Illumio Blog
April 2, 2019

An Attacker's Paradise: How To Mitigate Risk In A Flat Network

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

This article was originally published on Forbes.com.

Flat networks have become so prevalent because they are typically simple to architect, cheap to construct and easy to operate and maintain. However, it turns out that malicious actors love flat networks, too. That's because once a single host on a flat network has been compromised, the integrity of the rest of the network starts to resemble a house of cards. Once an enterprise is penetrated, the flat network delivers the uninvited and unwelcome guest unfettered network access to scan, identify and target high-value assets. Unfortunately, many organizations fail to mitigate or even fully recognize these risks.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

January 11, 2019

CTO Cybersecurity Predictions for 2019

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

It's that time of year again so I took some time to reflect back on 2018 and what we can expect to ring true in 2019. I've boiled it down to two predictions. The first takes an introspective view into the organizations we're all ultimately tasked with protecting. The second takes an outward-facing view that acknowledges that enterprises are part of a broader business ecosystem, and with that comes upstream and downstream risk. 

Read more »

Cloud Computing, Adaptive Security, Data Center Operations

October 2, 2018

Know the Score: Vulnerability Exposure Explained

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

In this post, I explain the various factors in calculating the Illumio Vulnerability Exposure Score (VES), which allows organizations to combine industry-standard vulnerability scoring measurements with context from their own unique environment. The VES also helps security professionals prioritize security controls to minimize the exposure of the attack surface and potential impact of vulnerabilities.

Read more »

Data Center Operations

December 21, 2017

2018 Predictions: Customers Demand Outcomes to End Balkanization of Security Practices

Former Chief Commercial Officer

This article was originally published on SecurityWeek.com.


"It’s much more pleasant to be obsessed over how the hero gets out of his predicament than it is over how I get out of mine."

— Woody Allen

 

Today, security is kind of an artisanal industry. With a total addressable market north of $85 billion per year – and not one player above 5 percent – it is a chaotic industry of niches: Endpoint, AV, Cloud, Network/Infrastructure, Application, Compliance, and the list goes on and on.
Read more »

Cloud Computing, Adaptive Security, Data Center Operations

December 20, 2017

Sizing Up Security in 2018: Predictions For Your Organization and Your (Former) Identity

CTO and Founder

PJ is a technologist and architect focused on complex distributed system solutions. He’s responsible for Illumio’s technology vision and platform architecture.

In my role, I spend a lot of time looking at and thinking about technology trends, with a sharp focus on how security is reaching limits and breaking. This is what drives me as we build products to address market requirements. The whole reason Illumio exists is because I saw that firewalls are reaching limits and needed to be rethought in the age of the cloud. 

As is tradition this time of year, I took some time to think about what has changed in 2017 and what that means for the year ahead. Some of the predictions are grounded in the reality of what's transpired and what we have learned, while others are more speculative and educated guesses based on the data we have.

Read more »

Cloud Computing, Adaptive Security, Data Center Operations