Prioritizing segmentation leads to better business and security outcomes
Conducted by The Enterprise Strategy Group (ESG), which surveyed 1,000 IT and security professionals in eight countries, a new Illumio report discovered that 47% of security …
Zero trust segmentation eliminates 5 cyber disasters per year and saves $20+ million annually
Illumio released The Zero Trust Impact Report, a research on market perspectives of zero trust strategies and the business impact of segmentation technology. Conducted by The …
Mario Espinoza joins Illumio as CPO
Illumio announced the appointment of Mario Espinoza as Chief Product Officer (CPO). Espinoza has nearly two decades of experience in network, cloud, and data security, …
Zero trust adoption will continue to mature
Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate …
Challenges organizations face when implementing zero trust architecture
98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to …
New infosec products of the week: July 16, 2021
Mimecast CyberGraph helps detect sophisticated phishing and impersonation attacks CyberGraph creates an identity graph which is built to store information about relationships …
Illumio Core advancements help protect key assets from cyberattacks and ransomware
Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful …
The 6 steps to implementing zero trust
More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …
How micro-segmentation creates an uphill battle for intruders
The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …
Lack of visibility into remote endpoints leaves companies vulnerable to ransomware
Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the …
In reality, how important is zero trust?
Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …
Steering your network in the right direction with segmentation
Throughout history, individuals have taken innovations in their prime and tried to mold them into objects they were never designed to be. An example? The first cars were …
Featured news
Resources
Don't miss
- PoC code drops for remotely exploitable BIND 9 DNS flaw (CVE-2025-40778)
- Italian-made spyware Dante linked to Chrome zero-day exploitation campaign
- Managing legacy medical devices that can no longer be patched
- Chain of security weaknesses found in smart air compressor model
- Review: The Wireless Cookbook