Illumio Blog
February 21, 2017

Think Like a Defender – Start with Proactive Control

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

At the start of the RSA Conference last week, I offered a few thoughts about why it’s better to think like a defender instead of an attacker when designing security. RSA is now over, but the conversation continued throughout the entire conference, and keeps coming up back in the real world. Few people disagree that proactive control is an essential component of security – it’s a question of how to actually put something like this into practice. The key to thinking like a defender is about how your security organization combines proactive control measures with reactive security.

Read more »

Adaptive Security, Illumio News, Security

February 15, 2017

Don’t Just Think Like an Attacker – Think Like a Defender

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

We’re only two days into RSA, but I’ve already heard the phrase “think like an attacker” in about a dozen conversations. I understand the appeal of this approach, but I’m also increasingly convinced that there’s a trap here.

Read more »

Adaptive Security, Illumio News, Security

February 13, 2017

The Power of Opportunity: Quantifying Risk Through Adaptive Security

Chief Commercial Officer

Alan is a technology veteran known for company building. He leads Illumio’s go-to-market strategy and customer engagement life cycle.

"Those who believe quantitative methods are impractical in cybersecurity are not saying so because they know more about cybersecurity but because they know less quantitative methods."

— Douglas Hubbard & Richard Seiersen, How to Measure Anything in Cybersecurity Risk

"My favorite poem is the one that starts 'Thirty days hath September' because it tells you something."

— Groucho Marx

Read more »

Adaptive Security, Illumio News, Data Center Operations, Security, Adaptive Segmentation

February 9, 2017

Getting the Most Out of RSA 2017: A Practitioner's Guide

Director of Information Security

John has more than 20 years of experience developing, operating, and managing information security, IT, engineering services, and business processes. He heads up InfoSec at Illumio.

RSA Conference 2017 is fast approaching and the Illumio team has been buzzing around getting ready. I’ve been doing research to decide on my schedule for this year’s conference and thought I’d share some thoughts on how security practitioners can get the most out of the busy week ahead. 

Read more »

Adaptive Security, Data Center Operations, Adaptive Segmentation

January 31, 2017

The Evolution of Adaptive Segmentation

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

I believe that innovation comes from people who have an unstoppable drive to improve the world and are placed in an environment with constrained resources. This is why top sports players have their best games when playing against the most challenging opponents. And “threading the needle” wouldn't mean much if the eye of the needle wasn’t so tiny. It is exactly these challenging and constrained environments that innovators who have it in their veins look for, and are the cauldron from where innovations are conceived.

The Illumio journey started in such an environment (as many successful startups do).

For us, it began in a world where choke-point firewalls were not able to keep up and deliver security segmentation that was sufficiently dynamic to keep up with today’s modern data center and distributed application needs. Dev ops, microservice architectures, public cloud, and containers are all parts that fueled the evolution of the dynamic and distributed data center, but were causing strain and tension on those traditional security segmentation solutions.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations