Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Cyber Resilience

Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
Cyber Resilience

Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment

In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.

What Is a Domain Controller?
Cyber Resilience

What Is a Domain Controller?

A domain controller responds to security authentication requests and verifies users on the domain of a computer network. Here’s how it secures a network domain.

Understanding EU Compliance Mandates: Telecommunications-5G and Beyond
Cyber Resilience

Understanding EU Compliance Mandates: Telecommunications-5G and Beyond

In part 5 of this series, we explore the expanded attack surface 5G brings, along with the telecom compliance mandates that are rapidly evolving.

Understanding EU Compliance Mandates: GDPR, Cyber Essentials
Cyber Resilience

Understanding EU Compliance Mandates: GDPR, Cyber Essentials

GDPR primarily focuses on data protection, data handling, and privacy concerns for EU citizens’ Personally Identifiable Information (PII).

Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor
Cyber Resilience

Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor

Learn about an important step on your organization’s Zero Trust journey: Validate, Implement and Monitor.

Understanding EU Compliance Mandates Series: Financial Services
Cyber Resilience

Understanding EU Compliance Mandates Series: Financial Services

In Part 3 of this blog series, we explore EU regulations specific to financial services.

Operationalizing Zero Trust – Step 5: Design the Policy
Cyber Resilience

Operationalizing Zero Trust – Step 5: Design the Policy

Learn about an important step on your organization's Zero Trust journey; Design the policy.

Understanding EU Compliance Mandates: Operational Technology & Critical Systems
Cyber Resilience

Understanding EU Compliance Mandates: Operational Technology & Critical Systems

A discussion of the operational technical regulations and security controls specific to Critical Systems and Operational Technology.

Continuously Testing the Effectiveness of your Zero Trust Controls
Cyber Resilience

Continuously Testing the Effectiveness of your Zero Trust Controls

A holistic Zero Trust strategy should consider and provide coverage for each of these five pillars.

Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed
Cyber Resilience

Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed

Learn about an important step on your organization’s Zero Trust journey: prescribing what data is needed.

Securing Australian Government Assets in 2020: Part 1
Cyber Resilience

Securing Australian Government Assets in 2020: Part 1

In part 1 of this series, learn why government agencies are turning to Illumio to implement micro-segmentation.

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control
Cyber Resilience

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control

Workload protection encompasses many security capabilities including, but not limited to, effective securing and patching of the OS and any installed applications, host-based threat protection controls such as antivirus, EDR, file integrity monitoring, host-based firewalling, etc.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?