Illumio blog
Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more
Ransomware Containment

3 Steps to Reduce Ransomware Risk With Illumio’s New Ransomware Protection Dashboard
Learn how Illumio’s Ransomware Protection Dashboard and improved user interface (UI) gives you key visibility into ransomware risk.

Assume Breach with Zero Trust Endpoint Security
Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.
.jpg)
Demystifying Ransomware Techniques Using .Net Assemblies: 5 Main Techniques
Learn about 5 ransomware techniques using the .Net software framework.

How to Contain LockBit Ransomware with Illumio
Get insight into a real use case of a LockBit ransomware attack contained by Illumio Zero Trust Segmentation.

Expert Q&A: Why Do Businesses Still Pay Ransomware?
Get an expert's perspective on the factors that lead organizations to pay ransoms despite its reputational, financial, and security risks.

S&P Global: Top 3 Ways to Address Critical Infrastructure's Ransomware Threat
Get S&P Global's cybersecurity recommendations for critical infrastructure organizations shared during the recent webinar.

Why Manufacturing Must Secure IIoT Resources Against Ransomware
Get insight into ransomware risk for IIoT resources in the manufacturing sector.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

Why Protecting Your OT Doesn’t Require Layer 7 Deep Packet Inspection
Learn why Zero Trust Segmentation is a better answer for preventing the spread of breaches.

Bishop Fox: Testing Zero Trust Segmentations Effectiveness Against Ransomware
Learn how Bishop Fox created a ransomware attack emulation to test the effectiveness of Zero Trust Segmentation.

Refocus on Ransomware: 3 Truths to Building a Ransomware-Ready Network
Get insights into building networks that are secure against the spread of ransomware attacks.
Assume Breach.
Minimize Impact.
Increase Resilience.
Ready to learn more about Zero Trust Segmentation?