Zero trust adoption will continue to mature

Illumio released findings of a study conducted by Forrester Consulting that explore how organizations are approaching their zero trust strategies in 2022 to better navigate the remote world brought on by the COVID-19 pandemic and continuing digital tra… Continue reading Zero trust adoption will continue to mature

Challenges organizations face when implementing zero trust architecture

98 percent of UK business leaders and IT decision makers either plan to or have already started implementing zero trust strategies at their organizations, according to Illumio. The report also revealed the challenges organizations face when implementin… Continue reading Challenges organizations face when implementing zero trust architecture

New infosec products of the week: July 16, 2021

Mimecast CyberGraph helps detect sophisticated phishing and impersonation attacks CyberGraph creates an identity graph which is built to store information about relationships between all senders and recipients. The graph is designed to detect anomalies… Continue reading New infosec products of the week: July 16, 2021

Illumio Core advancements help protect key assets from cyberattacks and ransomware

Illumio announced new innovations in Illumio Core which automate, accelerate, and simplify the path to a zero trust posture. Cyberattacks and ransomware are most successful when they break through the perimeter and move, often undetected, throughout an… Continue reading Illumio Core advancements help protect key assets from cyberattacks and ransomware

The 6 steps to implementing zero trust

More often than not, organizations see zero trust as being an all or nothing proposition, where benefits will only be realized once everything in the system has been integrated. But this could not be further from the truth. One of the main concerns pre… Continue reading The 6 steps to implementing zero trust

How micro-segmentation creates an uphill battle for intruders

The past few years have seen a major shift in security strategies from looking outward for external threats to detecting and defending against adversaries that have already breached the network. One of the biggest dangers is that, after having gained a… Continue reading How micro-segmentation creates an uphill battle for intruders

Lack of visibility into remote endpoints leaves companies vulnerable to ransomware

Illumio released findings on visibility and security practices for remote endpoints, revealing how vulnerable organizations are to ransomware propagating throughout the network and the impact large-scale breaches have on a business – essentially grindi… Continue reading Lack of visibility into remote endpoints leaves companies vulnerable to ransomware

New Illumio Report Reveals Poor Endpoint Visibility and High Risk of Ransomware Spreading

As ransomware threats rise, survey reveals that 45 percent of businesses lack critical visibility into off-campus networks for their remote workforce Sunnyvale, CA — January 28, 2021 — Illumio, the leader in end-to-end Zero Trust segmentation, today re… Continue reading New Illumio Report Reveals Poor Endpoint Visibility and High Risk of Ransomware Spreading

In reality, how important is zero trust?

Although most IT and security professionals think of zero trust as an important part of their cybersecurity approach, many still have a long way to go on their quest to deploying it, according to Illumio. Especially as users continue to move off campus… Continue reading In reality, how important is zero trust?