/
Cyber Resilience

Illumio Authorized as a CVE Numbering Authority (CNA)

In today's security landscape, it’s more important than ever for organizations to be transparent about security issues and build security processes that go beyond minimal requirements.

That’s why Illumio has worked with the Common Vulnerabilities and Exposures (CVE) program to be authorized as a CVE Numbering Authority (CNA). This designation helps Illumio be transparent about security issues reported in our products and services, streamline our disclosure process, and ultimately better protect our customers.

What is the CVE Program?

The CVE Program is a collaborative effort with hundreds of organizations around the world to help security professionals identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

When organizations find a security vulnerability in their product or service, the vulnerability is assigned a CVE Record. CVE partners publish CVE Records to communicate a consistent description of vulnerabilities. This ensures cybersecurity professionals are discussing the same issue so they can coordinate their efforts to prioritize and address the vulnerabilities.

Why is the program important?

Since the CVE Program began in 1999, more than 150,000 vulnerabilities have been identified and cataloged by the program, including more than 17,000 since 2020 alone. Thousands of security professionals have pooled their security research efforts to help identify and patch vulnerabilities.

With the number of cyberattacks ever-increasing, it’s important that organizations like Illumio join CVE Program partners to provide accurate, timely, and transparent security information that helps protect customers.

To learn more about how your organization can join the CVE Program, visit the program’s website.

Contact Illumio today to stop the spread of ransomware and breaches with Illumio Zero Trust Segmentation (ZTS).

Related topics

No items found.

Related articles

Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment
Cyber Resilience

Take Me to Your Domain Controller: How Attackers Move Laterally Through Your Environment

In the first part of this blog series, we saw different ways a threat actor can carry out the Discovery phase of the ATT&CK framework to gain a lay of the land after an initial infection.

Operationalizing Zero Trust – Step 5: Design the Policy
Cyber Resilience

Operationalizing Zero Trust – Step 5: Design the Policy

Learn about an important step on your organization's Zero Trust journey; Design the policy.

More Cyberattacks, Zero Trust Analysis Paralysis, and Cloud Security
Cyber Resilience

More Cyberattacks, Zero Trust Analysis Paralysis, and Cloud Security

Illumio CEO and co-founder Andrew Rubin discusses workload paralysis and how traditional security tools lack durability against today's catastrophic attacks

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI
Zero Trust Segmentation

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI

Read how Illumio Zero Trust Segmentation delivers 111% ROI based on the new Forrester TEI study.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?