Illumio blog
Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
PJ Kirner
.jpg)
AI Shouldn’t Be Trusted: Why Understanding That Can Be Transformative
Learn why Illumio's CTO and co-founder believes the AI "tech boundary" is smaller than it appears – and how that informs the ways we use AI.

Illumio Named a Leader in The Forrester New Wave for Microsegmentation
Illumio has been named a Leader in The Forrester New Wave: Microsegmentation, Q1 2022.

Operationalizing the Biden Administration's Cybersecurity Executive Order with Zero Trust
Ready to operationalize President Biden's cybersecurity executive order with Zero Trust? Read this blog to find out how.

Cybersecurity Predictions for 2021
As organizations rushed to retool for remote work in 2020, obviously a greater emphasis was placed on the cloud.

Cyber Risks and Reliefs of Sheltering in Place
We examine how working from home increases cyber risk and illustrate a few ways it will actually relieve risk.

3 Cybersecurity Predictions for 2020
From cyber-physical, business email compromise, voishing attacks and other cybersecurity threats - predictions for cybersecurity in 2020 by PJ Kirner.

Cyber Monday: Are Your Situational Crown Jewels Protected This Holiday Season?
Cyber Monday and high-value assets: 3 tips for protecting situational crown jewels as businesses brace for a big wave in activity during the holidays.

Cybersecurity: 3 Steps for Biotech And Pharma Industries
Cybersecurity for biotech and pharma companies - how micro-segmentation comes into play and 3 steps to get started. By CTO PJ Kirner.

How To Mitigate Risk In A Flat Network — An Attacker's Paradise
Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain.

More Steph Curry Enterprise Security Lessons: When Something Goes Wrong
Security teams have to make decisions like this on the fly all the time, and the more data they have access to about the situation, the better decisions they can make.

Know the Score: Vulnerability Exposure Explained
How we calculate the Vulnerability Exposure Score, which allows organizations to combine industry-standard vulnerability scoring measurements with context from their environment.

Swish: What Steph Curry Can Teach Us About Enterprise Security
The best security professionals are those that can think like a hacker. Their perspective on defense is based on a fundamental understanding of how to scour a system for weaknesses that can be easily exploited.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?