Illumio Blog
August 26, 2016

This Week in Cyber

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

Four things I'm reading this week:

Read more »

Adaptive Security, Illumio News

August 25, 2016

See You at VMworld 2016

Head of Product Marketing

Chris helps customers understand benefits of and connect with Illumio solutions. He heads up the product marketing and technical marketing teams at Illumio.

As the summer comes to a close, #TeamIllumio is getting ready for an action-packed week in Vegas—talking visibility, VENs, and all things micro-segmentation at VMworld 2016. 

Read more »

Adaptive Security, Illumio News

August 19, 2016

This Week in Cyber

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

Four things I'm reading this week:

Read more »

Adaptive Security, Illumio News

August 18, 2016

How Secret Service Techniques Improve Cybersecurity

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

Recent news coverage has not been kind to the Secret Service, but when it comes to the organization’s core mission – protecting the President – it is hard to argue with its record.

Read more »

Adaptive Security

August 17, 2016

High-profile hacks and the asymmetry of disclosure

Head of Cybersecurity Strategy

Nathaniel works at the intersection of technology, policy, and law. He heads the company's thought leadership and public engagement, and oversees its cybersecurity technology strategy.

This week, I published an article on FCW titled, "High-profile hacks and the asymetry of disclosure." In it, I analyze the recent hack (and subsequent leak) of data from the Democratic National Committee (DNC), highlight how impossible it is to control leaked information, and argue that the best way to stop breaches like this is to reduce the amount of time intruders can hide inside a compromised network.

Read more »

Adaptive Security