Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Ransomware Containment

Raising the Bar for Attackers: How Micro-Segmentation Can Protect Organizations From Kaseya-Like Attacks
Ransomware Containment

Raising the Bar for Attackers: How Micro-Segmentation Can Protect Organizations From Kaseya-Like Attacks

How micro-segmentation could have reduced the attack-surface and mitigated the consequences of the Kaseya attack.

NAME:WRECK Takeaways — How Micro-Segmentation Can Help with Visibility and Containment
Ransomware Containment

NAME:WRECK Takeaways — How Micro-Segmentation Can Help with Visibility and Containment

How micro-segmentation can help with visibility and containment to prevent WRECK vulnerabilities, remote code execution or denial of service.

What to Do in a Cyber Incident, Part 2: Non-Technical Response
Ransomware Containment

What to Do in a Cyber Incident, Part 2: Non-Technical Response

Ransomware Reduction 101: Lateral movement between endpoints
Ransomware Containment

Ransomware Reduction 101: Lateral movement between endpoints

What to Do in a Cyber Incident: Technical Response
Ransomware Containment

What to Do in a Cyber Incident: Technical Response

Security in the Sky: How Airlines Approach Security During Turbulent Times
Ransomware Containment

Security in the Sky: How Airlines Approach Security During Turbulent Times

CCPA and Zero Trust Security for PII: Healthcare and Education
Ransomware Containment

CCPA and Zero Trust Security for PII: Healthcare and Education

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?