/
Zero-Trust-Segmentierung

Top Cybersecurity News Stories From June 2025

June brought a sharper focus to cybersecurity, with discussions around critical infrastructure threats, Zero Trust adoption, and the growing urgency around breach containment.  

As threats continue to evolve and attackers move faster than ever, organizations are rethinking how they secure their environments from the inside out. Industry leaders are advancing their security strategies with greater visibility, segmentation, and resilience.

This month’s news features insights from top security experts on:

  • Segmentation tools past and present — and why it’s an essential security tech
  • The threats facing critical infrastructure, according to John Kindervag
  • The new integration of Illumio + NVIDIA BlueField DPUs for operational technology

Microsegmentation isn’t optional

The worst part of a cyberattack isn’t how they get in. It’s what they do once they’re inside.  

As SC Media put it in its June feature, “Flat networks, fast hackers: microsegmentation gets a security comeback,” attackers don’t need brute force.

“They simply walk through the network, aided by over-permissioned identities and flat infrastructure that wasn’t designed to stop them.”

That’s why microsegmentation — the long-overlooked, often-misunderstood security strategy — is making a serious comeback. And Illumio has been here the whole time.

The article makes it clear that after years of false starts, microsegmentation is finally hitting its stride. What changed? Identity sprawl, hybrid environments, and the rise of AI have turned every network into a potential free-for-all.  

The numbers say it all. The microsegmentation market is projected to grow from $8.17 billion in 2025 to $41.24 billion by 2034.

The growth reflects changes to microsegmentation technology. The old way of doing segmentation just didn’t cut it.  

“Most microsegmentation projects failed because they were too slow, too brittle, and too dependent on legacy infrastructure,” said Bryan Holmes, VP of IT at Andelyn Biosciences. His team spent two years wrestling with a NAC-based model before switching to something more scalable. They’re not alone.

Microsegmentation is no longer just a best practice. In many sectors, it’s becoming a compliance requirement and a cyber insurance expectation.

Here’s where Illumio steps in. The article highlights the Illumio breach containment platform as the next-gen player “pushing for agentless, identity-first segmentation.”  

That matters because the perimeter is no longer your firewall. It’s identity. And according to the article, machine identities now make up more than 70% of what’s on your network. You can’t protect what you can’t segment. And you can’t segment with tools that understand only IPs and VLANs.

Illumio is bringing segmentation into the now. As SC Media pointed out, Illumio has added “incident response integrations and risk-based segmentation triggers,” so security teams can respond fast and enforce least privilege automatically.  

And it’s not just security teams paying attention. “Microsegmentation is no longer just a best practice,” the article said. “In many sectors, it’s becoming a compliance requirement and a cyber insurance expectation.”  

In today's threat landscape, microsegmentation isn’t optional anymore, and by choosing Illumio, you’re already ahead.

John Kindervag: “Cybersecurity soldiers are on the front line”

When the creator of Zero Trust says our critical infrastructure is under siege, it’s worth paying attention.  

In his latest article for Cyber Defense Magazine, “Modernizing Critical Infrastructure Security to Meet Today’s Threats,” John Kindervag laid it out plainly.

“Ransomware attacks are no longer just a cybersecurity concern,” he said. “They are a direct threat to national security.”

The stats back it up. Organizations hit by ransomware saw an average of 25% of critical systems affected and downtime lasting an average of 12 hours.  

That kind of disruption to energy, healthcare, or water systems can grind society to a halt. And many of the systems running critical infrastructure today simply weren’t built to withstand modern attacks.

“Legacy systems often lack fundamental security controls,” Kindervag wrote. “Without segmentation, containment, and advanced threat detection, agencies struggle to identify and mitigate attacks.”

The solution is a modern security strategy grounded in Zero Trust principles and powered by segmentation.  

Segmentation, Kindervag explained, prevents attackers from moving laterally across networks and reaching high-value assets. Even when attackers get in, they’re stopped from doing real damage.

Legacy systems often lack fundamental security controls. Without segmentation, containment, and advanced threat detection, agencies struggle to identify and mitigate attacks.

He walked through the five-step Zero Trust model, emphasizing the importance of protecting the data, applications, assets, and services that require protection. To do this, security teams must map flows, enforce least-privilege access, and continuously monitor them.  

AI plays a key role, too — speeding up policy creation and making segmentation more adaptive. “AI accelerates key processes such as labeling environments and implementing day-one policies,” he wrote.

But Kindervag is clear that this isn’t about adding complexity. It’s about enabling mission continuity and operational resilience, even in the face of an attack.  

“Striking the right balance requires a security strategy that enhances protection without introducing inefficiencies or disrupting mission-critical functions,” he explained.

The threats are real, and the systems are vulnerable. Zero Trust isn’t just a framework anymore. It’s the frontline defense we need.

Illumio + NVIDIA: OT just got a Zero Trust upgrade

Illumio is excited to announce that we're teaming up with NVIDIA, and it’s a huge win for securing critical infrastructure operation technology (OT).

Illumio is now integrated directly with NVIDIA BlueField data processing units (DPUs). That means organizations running OT, including energy, manufacturing, and healthcare, can now enforce microsegmentation right at the hardware level, without needing traditional IT security agents or complex deployments.

NVIDIA BlueField DPUs

“Cyber risks against critical infrastructure are more sophisticated and disruptive than ever,” said NVIDIA’s Senior Distinguished Architect for Cybersecurity Ofir Arkin. “Lateral movement remains a key factor in successful attacks.”

That’s exactly the problem Illumio was built to solve. With this integration, security teams can now use Illumio on NVIDIA BlueField to get a full view of network dependencies and enforce segmentation policies, even across complex, converged IT/OT environments.  

Flexible labeling by Illumio lets teams tag assets and segment traffic with surgical precision, even across the IT/OT divide. That means stronger security, better compliance, consistent Zero Trust security, and fewer gaps for attackers to exploit.  

In a world where ransomware can take down manufacturing pipelines and hospital operations, this kind of integration is critical. Illumio and NVIDIA are making Zero Trust real for critical infrastructure, and they’re doing it in a way that’s scalable, resilient, and ready for what’s next.

Contact us today to learn how Illumio can help you contain the breach.

Verwandte Themen

Keine Artikel gefunden.

In Verbindung stehende Artikel

Was braucht es, um die Mikrosegmentierung zu automatisieren?
Zero-Trust-Segmentierung

Was braucht es, um die Mikrosegmentierung zu automatisieren?

In diesem Beitrag finden Sie fünf Bereiche, die Sie mit den Anbietern von Mikrosegmentierungen, die Sie in Betracht ziehen, erkunden können. Setzen Sie Ihre Anbieter in diesen Punkten unter Druck: Sie werden herausfinden, wie weit sie in Bezug auf den Reifegrad und die API-Bereitschaft der Anbieter sind, und Sie werden besser in der Lage sein, qualitativ hochwertige Entscheidungen zu treffen.

Wie Ixom mit Illumio innerhalb von 2 Tagen sofortige Sichtbarkeit und Kontrolle erlangte
Zero-Trust-Segmentierung

Wie Ixom mit Illumio innerhalb von 2 Tagen sofortige Sichtbarkeit und Kontrolle erlangte

Erfahren Sie vom Ixom-Team, das wichtige Systeme für das führende Unternehmen der chemischen Industrie in Australien und Neuseeland schnell sichern musste — und wie ihnen die Sichtbarkeit und Segmentierung von Illumio zum Erfolg verholfen haben.

SolarWinds Breach: Förderung eines Paradigmenwechsels hin zu Zero Trust
Zero-Trust-Segmentierung

SolarWinds Breach: Förderung eines Paradigmenwechsels hin zu Zero Trust

Der SolarWinds-Kompromiss und seine anhaltenden Folgen haben die Schwierigkeit, jeden Berührungspunkt eines Unternehmens mit seinen externen Abhängigkeiten (sei es dieser Anbieter, Kunde oder Partner) zu kontrollieren und zu validieren, in den Mittelpunkt gerückt. Außerdem wird das alte Sprichwort unterstrichen, dass „eine Kette nur so stark ist wie ihr schwächstes Glied“.

The Future of Cyber Resilience: Illumio and NVIDIA Pioneer a New Era of Zero Trust Security
Partner und Integrationen

The Future of Cyber Resilience: Illumio and NVIDIA Pioneer a New Era of Zero Trust Security

Discover how Illumio and NVIDIA are transforming OT cybersecurity with automated, AI-driven segmentation, breach containment, and real-time visibility.

John Kindervag on What Security Leaders Are Still Missing About Zero Trust
Zero-Trust-Segmentierung

John Kindervag on What Security Leaders Are Still Missing About Zero Trust

Discover what cybersecurity leaders are still getting wrong about Zero Trust in this deep dive with Zero Trust creator John Kindervag.

KI-gestützte Cloud-Observability: Ein tieferer Blick auf Illumio Insights mit CPO Mario Espinoza
Illumio Produkte

KI-gestützte Cloud-Observability: Ein tieferer Blick auf Illumio Insights mit CPO Mario Espinoza

Erfahren Sie, wie Illumio Insights KI-gestützte Cloud-Observability nutzt, um Cyberbedrohungen in Echtzeit zu erkennen und einzudämmen.

Assume Breach.
Auswirkungen minimieren.
Erhöhen Sie die Widerstandsfähigkeit.

Sind Sie bereit, mehr über Zero-Trust-Segmentierung zu erfahren?