By Louis Columbus on August 10, 2019

The average cost of a data breach has risen 12% over the past 5 years and is now $3.92M. U.S.-based breaches average $8.19M in losses, leading all nations. Not integrating mobile phone platforms and protecting them with a Zero Trust Security framework can add up to $240K to the cost of a breach. Companies that […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged Centrify, cybersecurity, Louis Columbus' blog, MobileIron, Zero Trust Privilege, Zero Trust Security

Black keyboard where the enter key is glowing red showing the word ransomware cybersecurity concept 3D illustration

How To Deal With Ransomware In A Zero Trust World

By Louis Columbus on August 9, 2019

Lake City, Florida’s city government paid ransomware attackers about $530,000 or 42 Bitcoins, to restore access to systems and data last month. The City of Riviera Beach, Florida, paid ransomware attackers about $600,000 to regain access to their systems last month. Earlier this month, LaPorte County, Indiana paid over $130,000 worth of Bitcoins to ransomware […]

Posted in Business, Featured Posts, Technology / Software, Trends & Concepts | Tagged centrify privileged access management, cybersecurity, Louis Columbus' blog, Zero Trust Privilege, Zero Trust Security

« PreviousNext »

feed mail facebook twitter linkedin

Partner Posts

zoho logo
  • How organizations can celebrate Employee Appreciation Day virtually
  • Does payroll processing fall under the HR department?
  • Introducing Pop-Ups and Banners in PageSense
  • Zoho Recruit – The G2 Chartbuster
  • The Periodic Table of Marketing Extensions
  • 11 Email marketing best practices for 2021
  • Popular software systems used by HR professionals
  • Why choose TransMail for your transactional emails?
  • Are Tuesdays really the best days to send emails?
  • 7 ways to manage team inboxes like a pro
  • Remove unnecessary error lines and improve language skills? We did both.
  • Top trends that will shape the global workforce in 2021
  • 7 ways to strengthen your relationship with your customer
  • How digital marketers intend to optimize email marketing in 2021

EI Tweets

My Tweets

Popular Posts

  • Securing Machine Identities Needs To Be A Top Cybersecurity Goal In 2021
  • 10 Charts That Will Change Your Perspective Of Microsoft Azure’s Growth
  • Workday and Peakon. My take.
  • Three types of GUIs - past, present and the future
  • Strategy, Business Model, and Who's Your Customer
  • 10 Ways People Find Relevant Information
  • 10 Ways AI Is Improving Cannabis Yields And Security
  • A Memo regarding Corporate Social Media policies

Archives

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Authors

  • Anshu Sharma
  • Bob Warfield
  • Brian Sommer
  • Dave Kellogg
  • David Terrar
  • Denis Pombriant
  • Dion Hinchcliffe
  • Esteban Kolsky
  • Evangelos Simoudis
  • James Governor
  • Jason Corsello
  • Jason M. Lemkin
  • Louis Columbus
  • Michael Krigsman
  • Naomi Bloom
  • Paul Greenberg
  • Phil Fersht
  • R "Ray" Wang
  • Raju Vegesna
  • Ross Mayfield
  • Sameer Patel
  • Sandy Kemsley
  • Susan Scrupski
  • Thomas Otter
  • Tom Raftery
  • Vijay Vijayasankar
  • Vinnie Mirchandani
  • Zoli Erdos
Sponsored by: