Illumio blog
Zero Trust Segmentation
Featured articles

Illumio for Azure Firewall Brings Benefits of Zero Trust Segmentation to Microsoft Azure...
Get Reliable ROI with Illumio Zero Trust Segmentation
How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Latest articles
Two Years Turned to Five
When I joined Illumio in 2013, I promised Andrew Rubin, Illumio’s CEO and my good friend, "two years max!" Well, two...
2018 Predictions: Customers Demand Outcomes to End Balkanization of Security...
This article was originally published on SecurityWeek.com. "It’s much more pleasant to be obsessed over how the hero...
The Power of Opportunity: Quantifying Risk Through Adaptive Security
"Those who believe quantitative methods are impractical in cybersecurity are not saying so because they know more about...
Stopping by Clouds on an Agile Evening
There is a crispness in the air and all across the country the leaves are falling in the annual winter display. Winter...
Finally, Reducing Risk and Accelerating Security Are Compatible
Earlier today we announced the availability of Illumio Security Templates, a somewhat mild — in the hothouse of tech...
Computing in Transition
There has never been more at stake in the $4 trillion IT industry. The computing world is transitioning from the long...
Judged by the Company You Keep: Illumio Secures its Way into the First-Ever...
Last week Forbes included Illumio in its inaugural Cloud 100 list, a group of cutting-edge private companies defining...
Data Center and Cloud Security Requires Paranoia
Imagine you are walking home very late at night. In the distance, you can hear rough laughter and the sound of breaking...
What Happens If the New Stack Is Not a Stack at All?
Today I published an article on The New Stack titled, "What Happens if the New Stack Is Not a Stack at All?" In it, I...
An Occam’s Razor for Security (Part 2 of 2)
In my previous column, An Occam’s Razor for Security, I made the argument that simply adding more security technology...
An Occam’s Razor for Security (Part 1 of 2)
The rapid growth of innovation in cybersecurity technologies has presented a nearly endless range of new security...
CyberSecurity Moon Shot
This week’s RSA conference may prove to be a watershed moment in the history of the IT industry. After several years of...