Illumio Blog
September 14, 2018

Illumio at VMworld 2018: Micro-Segmentation Goes Mainstream

Sr. Content Marketing Manager

#TeamIllumio recently took to the floor at VMworld 2018 — and micro-segmentation took center stage at our booth and at large. If you didn’t catch our glowing orange beacon of light and theater-style demo in action, relive it with us on this Flashback Friday.

Read more »
August 31, 2018

More Steph Curry Enterprise Security Lessons: When Something Goes Wrong

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com. Read part one of the series here

In part one of this two-part series, I talked about the similarities between protecting high-value assets in public spaces in the real world and in the enterprise. This includes the need to understand the value of the assets, how to reduce available pathways to the assets to minimize the potential attack surface and use security controls on the access points.

Read more »
August 3, 2018

Swish: What Steph Curry Can Teach Us About Enterprise Security

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com.

The best security professionals are those that can think like a hacker. Their perspective on defense is based on a fundamental understanding of how to scour a system for weaknesses that can be easily exploited. Are there obscure entry points that aren’t secured? All it takes is one overlooked device with default passwords connected to the outside world and attackers are in, despite all the resources dedicated to protecting the main entry.

Read more »
July 31, 2018

The Long Arm of the Law Firm and the Future of Cybersecurity

Head of Cybersecurity Strategy

Jonathan is a seasoned cybersecurity strategist. He's been at the forefront of international security policy and now leads Illumio's public cybersecurity policy engagements and research.

Somedays it feels like the whole world is getting hacked. China has stolen U.S. military data through cyberspace, first for the Joint Strike Fighter and now for sensitive submarine technologies. Millions of Americans have had their credit card information pilfered as hackers breached retail companies. Even ships at sea are vulnerable, as hackers have learned to manipulate the Automated Information System (AIS) and the Global Positioning System (GPS) to alter a ship’s navigational course without their captains necessarily knowing.

These hacks are alarming in their scope and risk and immediately make headlines. But what about the quiet, subtle hack of a white glove law firm? Law firms base their reputation (and therefore their business) on confidentiality and discretion – for good reason. The legal business is obviously a sensitive one; lawyers often interact with their clients in vulnerable or transitional states where much is at risk. Client records thus present a treasure trove of juicy data for any hacker: personally identifiable information, banking data, and correspondence. All data that could make or break a case for a client and her firm.

Read more »

cybersecurity

July 24, 2018

Challenges in Global Banking – The SWIFT of the Iceberg

Vice President of Product Management

Matthew is a 20-year industry veteran with experience in five successful start-ups. He is responsible for Illumio’s product lines and product strategy.

The very public SWIFT breaches and the SWIFT consortium’s reaction have been a canary in a coal mine, setting many regional governments in motion to look at the ramifications of ‘wide open’ payment systems and driving the development of the new SWIFT Customer Security Controls Framework in the past year. 

Read more »