illumio_Blog_Logo_2019-01
Find me on:
April 2, 2019

How To Mitigate Risk In A Flat Network - An Attacker's Paradise

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com.

Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain. However, it turns out that malicious actors love flat networks, too. That's because once a single host on a flat network has been compromised, the integrity of the rest of the network starts to resemble a house of cards. Once an enterprise is penetrated, the flat network delivers the uninvited and unwelcome guest unfettered network access to scan, identify and target high-value assets. Unfortunately, many organizations fail to mitigate or even fully recognize these risks.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

January 11, 2019

Cybersecurity in 2019 - CTO Predictions

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

It's that time of year again so I took some time to reflect back on 2018 and what we can expect to ring true in 2019. I've boiled it down to two predictions. The first takes an introspective view into the organizations we're all ultimately tasked with protecting. The second takes an outward-facing view that acknowledges that enterprises are part of a broader business ecosystem, and with that comes upstream and downstream risk. 

Read more »

Cloud Computing, Adaptive Security, Data Center Operations, cybersecurity

October 2, 2018

Know the Score: Vulnerability Exposure Explained

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

In this post, I explain the various factors in calculating the Illumio Vulnerability Exposure Score (VES), which allows organizations to combine industry-standard vulnerability scoring measurements with context from their own unique environment. The VES also helps security professionals prioritize security controls to minimize the exposure of the attack surface and potential impact of vulnerabilities.

Read more »

Data Center Operations

August 31, 2018

More Steph Curry Enterprise Security Lessons: When Something Goes Wrong

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com. Read part one of the series here

In part one of this two-part series, I talked about the similarities between protecting high-value assets in public spaces in the real world and in the enterprise. This includes the need to understand the value of the assets, how to reduce available pathways to the assets to minimize the potential attack surface and use security controls on the access points.

Read more »
August 3, 2018

Swish: What Steph Curry Can Teach Us About Enterprise Security

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com.

The best security professionals are those that can think like a hacker. Their perspective on defense is based on a fundamental understanding of how to scour a system for weaknesses that can be easily exploited. Are there obscure entry points that aren’t secured? All it takes is one overlooked device with default passwords connected to the outside world and attackers are in, despite all the resources dedicated to protecting the main entry.

Read more »