Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Cyber Resilience
Dispelling Host-Based Security Myths in Asia Pacific
Learn how Zero Trust focused host-based micro-segmentation solutions can boost your security practices in APAC and throughout the world.
Understanding EU Compliance Mandates
A compliance mandate provides a baseline level of security, or a general improvement in posture, and the ability to evaluate it reliably.
Optimising your Essential Eight Vulnerability Management Efforts
Disparate interconnected systems and now remote employees across the globe increase our exposure and opportunity for cybercrime.
Cyber Risks and Reliefs of Sheltering in Place
Cyber risks, remote work cybersecurity and home network security have all been called into question with the movement toward working from home.
Customer Perspective: Budget Allocation and Security Fears for 2020
Thought leaders at some of the top global enterprises weigh in on budget allocation for 2020 and the looming threats that keep them up at night.
3 Cybersecurity Predictions for 2020
Insights regarding the convergence of physical infiltration with cyberattacks and what that means for cybersecurity.
Cyber Monday: Are Your Situational Crown Jewels Protected This Holiday Season?
Proper protection is not fleeting like the Starbucks holiday product glossary. Good security should be baked in and accounted for all year round.
What Common Criteria Is and How to Get Certified
Illumio Core achieved another important government security certification called Common Criteria. Illumio became the first enterprise security vendor to be certified with National Information Assurance Partnership (NIAP)
Protecting Crown Jewel Assets: What's Your Action Plan?
How do you build a solid business case and a practical plan of action to secure your 'crown jewels' and avoid the unthinkable?
How To Mitigate Risk In A Flat Network — An Attacker's Paradise
Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain.
Assume Breach: Best Practices in Cyber Resilience
To assume breach means taking on an adversary mindset. Here’s what that means for how you think about security investments in people, processes, and technology.
More Steph Curry Enterprise Security Lessons: When Something Goes Wrong
Security teams have to make decisions like this on the fly all the time, and the more data they have access to about the situation, the better decisions they can make.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?