/
Cyber Resilience

Illumio Authorized as a CVE Numbering Authority (CNA)

In today's security landscape, it’s more important than ever for organizations to be transparent about security issues and build security processes that go beyond minimal requirements.

That’s why Illumio has worked with the Common Vulnerabilities and Exposures (CVE) program to be authorized as a CVE Numbering Authority (CNA). This designation helps Illumio be transparent about security issues reported in our products and services, streamline our disclosure process, and ultimately better protect our customers.

What is the CVE Program?

The CVE Program is a collaborative effort with hundreds of organizations around the world to help security professionals identify, define, and catalog publicly disclosed cybersecurity vulnerabilities.

When organizations find a security vulnerability in their product or service, the vulnerability is assigned a CVE Record. CVE partners publish CVE Records to communicate a consistent description of vulnerabilities. This ensures cybersecurity professionals are discussing the same issue so they can coordinate their efforts to prioritize and address the vulnerabilities.

Why is the program important?

Since the CVE Program began in 1999, more than 150,000 vulnerabilities have been identified and cataloged by the program, including more than 17,000 since 2020 alone. Thousands of security professionals have pooled their security research efforts to help identify and patch vulnerabilities.

With the number of cyberattacks ever-increasing, it’s important that organizations like Illumio join CVE Program partners to provide accurate, timely, and transparent security information that helps protect customers.

To learn more about how your organization can join the CVE Program, visit the program’s website.

Contact Illumio today to stop the spread of ransomware and breaches with Illumio Zero Trust Segmentation (ZTS).

Related topics

No items found.

Related articles

Top Cybersecurity News Stories From January 2024
Cyber Resilience

Top Cybersecurity News Stories From January 2024

Learn why Zero Trust is key to business growth, how to solve cloud security gaps with ZTS, and 2024 predictions from Zero Trust's creator.

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control
Cyber Resilience

Operationalizing Zero Trust – Steps 2 and 3: Determine Which Zero Trust Pillar to Focus On and Specify the Exact Control

Workload protection encompasses many security capabilities including, but not limited to, effective securing and patching of the OS and any installed applications, host-based threat protection controls such as antivirus, EDR, file integrity monitoring, host-based firewalling, etc.

4 Questions You Didn’t Know to Ask About Cybersecurity
Cyber Resilience

4 Questions You Didn’t Know to Ask About Cybersecurity

Get insight from four Illumio cybersecurity experts on the most important questions that are often overlooked by security teams.

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI
Zero Trust Segmentation

Illumio Zero Trust Segmentation Delivers Provable Risk Reduction and ROI

Read how Illumio Zero Trust Segmentation delivers 111% ROI based on the new Forrester TEI study.

How Brooks Uses Illumio to Stop Ransomware from Running Rampant
Ransomware Containment

How Brooks Uses Illumio to Stop Ransomware from Running Rampant

See why Brooks chose Illumio Zero Trust Segmentation to ensure reliability for their retail and ecommerce businesses.

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham
Zero Trust Segmentation

5 Must-Know Insights from Zero Trust Pioneer Chase Cunningham

Chase Cunningham, also known as Dr. Zero Trust, shares his thoughts in this Zero Trust Leadership Podcast episode.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?