Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Cyber Resilience

How Illumio Lowers ACH Group’s Cyber Risk — With Nearly Zero Overhead
Cyber Resilience

How Illumio Lowers ACH Group’s Cyber Risk — With Nearly Zero Overhead

"Good lives for older people" is the tagline of ACH Group, a nonprofit organization based in Australia. But if ACH's IT systems get taken down by cybercriminals, its ability to support those they serve could be harmed.

5 Cybersecurity Threats to Protect Against
Cyber Resilience

5 Cybersecurity Threats to Protect Against

Organizations and their security teams are up against potentially devastating cyberthreats each day. But it's hard to provide protection for threats you don’t even know exist.

3 Takeaways on Zero Trust From Executive Order 14028
Cyber Resilience

3 Takeaways on Zero Trust From Executive Order 14028

Post cyber security executive order 14028, we look back to see what progress has been made in the effort to order Zero Trust across federal agencies.

How To Implement Zero Trust
Cyber Resilience

How To Implement Zero Trust

A comprehensive overview of how to implement Zero Trust architecture and employing Zero Trust best practices.

Resilient Critical Infrastructure Starts with Zero Trust
Cyber Resilience

Resilient Critical Infrastructure Starts with Zero Trust

From the Colonial Pipeline breach to the JBS ransomware attack, the past year has shown us that cyberattacks on U.S. critical infrastructure are more relentless, sophisticated, and impactful than ever before – and all too often threaten the economic stability and wellbeing of U.S. citizens.

Zero Trust Security, “Assume Breach” Mindset, and the UK’s Data Reform Bill
Cyber Resilience

Zero Trust Security, “Assume Breach” Mindset, and the UK’s Data Reform Bill

While 90 percent of organizations plan to prioritize a Zero Trust security strategy in 2022, staggeringly few believe they’ll experience a breach.

RSA Conference Highlights: New Approaches for Today's Cyber Threats
Cyber Resilience

RSA Conference Highlights: New Approaches for Today's Cyber Threats

During the last two years, organizations have shifted to increasingly hybrid, distributed IT infrastructure models, which have opened up all-new cybersecurity vulnerabilities and risks. Meanwhile, we have seen one devastating cyberattack after another reach news headlines.

Zero Trust Security, New NIS2 Directive, and Illumio Partnerships
Cyber Resilience

Zero Trust Security, New NIS2 Directive, and Illumio Partnerships

Traditional security tools alone aren't able to protect hybrid networks against today's sophisticated cyberattacks. Organizations and government agencies alike are waking up to this reality, making Zero Trust security a top priority this year.

How Do You Secure a Hybrid Cloud Environment?
Cyber Resilience

How Do You Secure a Hybrid Cloud Environment?

Erika Bagby, senior product marketing manager at Illumio, discusses security for hybrid cloud environments.

More Cyberattacks, Zero Trust Analysis Paralysis, and Cloud Security
Cyber Resilience

More Cyberattacks, Zero Trust Analysis Paralysis, and Cloud Security

Illumio CEO and co-founder Andrew Rubin discusses workload paralysis and how traditional security tools lack durability against today's catastrophic attacks

How to Stop Global Cybersecurity Threats Emerging From the Ukraine-Russia Conflict
Cyber Resilience

How to Stop Global Cybersecurity Threats Emerging From the Ukraine-Russia Conflict

Resilience and cyber awareness polices may need an update as critical cybersecurity threats emerge from the war in Ukraine.

A Call for Cyber Resilience and Zero Trust: Illumio Month in Review
Cyber Resilience

A Call for Cyber Resilience and Zero Trust: Illumio Month in Review

The start of 2022 has brought into focus the heightened priority of Zero Trust security in today’s cyber landscape. Many organizations are facing further complexity in their networks as flexible work options evolve, and a volatile geopolitical landscape has led to an exponential rise in international ransomware attacks and breaches.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?