Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Cyber Resilience
Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.
What Is a Domain Controller?
A domain controller responds to security authentication requests and verifies users on the domain of a computer network. Here’s how it secures a network domain.
Understanding EU Compliance Mandates: Telecommunications-5G and Beyond
In part 5 of this series, we explore the expanded attack surface 5G brings, along with the telecom compliance mandates that are rapidly evolving.
Understanding EU Compliance Mandates: GDPR, Cyber Essentials
GDPR primarily focuses on data protection, data handling, and privacy concerns for EU citizens’ Personally Identifiable Information (PII).
Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor
Learn about an important step on your organization’s Zero Trust journey: Validate, Implement and Monitor.
Understanding EU Compliance Mandates Series: Financial Services
In Part 3 of this blog series, we explore EU regulations specific to financial services.
Operationalizing Zero Trust – Step 5: Design the Policy
Learn about an important step on your organization's Zero Trust journey; Design the policy.
Understanding EU Compliance Mandates: Operational Technology & Critical Systems
A discussion of the operational technical regulations and security controls specific to Critical Systems and Operational Technology.
Continuously Testing the Effectiveness of your Zero Trust Controls
A holistic Zero Trust strategy should consider and provide coverage for each of these five pillars.
Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed
Learn about an important step on your organization’s Zero Trust journey: prescribing what data is needed.
Securing Australian Government Assets in 2020: Part 1
In part 1 of this series, learn why government agencies are turning to Illumio to implement micro-segmentation.
Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control
Workload protection encompasses many security capabilities including, but not limited to, effective securing and patching of the OS and any installed applications, host-based threat protection controls such as antivirus, EDR, file integrity monitoring, host-based firewalling, etc.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?