Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Cyber Resilience

The 4 Mindset Shifts Required to Secure the Cloud
Cyber Resilience

The 4 Mindset Shifts Required to Secure the Cloud

Read the four key mindset shifts that organizations must make when securing the cloud.

ESG Research: How Small and Midsize Enterprises Can Fix Breach Unpreparedness
Cyber Resilience

ESG Research: How Small and Midsize Enterprises Can Fix Breach Unpreparedness

Get insight from analyst firm ESG research findings on where small and midsize businesses stand on Zero Trust and segmentation progress.

Why Traditional Security Approaches Don't Work in the Cloud
Cyber Resilience

Why Traditional Security Approaches Don't Work in the Cloud

Erika Bagby, Illumio's principal product marketing manager discusses cloud security vs. traditional security and why it doesn’t work in the cloud environment.

Building Cyber Resilience? Use the MITRE ATT&CK Framework as Your North Star
Cyber Resilience

Building Cyber Resilience? Use the MITRE ATT&CK Framework as Your North Star

Learn from blue team expert Nick Carstensen about how the MITRE ATT&CK framework can help guide your organization towards building cyber resilience.

How to Secure Against the New TCP Port 135 Security Vulnerability
Cyber Resilience

How to Secure Against the New TCP Port 135 Security Vulnerability

A way to exploit TCP port 135 to execute remote commands introduced a port 445 vulnerability, making it necessary to secure port 135 to ensure TCP security.

Giving The Gift Your IT Security Team Deserves This Holiday Season
Cyber Resilience

Giving The Gift Your IT Security Team Deserves This Holiday Season

Learn how to prepare your business for bad actors' harvest time – the holiday season.

Refocus on Cyber Resilience: 3 Best Practices for Improving Your Cyber Resilience
Cyber Resilience

Refocus on Cyber Resilience: 3 Best Practices for Improving Your Cyber Resilience

Learn how cyber resilience can help in the unfortunate situation that an active breach is detected on your network.

Telhio Drives Growth and Builds Cyber Resilience With Illumio
Cyber Resilience

Telhio Drives Growth and Builds Cyber Resilience With Illumio

Who likes mergers and acquisitions? Not cybersecurity professionals. For them, these deals add complexity almost overnight: new networks, new applications, and new requirements for security training.

Cyber Resilience, CISA’s Strategic Plan, and Zero Trust Segmentation Proof
Cyber Resilience

Cyber Resilience, CISA’s Strategic Plan, and Zero Trust Segmentation Proof

For CISA, Zero Trust security is key to achieving its cybersecurity strategies and meeting its goals for Cyber Resilience.

3 Challenges Federal Agencies Face When Implementing Modern Cybersecurity
Cyber Resilience

3 Challenges Federal Agencies Face When Implementing Modern Cybersecurity

The U.S. federal government collects the personal information of almost every citizen. And federal agencies hold valuable data, some of which could put the country in danger if it was released.

How to Strengthen Your Security Posture
Cyber Resilience

How to Strengthen Your Security Posture

Organizations are quickly adopting a Zero Trust security strategy, operating as if they have already been breached and taking steps to inhibit bad actors from spreading throughout their network.

Cyber Resilience: The Banking Sector’s Top Security Priority
Cyber Resilience

Cyber Resilience: The Banking Sector’s Top Security Priority

In this December 2021 speech, Bo Li, Deputy Managing Director of the International Monetary Fund (IMF), reinforced how digital technology permeates all aspects of society, increasing our dependency on interconnectivity and reliance on the networks that support it.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?