Raghu Nandakumara
Raghu Nandakumara is Senior Director of Industry Solutions at Illumio based in London, UK, where he is responsible for helping customers and prospects through their segmentation journeys. Previously, Raghu spent 15 years at Citibank, where he held several network security operations and engineering roles.
Authored content
Microsoft Exchange, SolarWinds, Verkada Breaches: Why Security Hygiene is More Important Than Ever
Security hygiene is healthy security behaviours amplified through the implementation of supporting processes and technical controls.
SolarWinds Breach: Driving a Paradigm Shift to Zero Trust
The SolarWinds compromise and its ongoing fall-out have brought into sharp focus the difficulty in controlling and validating every touch point an enterprise has with its external dependencies (be that vendor, customer, or partner) and further emphasizes the old adage that “a chain is only as strong as its weakest link.”
How Zero Trust Allows Organizations to Address Each Step in the Cyber Kill Chain
In this blog post we look at the Cyber Kill Chain, how security models that assume trust only help in mitigating Steps 1 to 6 in the chain.
Operationalizing Zero Trust – Step 6: Validate, Implement and Monitor
Learn about an important step on your organization’s Zero Trust journey: Validate, Implement and Monitor.
Operationalizing Zero Trust – Step 5: Design the Policy
Learn about an important step on your organization's Zero Trust journey; Design the policy.
Continuously Testing the Effectiveness of your Zero Trust Controls
A holistic Zero Trust strategy should consider and provide coverage for each of these five pillars.
Operationalizing Zero Trust – Step 4: Prescribe What Data is Needed
Learn about an important step on your organization’s Zero Trust journey: prescribing what data is needed.
Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control
Workload protection encompasses many security capabilities including, but not limited to, effective securing and patching of the OS and any installed applications, host-based threat protection controls such as antivirus, EDR, file integrity monitoring, host-based firewalling, etc.
Can You Measure the Efficacy of Microsegmentation?
Illumio and Bishop Fox conducted and documented an industry-first blueprint on how to measure the efficacy of micro-segmentation.
Operationalizing Zero Trust – Step 1: Identify What to Protect
As technology was deployed on a small scale, ad hoc solutions were manageable, and more productive than trying to pursue economies of scale or seek to engineer strategic solutions that could be relevant across the board.
Zero Trust is Not Hard...If You’re Pragmatic
With Illumio, building a ZT MVP and iterating to achieve a comprehensive posture for your organization incorporating the seven pillars of trust is achievable.
Cloud Hopper: A Zero Trust Perspective
Cloud Hopper: the hacking campaign suspected to be orchestrated by government-sponsored Chinese operatives. Could Zero Trust have stopped it?
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?