Please turn on your JavaScript for this page to function normally.
zero trust
The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been …

lock
How micro-segmentation creates an uphill battle for intruders

The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already …

tracking
Lack of visibility into remote endpoints leaves companies vulnerable to ransomware

Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the …

zero
In reality, how important is zero trust?

Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to …

network
Steering your network in the right direction with segmentation

Throughout history, individuals have taken innovations in their prime and tried to mold them into objects they were never designed to be. An example? The first cars were …

flame
Challenges of using firewall tech to do segmentation

Despite the inevitability of security-related incidents, few organizations currently protect against the spread of breaches with segmentation – only 19 percent of the 300 IT …

Jonathan Reiber will lead Illumio’s cybersecurity strategy

Illumio announced the appointment of Jonathan Reiber as head of cybersecurity strategy. With over 15 years experience in international security policy, Reiber will lead …

puzzle
Illumio and Qualys integrate to deliver vulnerability-based micro-segmentation

Illumio announced new global vulnerability mapping capabilities on its Adaptive Security Platform. Vulnerability and threat data from the Qualys Cloud Platform is integrated …

Don't miss

Cybersecurity news