Raghu Nandakumara

Senior Director, Industry Solutions Marketing

Raghu Nandakumara is Senior Director of Industry Solutions at Illumio based in London, UK, where he is responsible for helping customers and prospects through their segmentation journeys.  Previously, Raghu spent 15 years at Citibank, where he held several network security operations and engineering roles.

Authored content

Microsoft Exchange, SolarWinds, Verkada Breaches: Why Security Hygiene is More Important Than Ever
Cyber Resilience

Microsoft Exchange, SolarWinds, Verkada Breaches: Why Security Hygiene is More Important Than Ever

Security hygiene is healthy security behaviours amplified through the implementation of supporting processes and technical controls.

SolarWinds Breach: Driving a Paradigm Shift to Zero Trust
Zero Trust Segmentation

SolarWinds Breach: Driving a Paradigm Shift to Zero Trust

The SolarWinds compromise and its ongoing fall-out have brought into sharp focus the difficulty in controlling and validating every touch point an enterprise has with its external dependencies (be that vendor, customer, or partner) and further emphasizes the old adage that “a chain is only as strong as its weakest link.”

How Zero Trust Allows Organizations to Address Each Step in the Cyber Kill Chain
Zero Trust Segmentation

How Zero Trust Allows Organizations to Address Each Step in the Cyber Kill Chain

In this blog post we look at the Cyber Kill Chain, how security models that assume trust only help in mitigating Steps 1 to 6 in the chain.

Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor
Cyber Resilience

Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor

Learn about an important step on your organization’s Zero Trust journey: Validate, Implement and Monitor.

Operationalizing Zero Trust – Step 5: Design the Policy
Cyber Resilience

Operationalizing Zero Trust – Step 5: Design the Policy

Learn about an important step on your organization's Zero Trust journey; Design the policy.

Continuously Testing the Effectiveness of your Zero Trust Controls
Cyber Resilience

Continuously Testing the Effectiveness of your Zero Trust Controls

A holistic Zero Trust strategy should consider and provide coverage for each of these five pillars.

Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed
Cyber Resilience

Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed

Learn about an important step on your organization’s Zero Trust journey: prescribing what data is needed.

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control
Cyber Resilience

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control

Workload protection encompasses many security capabilities including, but not limited to, effective securing and patching of the OS and any installed applications, host-based threat protection controls such as antivirus, EDR, file integrity monitoring, host-based firewalling, etc.

Can You Measure the Efficacy of Microsegmentation?
Zero Trust Segmentation

Can You Measure the Efficacy of Microsegmentation?

Illumio and Bishop Fox conducted and documented an industry-first blueprint on how to measure the efficacy of micro-segmentation.

Operationalizing Zero Trust – Step 1: Identify What to Protect
Zero Trust Segmentation

Operationalizing Zero Trust – Step 1: Identify What to Protect

As technology was deployed on a small scale, ad hoc solutions were manageable, and more productive than trying to pursue economies of scale or seek to engineer strategic solutions that could be relevant across the board.

Zero Trust is Not Hard...If You’re Pragmatic
Zero Trust Segmentation

Zero Trust is Not Hard...If You’re Pragmatic

With Illumio, building a ZT MVP and iterating to achieve a comprehensive posture for your organization incorporating the seven pillars of trust is achievable.

Cloud Hopper: A Zero Trust Perspective
Zero Trust Segmentation

Cloud Hopper: A Zero Trust Perspective

Cloud Hopper: the hacking campaign suspected to be orchestrated by government-sponsored Chinese operatives. Could Zero Trust have stopped it?

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?