Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Cyber Resilience
The 4 Mindset Shifts Required to Secure the Cloud
Read the four key mindset shifts that organizations must make when securing the cloud.
ESG Research: How Small and Midsize Enterprises Can Fix Breach Unpreparedness
Get insight from analyst firm ESG research findings on where small and midsize businesses stand on Zero Trust and segmentation progress.
Why Traditional Security Approaches Don't Work in the Cloud
Erika Bagby, Illumio's principal product marketing manager discusses cloud security vs. traditional security and why it doesn’t work in the cloud environment.
Building Cyber Resilience? Use the MITRE ATT&CK Framework as Your North Star
Learn from blue team expert Nick Carstensen about how the MITRE ATT&CK framework can help guide your organization towards building cyber resilience.
How to Secure Against the New TCP Port 135 Security Vulnerability
A way to exploit TCP port 135 to execute remote commands introduced a port 445 vulnerability, making it necessary to secure port 135 to ensure TCP security.
Giving The Gift Your IT Security Team Deserves This Holiday Season
Learn how to prepare your business for bad actors' harvest time – the holiday season.
Refocus on Cyber Resilience: 3 Best Practices for Improving Your Cyber Resilience
Learn how cyber resilience can help in the unfortunate situation that an active breach is detected on your network.
Telhio Drives Growth and Builds Cyber Resilience With Illumio
Who likes mergers and acquisitions? Not cybersecurity professionals. For them, these deals add complexity almost overnight: new networks, new applications, and new requirements for security training.
Cyber Resilience, CISA’s Strategic Plan, and Zero Trust Segmentation Proof
For CISA, Zero Trust security is key to achieving its cybersecurity strategies and meeting its goals for Cyber Resilience.
3 Challenges Federal Agencies Face When Implementing Modern Cybersecurity
The U.S. federal government collects the personal information of almost every citizen. And federal agencies hold valuable data, some of which could put the country in danger if it was released.
How to Strengthen Your Security Posture
Organizations are quickly adopting a Zero Trust security strategy, operating as if they have already been breached and taking steps to inhibit bad actors from spreading throughout their network.
Cyber Resilience: The Banking Sector’s Top Security Priority
In this December 2021 speech, Bo Li, Deputy Managing Director of the International Monetary Fund (IMF), reinforced how digital technology permeates all aspects of society, increasing our dependency on interconnectivity and reliance on the networks that support it.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?