recentpopularlog in

jonerp : 2018   8

CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
Monday’s Musings: What’s Up With Big Tech Stocks? The Insider View For 2019
"Algo’s have been reset so the markets are operating on different rules and that model will be reset again soon. Why Big Tech? They play in a winner takes all market. Apple and Google provide 99% of all the consumer software in the US. Facebook, Google, and Amazon drive almost 63% of all advertising dollars
Tech is still strong with 20 to 40% growth. Investors will find it hard to find other asset allocation classes this good and this dominant."
business  featured  posts  technology  software  $appl  $goog  $nflx  $tsla  018  2018  2019  adbe 
december 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
Analytics Are Empowering Next-Gen Access And Zero Trust Security
"Machine learning-based NGA platforms including Centrify calculate a risk score that quantifies the relative level of trust based on every access attempt across an IT infrastructure. NGA platforms rely on machine learning algorithms to continuously learn and generate contextual intelligence that is used to streamline verified user’s access while thwarting many potential threats ― the most common of which is compromised credentials. IT security teams can combine the insights gained from machine learning, user profiles, and contextual intelligence to fine-tune the variables and attributes that calculate risk scores using cloud-enabled analytics services.
business  featured  posts  technology  software  byline=louis  columbus  centrify  analytics  service  next-gen  access  nga  verizon  mobile  security  index  2018  report  zero  trust 
july 2018 by jonerp
What’s Missing From Gartner’s 2018 Magic Quadrant For CPQ
"Magic quadrants and market analysis grids are designed to guide enterprise buyers to the best possible technologies for their needs. The recently published Gartner Magic Quadrant for Configure, Price, and Quote (CPQ) Application Suites, 2018 (client access reqd.) doesn’t address the most challenging problem enterprises face making CPQ strategies work, which is enterprise-wide systems integration. Members of the CPQ vendor landscape are growing complacent and need to intensify innovation efforts too."
business  featured  posts  technology  software  2018  and  quote  (cpq)  application  suites  byline=louis  columbus  configure  cpq  crm  gartner  magic  quadrant  for 
april 2018 by jonerp
As marketing data proliferates, consumers should have more control
"As one journalist pointed out in the press event, this level of detail from the hotel is not something that would thrill him (beyond the electronic check-in). Yet there doesn’t seem to be a way to opt out of that data (unless you live in the EU and will be subject to GDPR rules"
cloud  enterprise  adobe  summit  2018  customer  experience  management  data  privacy  marketing 
april 2018 by jonerp
Digital Trends 2018
"Digital transformation, then, is driving business change and technology innovation. Over the past few years, several technology trends have emerged or accelerated as a result of the modernization needs of businesses. For 2018, G2 Crowd research is tracking a list of these tech trends, and we’ve identified four broad technology areas that serve as the anchors or framework for ongoing analysis of technology trends, and their impact on modernizing businesses.

These technology anchors are:

AI
IoT
Cybersecurity
Digital Platforms"
featured  posts  technology  software  trends  &  concepts  2018  ai  analysis  artificial  intelligence  business  model  models  modernization  change 
february 2018 by jonerp

Copy this bookmark:





to read