Infosecurity Europe 2022 video walkthrough
Infosecurity Europe 2022 opened its doors today at the ExCeL in London, here’s a look inside the event. The featured vendors are: Akamai Technologies, AlgoSec, Appgate, …
Prioritizing segmentation leads to better business and security outcomes
Conducted by The Enterprise Strategy Group (ESG), which surveyed 1,000 IT and security professionals in eight countries, a new Illumio report discovered that 47% of security …
Zero trust segmentation eliminates 5 cyber disasters per year and saves $20+ million annually
Illumio released The Zero Trust Impact Report, a research on market perspectives of zero trust strategies and the business impact of segmentation technology. Conducted by The …
Mario Espinoza joins Illumio as CPO
Illumio announced the appointment of Mario Espinoza as Chief Product Officer (CPO). Espinoza has nearly two decades of experience in network, cloud, and data security, …
Zero trust adoption will continue to mature
Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …
Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …
New infosec products of the week: July 16, 2021
Mimecast CyberGraph helps detect sophisticated phishing and impersonation attacks CyberGraph creates an identity graph which is built to store information about relationships …
Illumio Core advancements help protect key assets from cyberattacks and ransomware
Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful …
The 6 steps to implementing zero trust
More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …
How micro-segmentation creates an uphill battle for intruders
The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …
Lack of visibility into remote endpoints leaves companies vulnerable to ransomware
Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the …
In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …
Featured news
Resources
Don't miss
- Black Friday 2025 cybersecurity deals to explore
- Quantum encryption is pushing satellite hardware to its limits
- cnspec: Open-source, cloud-native security and policy project
- The privacy tension driving the medical data shift nobody wants to talk about
- Salesforce Gainsight compromise: Early findings and customer guidance