illumio_Blog_Logo_2019-01
March 25, 2020

Zero Trust is Not Hard...If You’re Pragmatic

Field CTO

Raghu Nandakumara is a Field CTO at Illumio based in London, UK, where he is responsible for helping customers and prospects through their segmentation journeys.

A few weeks ago, Dark Reading’s Rob Lemos discussed reasons why, despite acknowledging the obvious security benefits, organisations and their security practitioners are hesitant to implement a Zero Trust model. The overarching concerns are that brownfield environments have too much technical debt that needs to be overcome in order to achieve Zero Trust status, and thus it can only be applied to net new environments (what we often call ‘greenfield’, typically as part of some cloud migration). Further, organisations assume that benefits can only be realised once everything has been “Zero-Trust-ified” (if indeed such a state exists  that there is no in-between state on the road to Zero Trust that is both beneficial and achievable. 

Read more »

cybersecurity, zero trust

February 10, 2020

Cloud Hopper: A Zero Trust Perspective

Field CTO

Raghu Nandakumara is a Field CTO at Illumio based in London, UK, where he is responsible for helping customers and prospects through their segmentation journeys.

Cloud Hopper, the hacking campaign suspected to be orchestrated by government-sponsored Chinese operatives (affectionately known as "APT10”), ran from 2014 through at least 2017, and impacted multiple Western companies in a range of industries. This specific collection of cyber espionage was so significant that it continued to attract attention in both the security and business media due to the scale of the operation, the range of organisations targeted, the type of information harvested, and – most significantly – the very nature of the initial breach. Cloud Hopper achieved its now well-known name due to the attackers’ compromise of the victims’ managed service providers (MSP), leveraging these to "hop" from the MSPs’ "cloud" to the target enterprises’ networks.

Read more »

cybersecurity