/
Cyber Resilience

Illumio Authorized as a CVE Numbering Authority (CNA)

CVE Numbering Authority (CNA) Logo

In today's security landscape, it’s more important than ever for organizations to be transparent about security issues and build security processes that go beyond minimal requirements.

That’s why Illumio has worked with the Common Vulnerabilities and Exposures (CVE) program to be authorized as a CVE Numbering Authority (CNA). This designation helps Illumio be transparent about security issues reported in our products and services, streamline our disclosure process, and ultimately better protect our customers.

What is the CVE Program?

The CVE Program is a collaborative effort with hundreds of organizations around the world to help security professionals identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

When organizations find a security vulnerability in their product or service, the vulnerability is assigned a CVE Record. CVE partners publish CVE Records to communicate a consistent description of vulnerabilities. This ensures cybersecurity professionals are discussing the same issue so they can coordinate their efforts to prioritize and address the vulnerabilities.

Why is the program important?

Since the CVE Program began in 1999, more than 150,000 vulnerabilities have been identified and cataloged by the program, including more than 17,000 since 2020 alone. Thousands of security professionals have pooled their security research efforts to help identify and patch vulnerabilities.

With the number of cyberattacks ever-increasing, it’s important that organizations like Illumio join CVE Program partners to provide accurate, timely, and transparent security information that helps protect customers.

To learn more about how your organization can join the CVE Program, visit the program’s website.

Contact Illumio today to stop the spread of ransomware and breaches with Illumio Zero Trust Segmentation (ZTS).

Related topics

No items found.

Related articles

Malware Payloads & Beacons: How Malicious Communications Start
Cyber Resilience

Malware Payloads & Beacons: How Malicious Communications Start

Malware beacons are how an attacker can execute malware through a script. Recognizing them helps develop detection and containment strategies.

Don't Wing It: 4 Steps to Building a Cloud Migration Plan
Cyber Resilience

Don't Wing It: 4 Steps to Building a Cloud Migration Plan

These steps will help you build a winning cloud migration plan, in order to achieve cloud migration maturity.

Why Cyber Disasters Are Still Happening — And How to Fix It
Cyber Resilience

Why Cyber Disasters Are Still Happening — And How to Fix It

Get insight from Gary Barlet, Illumio Federal CTO, on why decades of trying to prevent and detect direct attacks by adversaries – and failing – means it's time to shift the focus to containment.

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI
Zero Trust Segmentation

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI

Read how Illumio Zero Trust Segmentation delivers 111% ROI based on the new Forrester TEI study.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?