With the decade rapidly coming to a close, I’ve been reflecting on 2019, a year wrought with massive, public breaches that illustrated hacker sophistication unlike anything we’ve ever seen before. Collection #1 exposed over 770 million unique email addresses and over 21 million passwords, the Capital One breach affected nearly 106 million U.S. and Canadian residents, and 540 million Facebook user records were exposed on AWS. And that’s just the tip of the iceberg.Read more »
This week I had the honor of attending the Forbes 2019 Cloud 100 dinner to honor the best, most innovative cloud companies in the world. It’s Illumio’s third year (2016, 2018 and 2019) on this elite list of cloud companies, and my first time attending as CMO.Read more »
This article was originally published on Forbes.com.
Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain. However, it turns out that malicious actors love flat networks, too. That's because once a single host on a flat network has been compromised, the integrity of the rest of the network starts to resemble a house of cards. Once an enterprise is penetrated, the flat network delivers the uninvited and unwelcome guest unfettered network access to scan, identify and target high-value assets. Unfortunately, many organizations fail to mitigate or even fully recognize these risks.Read more »
The San Francisco springtime gave us plenty of weather to talk about at this year's RSA Conference. But the forecast has been cloudy for a while now.
Analysts project nearly 80 percent growth in cloud adoption in two years, with IT environments moving from almost half cloud in 2018 to more than two-thirds by 2020. By that time, 49 percent of businesses will store the majority of their data in the public cloud, according to the latest Oracle and KPMG Cloud Threat Report.Read more »
It's that time of year again so I took some time to reflect back on 2018 and what we can expect to ring true in 2019. I've boiled it down to two predictions. The first takes an introspective view into the organizations we're all ultimately tasked with protecting. The second takes an outward-facing view that acknowledges that enterprises are part of a broader business ecosystem, and with that comes upstream and downstream risk.Read more »