Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Cyber Resilience
Cybersecurity Is Our Greatest National Resilience Imperative
With an increased focus on upping production, manufacturing and distribution, cybersecurity and securing critical infrastructure are paramount to that success.
Why Log4j Vulnerabilities Highlight the Importance of DevSecOps
In December 2021, IT security teams and development organizations around the world got a rude wake-up call.
Cloud Security: Turning False Assumptions into Assurances With Illumio
Exploring the dangers of false assumptions when it comes to cloud services and workload security.
Top Cloud Security False Assumptions That Create Needless Risk
It’s been 15 years since Amazon Web Services launched the first cloud infrastructure platform.
Malware Payloads & Beacons: Techniques to Mitigate Impact
In the final part of this series, we focus on some of the obfuscation techniques used to disguise malware payloads and examine mitigation techniques organizations can employ.
Malware Payloads & Beacons: Types of Malicious Payloads
Understanding distinct types of payloads and reviewing an example of malicious code they may employ.
Malware Payloads & Beacons: How Malicious Communications Start
Malware beacons are how an attacker can execute malware through a script. Recognizing them helps develop detection and containment strategies.
What President Biden’s Cybersecurity Executive Order Means for Federal Agencies
President Biden’s cybersecurity executive order aims to increase resilience and reduce risk for government agencies.
What President Biden’s New Security Policy Means for the Future of Cyber
The Biden Administration just cemented its legacy in cybersecurity policy with a sweeping Executive Order aimed at improving the resilience and reducing the risk of the United States Government.
Microsoft Exchange, SolarWinds, Verkada Breaches: Why Security Hygiene is More Important Than Ever
Security hygiene is healthy security behaviours amplified through the implementation of supporting processes and technical controls.
Cybersecurity Predictions for 2021
Assuming the cloud solves everything, too many organizations overlook endpoint security. Here’s what this means for DevSecOps and cyber risk.
Take Me to Your Domain Controller: Protections & Mitigations Using Zero Trust Tools
In part 1 of this blog series, we looked at how discovery methods can be used in an initial compromise.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?