Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Ransomware Containment

3 Steps to Reduce Ransomware Risk With Illumio’s New Ransomware Protection Dashboard
Ransomware Containment

3 Steps to Reduce Ransomware Risk With Illumio’s New Ransomware Protection Dashboard

Learn how Illumio’s Ransomware Protection Dashboard and improved user interface (UI) gives you key visibility into ransomware risk.

Assume Breach with Zero Trust Endpoint Security
Ransomware Containment

Assume Breach with Zero Trust Endpoint Security

Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.

Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques
Ransomware Containment

Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques

Learn about 5 ransomware techniques using the .Net software framework.

How to Contain LockBit Ransomware with Illumio
Ransomware Containment

How to Contain LockBit Ransomware with Illumio

Get insight into a real use case of a LockBit ransomware attack contained by Illumio Zero Trust Segmentation.

Expert Q&A: Why Do Businesses Still Pay Ransomware?
Ransomware Containment

Expert Q&A: Why Do Businesses Still Pay Ransomware?

Get an expert's perspective on the factors that lead organizations to pay ransoms despite its reputational, financial, and security risks.

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat
Ransomware Containment

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat

Get S&P Global's cybersecurity recommendations for critical infrastructure organizations shared during the recent webinar.

Why Manufacturing Must Secure IIoT Resources Against Ransomware
Ransomware Containment

Why Manufacturing Must Secure IIoT Resources Against Ransomware

Get insight into ransomware risk for IIoT resources in the manufacturing sector.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

Why Protecting Your OT Doesn’t Require Layer 7 Deep Packet Inspection
Ransomware Containment

Why Protecting Your OT Doesn’t Require Layer 7 Deep Packet Inspection

Learn why Zero Trust Segmentation is a better answer for preventing the spread of breaches.

Bishop Fox: Testing Zero Trust Segmentations Effectiveness Against Ransomware
Ransomware Containment

Bishop Fox: Testing Zero Trust Segmentations Effectiveness Against Ransomware

Learn how Bishop Fox created a ransomware attack emulation to test the effectiveness of Zero Trust Segmentation.

Refocus on Ransomware: 3 Truths to Building a Ransomware-Ready Network
Ransomware Containment

Refocus on Ransomware: 3 Truths to Building a Ransomware-Ready Network

Get insights into building networks that are secure against the spread of ransomware attacks.

How a Global Law Firm Stopped a Ransomware Attack Using Illumio
Ransomware Containment

How a Global Law Firm Stopped a Ransomware Attack Using Illumio

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?