<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml">
    <url>
        <loc>https://www.illumio.com</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/banking-and-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/zero-trust-segmentation-blog</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/company/careers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/certifications</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/support/contact</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/energy-utilities</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/government</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/company/job-listing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/company/leadership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal-information</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners/msp</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/company/news-awards</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/podcasts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/illumio-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/search</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/support/support</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners/tap</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/webinars</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/company/about-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/lp/forrester-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners/incident-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/demos</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/black-hat-mea</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/use-cases/asset-mapping-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/use-cases/it-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/cybersecurity-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-security-risk-management-australia-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/community</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-security-risk-management-us-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-security-risk-management-japan-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/black-hat-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/illumio-world-tour</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners/partner-finder</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-it-infrastructure-operations-cloud-strategies-conference-las-vegas-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/smb</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/experienced-a-breach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/try-illumio-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/illumio-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/customer-user-club-france-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/infosec-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/why-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-security-risk-management-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cyber-resilience-leadership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/it-sa-expo-congress-in-nuremberg-is-europes-largest-trade-fair-for-it-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/illumio-insights-day-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/insights-free-trial</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/infrastructure-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/security-operations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/insights-admin-faq</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/illumiverse-labs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/gartner-2025-emea-security-risk-management-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/telecoms</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/use-cases/ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/use-cases/protection-strategies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/solutions/retail</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/rsac-2026-registration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/request-a-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/insights-free-trial-b</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/insights-free-trial-c</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources/events/customer-user-club-france-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/insights-free-trial-d</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news-categories/media-coverage</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news-categories/news-release</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/banking-finance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/distribution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/education</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/energy-utilities</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/hospitality-entertainment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/information-technology</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/insurance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/real-estate</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/retail</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-industry/transportation-logistics</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/illumio-culture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/illumio-products</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/partners-integrations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-categories/zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/10-reasons-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/3-steps-to-stopping-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/3-ways-zero-trust-segmentation-helps-energy-operators</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/3-ways-zero-trust-segmentation-helps-financial-organizations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/3-ways-zero-trust-segmentation-solves-healthcare-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/4-steps-to-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/5-best-practices-for-micro-segmentation-in-your-cisco-data-center</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/5-questions-to-ask-before-buying-a-segmentation-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/5-steps-to-deploying-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/6-steps-to-implementing-a-zero-trust-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/a-simple-guide-to-stopping-the-spread-of-breaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/accelerating-zero-trust-with-proactive-threat-prevention-visibility-and-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/achieve-visibility-across-on-premises-and-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/achieving-effective-zero-trust-for-the-new-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/achieving-zero-trust-segmentation-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/adaptive-user-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/advancing-segmentation-to-strengthen-security-and-compliance-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/anatomy-of-a-failed-ransomware-attack-from-intrusion-to-eviction-in-hours</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/application-dependency-mapping</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/application-dependency-mapping-product-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/ardonagh-women-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/asset-mapping-and-visibility-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/aws-illumio-healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/better-together-illumio-endpoint-and-edr</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/beyond-the-hype-conversations-on-mobilizing-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/breach-risk-reduction-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cathay-pacific-on-new-heights-in-lateral-movement-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cert-nz-security-recommendations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/checklist-what-to-look-for-in-a-microsegmentation-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cisa-zero-trust-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-resilience-playbook</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-2023-vanson-bourne-research-highlights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-australia</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-france</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-germany</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-middle-east</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-united-kingdom</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-index-key-findings-united-states</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-security-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cloud-workload-migration-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/compliance-with-gulf-states-data-protection-laws</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/contain-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/corporate-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cost-of-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/critical-asset-protection-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/curb-malware-with-visibility-and-allow-list-policy-control</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/customer-success-advisors</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/cybersecurity-survival-guide-small-midsize-businesses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/department-of-defense-zero-trust-reference-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/do-you-need-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/efficacy-of-micro-segmentation-assessment-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/elementary-and-secondary-education</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/endpoint-security-and-zero-trust-a-discussion-on-stopping-malware-propagation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/endpoint-security-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/environmental-separation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/environmental-separation-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/esg-stopping-cyberattacks-with-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/essential-cybersecurity-controls-for-kingdom-of-saudi-arabia</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/examining-the-new-it-normal</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/faster-incident-response-and-recovery</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/firewall-vs-illumio-containing-breaches-in-the-data-center-and-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/firewalls-vs-illumio-how-long-does-it-take</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/firewalls-vs-illumio-how-much-does-it-cost</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/firewalls-vs-illumio-rule-changes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/firewalls-vs-illumio-writing-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/focus-on-the-workload-micro-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/forrester-consulting-study-trusting-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/forrester-report-cloud-native-application-protection-solutions-landscape-q3-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/forrester-study-111-roi-realized-with-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/forrester-wave-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/gartner-competitive-landscape-network-security-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/gartner-hype-cycle-for-zero-trust-networking-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/gartner-market-guide-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/gartner-peer-insights-voice-of-the-customer-for-network-security-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/getting-started-with-security-graphs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/global-cloud-detection-and-response-report-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/government-is-implementing-zero-trust-for-a-more-secure-future</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/higher-education</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-federal-agencies-find-zero-trust-sanity-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-houston-eye-embraced-a-zero-trust-strategy-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-network-segmentation-helps-deliver-resilience-against-nhs-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-to-build-your-micro-segmentation-strategy-in-5-steps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-to-prevent-ransomware-from-becoming-a-cyber-disaster</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/how-to-stop-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-and-ibm-securing-quantum-computing-with-illumio-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-and-splunk-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-app-for-servicenow</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-app-for-servicenow-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-app-for-splunk-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-appgate-for-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-armis-zero-trust-for-converged-networks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-cloudsecure-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-cloudsecure-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-cloudsecure-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-a-better-approach-to-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-all-about-the-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-an-introduction-to-security-policies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-dns-based-segmentation-that-works</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-for-kubernetes-and-openshift</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-seamless-integrations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-the-power-of-labels</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-core-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-customer-insights-for-amazon-web-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-endpoint-best-practices-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-endpoint-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-endpoint-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-endpoint-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-app-owners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-azure-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-azure-firewall-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-containers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-criminal-justice-information-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-devsecops</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-government</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-managed-service-providers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-microsoft-azure-firewall-pricing-examples</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-microsoft-sentinel-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-nerc-cip-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-small-and-midsize-businesses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-for-supermarket-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-insights-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-insights-in-action-guide</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-keeps-critical-national-infrastructure-up-running-and-compliant</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-netskope-extend-zero-trust-to-remote-access-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-netskope-for-dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-nvidia-bringing-zero-trust-to-the-edge-of-ot</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-nvidia-partner-brief</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-ping-identity-netskope-dynamic-zero-trust-for-remote-access</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-platform-for-securing-ot-environments-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-protecting-the-banking-sector</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-segmentation-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-segmentation-for-containers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-sentinel-integration-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-sentinel-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-technology-alliance-partners-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-the-prescription-for-healthcare-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-vs-traditional-firewalls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumio-wiz-cloud-security-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/illumios-ai-powered-zero-trust-segmentation-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/implementing-zero-trust-with-illumio-and-appgate</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/insights-free-trial-onboarding-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/introducing-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/isolating-microsoft-active-directory-with-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/it-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/ixom-gains-visibility-and-control-with-segmentation-from-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/key-cyber-risks-facing-financial-institutions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/key-findings-from-bishop-fox-ransomware-emulation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/key-findings-from-the-total-economic-impact-of-illumio-zts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/kyndryl-illumio-microsegmentation-implementation-services-guide</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/kyndryl-illumio-microsegmentation-implementation-services-infographic</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/lateral-movement-in-90-seconds</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/living-off-the-land</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/maintaining-energy-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/manufacturing-operations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/mapping-illumio-to-nist-sp-800-207-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/meeting-tsa-security-directive-pipeline-2021-02c-requirements</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/microsegmentation-myths-debunked</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/mythos-fact-sheet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/nis2-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/north-south-east-west-securing-your-network-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/not-your-average-software-agent</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/oracle-exadata-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/pci-compliance-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/pci-segmentation-tco-hardware-firewalls-vs-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/policy-compute-engine-pce-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/precisely</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/protect-critical-assets</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/protect-your-hybrid-infrastructure-with-geo-fencing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/protecting-oracle-exadata-workloads-with-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/qa-the-zero-trust-cure-for-ransomware-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/qbe-insurance-bolsters-multi-cloud-strategy-with-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/qbe-insurance-takes-next-step-on-its-zero-trust-journey-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/qbe-prevents-breach-from-spreading-with-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/qbe-sees-faster-time-to-value-with-illumios-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/ransomware-containment-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/ransomware-protection-dashboard</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/ransomware-scenario-emulation-2022-assessment-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/reduce-security-silos-micro-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/reduce-vulnerability-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/roi-of-zero-trust-segmentation-realizing-cost-effective-results</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/roi-of-zero-trust-segmentation-reduced-complexity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/roi-of-zero-trust-segmentation-simplified-operations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/safeguard-every-swipe-addressing-the-challenges-of-pci-compliance-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/seacost-cybersecurity-group-modern-cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/secure-beyond-breach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/secure-cloud-workload-migration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/secure-kubernetes-and-openshift-with-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/securing-healthcare-organizations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/security-objective-you-need-to-focus-on</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/security-risks-2021-ransomware-endpoints-and-the-return-to-the-office</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/see-the-benefits-of-combining-zts-and-edr</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/segmentation-showdown-firewalls-vs-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/segmentation-that-isnt-hard</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/simplified-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/simplifying-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/simplifying-segmentation-for-healthcare-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/state-and-local-governments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/stop-ransomware-and-isolate-breaches-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/tactical-edge-deployed-aircraft</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/tactical-edge-staged-deployed-resources</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/tactical-edge-warfighter</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/technical-account-manager-brief</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-big-book-of-breaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-big-book-of-breaches-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-breach-containment-buyers-guide</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-buyers-guide-to-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-buyers-guide-to-modern-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-containment-gap-exploring-the-distance-between-detection-and-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-current-state-of-zero-trust-in-the-united-kingdom</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-efficacy-of-micro-segmentation-insights-from-bishop-fox</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-essential-9-why-critical-infrastructure-companies-in-australia-need-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-evolution-of-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-fewer-clicks-the-better-micro-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-illumio-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-illumio-breach-containment-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-illumio-enlighten-partner-program-advantage</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-illumio-zero-trust-segmentation-platform-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-purdue-model-evolved-securing-ai-and-industry-6-0</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-state-of-security-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-three-eras-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-time-for-microsegmentation-is-now-webinar-qa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-total-economic-impact-of-illumio-zts-security-benefits</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-value-of-risk-based-visibility-for-ransomware-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/the-what-why-and-how-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/think-lean-and-scalable-micro-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/think-like-an-attacker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/think-like-an-attacker-de</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/three-steps-to-effectively-segment-your-pci-environment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/top-5-cloud-security-problems</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/top-healthcare-security-challenges</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/top-segmentation-attributes-to-simplify-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/total-economic-impact-zero-trust-segmentation-customer-highlights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/trusting-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/understanding-the-nsas-zero-trust-network-guidance-a-conversation-with-john-kindervag-kate-kuehn</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/use-multi-dimensional-labels-micro-segmentation-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/using-illumio-vulnerability-mapping</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/virtual-enforcement-node-ven-overview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/visibility-and-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/visibility-hybrid-attack-surface</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/vulnerability-risk-reduction-explainer-video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/why-choose-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/why-is-illumio-better-than-a-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-in-on-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-a-strategic-imperative-for-credit-unions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-and-the-human-element</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-helps-organizations-avoid-cybersecurity-disasters</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-australia-key-findings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-esg-research-highlights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-french-key-findings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-ja</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-key-findings-for-small-and-midsize-enterprises</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-singapore-key-findings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-uk-key-findings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-impact-report-wichtigste-ergebnisse-aus-deutschland</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-dora</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-dummies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-for-energy-providers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-for-healthcare-organizations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-for-manufacturing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-segmentation-in-banking-and-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resource-center/zero-trust-vendor-illumio-named-a-leader-in-the-forrester-wave-zero-trust-extended-ecosystem-platform-providers-q3-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/a-quantitative-approach-to-innovation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/ai-just-raised-the-stakes-in-cybersecurity-now-what-neil-robinson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/assume-breach-build-trust-zero-trust-lessons-from-stcu</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/bolstering-federal-cyber-resilience-and-demonstrating-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/breaking-barriers-women-redefining-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/cyber-equity-and-empowering-through-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/embracing-visibility-consistency-and-control</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/from-compliance-to-containment-the-new-era-of-financial-services-supervision-phil-park</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/from-hype-to-guardrails-building-ai-you-can-actually-trust-josh-woodruff</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/from-the-white-house-to-the-boardroom-tony-scott-on-leading-transformative-tech</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/how-cybercriminals-manipulate-trust-then-steal-millions-timothy-kromphardt</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/humanizing-cybersecurity-the-mission-driven-mindset</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/inside-the-fbi-playbook</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/introducing-the-segment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/live-from-black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/live-from-rsac-test-verify-validate</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/navigating-dora-compliance-through-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/practicing-zero-trust-and-adopting-assume-breach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/protecting-data-in-new-ways</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/questioning-the-status-quo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/resilience-over-prevention</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/rethinking-cybersecurity-from-awareness-to-empowerment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/scaling-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/spiral-now-not-later-rethinking-ransomware-readiness</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/strengthening-our-collective-defense</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/striding-towards-zero-ish-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-cisos-playbook</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-cybersecurity-seatbelt-a-cyberpsychologists-take-on-moving-from-awareness-to-preparedness</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-everyday-battle-in-cyberspace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-evolving-ciso</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-math-doesnt-math-why-a-former-white-house-cio-says-cybersecurity-is-broken-theresa-payton</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-perception-of-reality</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-security-challenges-of-modernization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/the-zero-trust-origin-story</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/trust-resilience-the-new-frontlines-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/turning-risk-into-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/unpacking-zero-trust-in-higher-education</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/what-is-the-cost-of-loss</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/why-cybersecurity-must-serve-the-business-not-block-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/why-doing-the-basics-in-cyber-is-so-hard--and-so-necessary-ross-haleliuk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/worldwide-leader-for-security-go-to-market</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/you-cant-spell-zero-trust-without-ot</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/podcast/zero-trust-mapped-and-matured</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/brief</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/guide</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/infographic</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/recorded-webinar</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/resources-asset-types/video</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/10-reasons-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/10-reasons-why-illumio-is-the-fastest-way-to-build-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/10-ways-illumio-makes-it-simple-to-build-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/100-percent-cloud-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/2018-security-predictions-pj-kirner</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/2022-gartner-hype-cycle-workload-network-security-microsegmentation-high-benefit-technology</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/2023-gartner-market-guide-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/2025-cbest-thematic-report-what-the-data-reveals-about-cyber-fragility-in-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/2025-hipaa-security-updates-what-healthcare-organizations-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-benefits-of-zero-trust-segmentation-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-best-practices-implementing-illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-challenges-federal-agencies-modern-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-cybersecurity-rules-microsofts-sherrod-degrippo-lives-by-and-why-you-should-too</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-highlights-illumio-rsa-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-new-ways-to-simplify-zero-trust-segmentation-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-practical-ways-to-win-buy-in-for-your-cybersecurity-projects</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-qualities-zero-trust-segmentation-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-reasons-implement-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-takeaways-from-the-2025-gartner-market-guide-for-network-security-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-takeaways-zero-trust-executive-order-14028</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-things-you-should-be-looking-for-at-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/3-ways-to-get-the-most-out-of-your-illumio-insights-free-trial</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-mindset-shifts-required-secure-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-more-ways-to-get-hands-on-value-from-your-illumio-insights-free-trial</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-reasons-microsegmentation-requires-a-platform-approach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-steps-building-cloud-migration-plan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-strategies-to-empower-women-for-success-in-their-cybersecurity-careers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-things-need-to-know-illumio-rsa-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/4-things-you-need-to-know-about-illumio-at-infosecurity-europe-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-cybersecurity-leadership-lessons-from-former-citi-ciso-carl-froggetts-30-year-career</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-cybersecurity-threats-protect-against</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-lessons-illumio-intern-ivy-zhang-learned</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-reasons-you-cant-miss-the-first-ever-illumio-world-tour-in-new-york-city</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-steps-curb-malware-ransomware-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-things-i-learned-from-a-former-fbi-most-wanted-hacker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-ways-illumios-upgraded-community-and-technical-documentation-portals-empower-your-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-ways-to-solve-the-speed-vs-security-dilemma-in-cloud-devops</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-zero-trust-myths-busted-by-john-kindervag-and-michael-farnum</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-zero-trust-takeaways-higher-ed-cso-george-finney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-zero-trust-tips-from-cyleras-chief-security-strategist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/5-zero-trust-tips-infosys-ciso-vishal-salvi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/6-benefits-illumio-channel-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/6-microsegmentation-project-risks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/6-zero-trust-insights-ibm-security-stephen-coraggio-greg-tkaczyk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/7-practical-tips-for-cisos-building-zero-trust-from-netskope-ciso-neil-thacker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/7-reasons-federal-sector-illumio-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/8-reasons-why-banking-financial-services-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/9-reasons-energy-operators-implement-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/9-reasons-healthcare-providers-implement-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/9-reasons-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/a-cyberpsychologists-take-on-cybersecuritys-culture-of-blame</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/a-former-white-house-cio-on-why-zero-trust-must-be-designed-for-how-people-actually-work</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/a-guide-to-navigating-the-policy-overload-in-todays-distributed-systems</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/agent-based-vs-agentless-security-whats-the-best-approach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/agentless-container-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-agents-are-becoming-digital-employees-heres-how-zero-trust-secures-them</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-communication-problem</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-generated-attacks-how-to-stay-protected-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-is-moving-fast-in-federal-cybersecurity-are-we-securing-it-fast-enough</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-machine-learning-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-powered-cloud-observability-a-deeper-look-at-illumio-insights-with-cpo-mario-espinoza</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ai-shouldnt-be-trusted-why-understanding-that-can-be-transformative</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/airlines-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/allowlist-vs-denylist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/andrew-rubin-distinguished-alumni-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/andrew-rubin-illumio-cnbc-disruptor-50</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/andrew-rubin-on-being-an-ey-entrepreneur-of-the-year-2024-bay-area-award-winner</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/anti-fragility-how-zero-trust-turns-ai-threats-into-strengths</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/api-security-ciso-richard-bird-on-the-power-of-cyber-creativity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/app-owner-view</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/app-owner-view-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/are-smart-manufacturing-leaving-your-operations-vulnerable</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/assume-breach-zero-trust-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/atm-hacks-a-hidden-cyber-threat-to-bank-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/au-government-security-1</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/au-government-security-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/auditors-love-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/australias-cloud-security-paradox-high-confidence-low-context</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/australias-new-boardroom-baseline-5-new-asd-and-aicd-security-priorities</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/aws-guardduty</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/aws-illumio-healthcare-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/aws-marketplace-illumio-leading-cloud-security-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/balancing-security-and-operational-resilience-illumios-strategy-for-secure-and-stable-software-releases</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/being-an-illumio-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/beyond-the-gate-zero-trust-and-the-defense-of-active-directory</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/bishop-fox-zero-trust-segmentation-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/black-hat-mea-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/black-hat-usa-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/blackmatter-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/board-buy-in-cybersecurity-investments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/breach-recovery-government-security-initiatives</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/breaches-security-hygiene</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/bring-segmentation-to-your-soc-with-the-illumio-microsoft-sentinel-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/broadcast-multicast-filters</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/brooks-running-stop-ransomware-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/bt-and-illumio-simplifying-dora-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/build-zero-trust-strategy-ibm-security-illumio-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/building-siemens-zero-trust-program-3-things-thomas-mueller-lynch-learned</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/can-zero-trust-bridge-the-cyber-equity-gap</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cathay-pacific-micro-segmentation-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ccpa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ccpa-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/celebrating-illumios-2025-global-partner-awards-winners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/certified-services-delivery-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/choose-best-cybersecurity-vendor</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cis-top-20</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cisa-says-microsegmentation-is-critical-heres-how-agencies-can-get-it-done</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ciso-ai-questions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ciso-guide-2022-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/clop-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-breach-response-containment-illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-detection-and-response-cdr-is-evolving-heres-where-illumio-insights-fits</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-hopper-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-loves-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-false-assumptions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-false-assumptions-part-two</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-innovations-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-maturity-5-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-requires-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-traffic-monitoring-control</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cloud-security-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cnapps-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/codecov</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/color-vision-deficiency-filter</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/common-criteria-federal-agencies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/connected-medical-devices-healthcare-cybersecurity-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/contain-ransomware-at-its-source-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/container-microsegmentation-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/container-security-is-broken-and-zero-trust-can-help-fix-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/container-security-p2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/containers-clusters</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/containers-security-an-essential-guide-to-protecting-kubernetes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/conti-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/crn-partner-program-guide-rating</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/crn-uk-channel-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/crown-jewel-asset-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/customer-perspective-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/customer-story-ixom</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/customer-story-servicenow</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-change-define-zero-trust-illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-consultant-stephen-j-white-on-how-to-align-security-with-business-outcomes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-incident-response-part-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-incident-technical-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-insurance-is-getting-stricter-heres-how-illumio-helps-you-keep-up</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-monday-high-value-assets</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-approaches-new-illumio-tools-and-the-hacking-humans-podcast</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-banking-sector-top-security-priority</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-best-practice</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-cisa-strategic-plan-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-energy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-mitre-attack-framework</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyber-resilience-zero-trust-march-month-in-review</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cyberattacks-zero-trust-analysis-paralysis-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-ai-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-best-practices-improve-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-career-choice</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-tips</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-awareness-month-zero-trust-segmentation-tips</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-biotech-pharma</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-eo-agencies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-executive-order</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-innovation-september-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-is-broken-why-outcomes-arent-improving-and-what-needs-to-change</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-law-firms</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-national-resilience-imperative</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-news-stories-february-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-news-stories-january-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-predictions-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-predictions-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-predictions-2023-come-true</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-predictions-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-predictions-2026-expert-insights-on-the-trends-shaping-the-year-ahead</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-questions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-roi-critical-infrastructure-zero-trust-implementation-plan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/cybersecurity-value</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/data-center-application-mapping</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/data-center-cloud-security-revolution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/data-center-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/decade-after-worst-ever-year-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/deloitte-tech-fast-500-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/demystifying-containers-whats-a-service-mesh-and-its-security-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/demystifying-ransomware-techniques-using-net-assemblies-5-main-techniques</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/denmark-largest-critical-energy-infrastructure-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/detect-and-contain-lateral-movement-in-the-cloud-with-illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/devops-love-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/digital-escalation-dominance-why-cyber-success-means-staying-operational</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/domain-controller</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/domain-controller-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/domain-controller-3</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/dora-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/dr-larry-ponemon-on-why-containment-not-prevention-is-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/edr-containment-endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/endpoint-lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/endpoint-traffic-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/enforcement-boundaries-use-cases</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/engineering-center-toronto</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/esg-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/esg-zero-trust-segmentation-providers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/essential-vulnerability-management-efforts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-compliance-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-compliance-gdpr-cyber-essentials</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-compliance-ot-cs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-compliance-telecoms</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/eu-nis2-dora-security-directives-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/evolution-systems-design-write-only-interfaces-multi-cloud-automation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/exe-vs-dll-assemblies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-order-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-spotlight-ben-verghese</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-spotlight-cmo-karl-van-den-bergh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-spotlight-gautam-mehandru</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-spotlight-l-david-kingsley</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/executive-spotlight-todd-palmer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/exploiting-human-trust-still-beats-hacking-code-and-how-zero-trust-helps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/f5</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/federal-cybersecurity-essentials</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/federal-cybersecurity-legacy-it-systems-illumio-cloudsecure-recognition</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/federal-omb-zero-trust-memo-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/federal-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/fedramp-in-process-designation-2023-cybersecurity-expectations-channel-sales-growth</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/fight-ransomware-faster-centralized-visibility-enforcement-boundaries</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/firewall-network-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/firewall-stateful-inspection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/firewall-team-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/firewalls-microsegmentation-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/firewalls-versus-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/five-questions-you-should-ask-before-buying-a-segmentation-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/flexible-cloud-service-models-less-expensive</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forbes-cloud-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forget-ai-moonshots-focus-on-automating-the-boring-stuff-first</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forrester-names-illumio-a-leader-in-the-forrester-wave-microsegmentation-solutions-q3-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forrester-roi-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forrester-wave-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/forrester-zero-trust-platforms-landscape-q2-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/france-detects-breaches-just-fine-so-why-are-they-still-causing-downtime</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/from-are-you-protected-to-can-you-operate-why-regulators-want-resilience-not-just-controls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gartner-competitive-landscape-for-network-security-microsegmentation-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gartner-it-infrastructure-operations-cloud-strategies-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gartner-security-risk-management-summit-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gartner-security-risk-management-summit-2024-sydney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gerald-carron-5-zero-trust-insights-federal-agencies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/germanys-cloud-alert-volume-is-the-highest-in-the-world-heres-the-fix</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/get-5-zero-trust-insights-from-aws-shawn-kirk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/get-ready-for-gartner-itiocs-na-2024-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/getting-the-most-out-of-your-zero-trust-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/gitex-global-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/global-cloud-detection-and-response-report-q-a-on-the-human-side-of-cloud-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/global-cost-of-ransomware-study-what-the-numbers-tell-us</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/go-back-to-security-basics-to-prepare-for-ai-risks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/go-beyond-the-audit-achieve-continuous-compliance-with-illumio-servicenow</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/government-cybersecurity-mission-assurance-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/guide-cybersecurity-2023-illumio-experts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/guide-to-black-hat-defcon</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hacker-zero-trust-segmentation-nightmare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hands-on-breach-containment-training-illumiverse-labs-in-may-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/healthcare-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/healthcare-ransomware-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/healthcare-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/here-be-dragons-the-growing-cyber-threats-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hidden-connectivity-cloud-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/highlights-from-black-hat-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/himss-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hive-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/host-based-segmentation-simplification</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-a-zero-trust-strategy-built-on-microsegmentation-solves-cloud-risks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-ai-powered-cdr-segmentation-power-simpler-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-ai-security-graphs-are-changing-cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-armis-cto-carlos-buenanos-ot-security-journey-led-to-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-can-healthcare-prepare-increasing-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-cloud-detection-and-response-with-illumio-insights-helps-you-stay-compliant</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-cybersecurity-education-expert-kyla-guru-is-solving-cyber-insecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-hgc-protects-global-network-zero-trust-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-armis-secure-modern-ot-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-closes-visibility-gaps-in-container-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-complements-your-firewalls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-helps-federal-agencies-secure-mainframes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-simplified-ebays-large-scale-microsegmentation-project</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumio-stops-ransomware-lateral-movement-in-hybrid-multi-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-illumios-iso-27001-certification-strengthens-your-supply-chain-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-microsoft-illumio-integrations-deliver-your-ai-powered-breach-containment-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-security-graphs-turn-cyber-noise-into-real-risk-action</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-swacrit-and-ros-tech-closed-the-segmentation-gap-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-the-5-person-security-team-at-spokane-teachers-credit-union-achieves-big-zero-trust-wins</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-the-u-s-navy-and-department-of-homeland-security-made-zero-trust-work</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-achieve-dora-compliance-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-automate-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-build-a-zero-trust-security-strategy-that-puts-breach-containment-first</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-contain-breaches-and-regain-control-in-your-multi-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-eliminate-security-silos-across-the-hybrid-multi-cloud-with-illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-implement-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-meet-cisa-phobos-ransomware-containment-guidance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-meet-hkma-or-2-compliance-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-stop-a-cloud-attack-chain-with-illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-to-strengthen-security-posture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-western-union-built-scalable-microsegmentation-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/how-zero-trust-keeps-federal-cybersecurity-strong-during-uncertainty</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/human-error-the-clouds-biggest-security-risk-and-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hybrid-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/hybrid-network-security-illumio-cspm-cwpp-vendors</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ibm-aix-oracle-solaris-support</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ibm-qradar-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ibm-security-application-visibility-segmentation-solution-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ibm-z-linuxone-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-10-biggest-moments-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-achieves-common-criteria-designation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-agent-more-reliable-than-inline-agents</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-and-wiz-automatically-see-detect-and-contain-cloud-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-and-wwt-partner-to-guide-your-zero-trust-journey</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-appgate-securing-interior-perimeter-network-traffic</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-best-practices-cloud-security-alliance-csa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-boston-aws-reinforce-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-cloudsecure-contain-cloud-attacks-proactive-segmentation-policy-controls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-collaborates-with-microsoft-to-strengthen-companys-cyber-resilience-and-prevent-breaches-at-scale</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-core-automated-enforcement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-cve-numbering-authority</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-endpoint-demo-quick-endpoint-segmentation-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-engineer-future-security-visualization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-expands-its-partner-services-delivery-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-expands-middle-east-strengthen-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-firemon-closing-the-gaps-firewalls-cant-see</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-for-microsoft-azure-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-for-microsoft-azure-firewall-zero-trust-segmentation-benefits</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-for-microsoft-sentinel-unified-graph-powered-security-at-cloud-scale</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-himss-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-in-process-fedramp-marketplace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-innovation-lookback-what-we-built-in-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-insights-check-point-unified-visibility-and-threat-detection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-insights-is-a-launch-partner-in-the-new-microsoft-marketplace-ai-apps-and-agents-category</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-intern-experience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-internship</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-internship-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-is-a-2026-gartner-peer-insights-customers-choice-for-network-security-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-lowers-ach-group-cyber-risk-zero-overhead</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-mac-isolate-stop-ransomware-spread-macos</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-market-momentum-rsa-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-microsoft-azure-firewall-cloud-security-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-microsoft-ignite-2022-breach-containment-protect-azure-assets</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-monthly-news-roundup-february-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-named-among-notable-vendors-in-the-forrester-microsegmentation-landscape-q2-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-netskope-build-a-complete-zero-trust-security-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-pet-patrol-meet-10-of-our-cybersecurity-pawfessionals</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-pet-patrol-meet-6-more-of-the-cybersecurity-pawfessionals-behind-our-team</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-recognized-in-5-gartner-hype-cycle-reports</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-sam-reese-2023-crn-woman-of-the-channel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-simplifies-zero-trust-segmentation-with-flexible-licensing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-strengthens-google-cloud-platform-support-to-contain-risk-across-distributed-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-bring-your-best</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-build-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-leverage-differences</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-onwards-together</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-run-to-challenges</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-values-seek-truth</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-wins-ibm-security-excellence-global-partnering-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-wiz-integration-automated-cloud-breach-detection-and-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-world-tour-2025-is-coming-to-a-city-near-you</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-xcellence-award-boardroom-execution-msp-xchange-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-zero-trust-segmentation-company-black-hat-2022-las-vegas</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumio-zero-trust-segmentation-delivers-provable-risk-reduction-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumios-agentless-container-security-expands-to-aks-gke-and-openshift-ovn</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumios-cto-and-co-founder-pj-kirner-shares-5-zero-trust-tips</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumios-deborah-caldwell-is-a-2024-crn-woman-of-the-channel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumiverse-labs-hands-on-breach-containment-virtual-experiences-for-security-practitioners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/illumiverse-labs-live-breach-containment-events-in-march-and-april-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/implement-micro-segmentation-gradually</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/implement-zero-trust-avoid-crippling-cost-downtime</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/improved-approach-building-cyber-resilient-system-illumio-new-ibm-linuxone-servers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/incident-response-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/increase-cybersecurity-roi-combine-zts-edr</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/industry-collaboration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/industry-experts-cybersecurity-best-practices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/infosecurity-europe-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/infosecurity-europe-2023-energy-sector-resilience-higher-ed-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/infrastructure-team-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-alex-goller</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-allan-bahati</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-andree-winter</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-anna-brafchak</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-audrey-aldo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-basel-baroudi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-becky-williams</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-bob-fitzpatrick</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-brian-pitta</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-cameron-gonsales</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-ceo-andrew-rubins-cybersecurity-leadership-playbook</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-chandni-adiani</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-chris-clarkson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-di-sun</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-eric-zhao</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-evangeline-de-guzman</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-faraz-aladin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-genesa-poggioni</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-gianfranco-spatola</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-gina-geraci</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-grant-rexer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-iris-shieh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-jack-bagshaw</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-jared-davis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-jason-emerson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-joyce-leung</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-katherine-morgan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-leila-nejad</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-lilia-posada</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-lynn-han</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-maria-thompson-saeb</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-mark-trinidad</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-matt-johnson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-matt-parsons</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-michael-adjei</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-minerva-panda</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-neha-shah</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-neil-patel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-nicole-wright</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-nicole-yox</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-ofek-avidan-antonir</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-paul-dant</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-rabih-sabbagh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-raven-gao</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-rosy-bhullar</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-rushabh-sanghvi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sajjad-lateef</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sandra-lee</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sarang-joshi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-scott-walker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-shell-de-bont</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sophina-gellon</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sudha-iyer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-sumi-gorla</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-susan-fagel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-swarna-kumari</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-wassim-daghash</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-will-green</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumio-zachi-neuman</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-illumios-new-enlighten-partner-program-with-todd-palmer-svp-of-global-partner-sales-and-alliances</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-the-f5-breach-what-it-teaches-us-about-state-sponsored-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/inside-the-investingation-hunting-hackers-through-the-foundationanl-four</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/intent-based-networking</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/introducing-epic-illumios-new-partner-technical-champion-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/is-your-cloud-vendors-cybersecurity-enough</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/it-security-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/its-intern-season-at-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/japans-cloud-security-reality-efficient-on-the-surface-exposed-where-it-matters-most</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/john-kindervag-on-what-security-leaders-are-still-missing-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/john-kindervag-shares-zero-trusts-origin-story</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/john-kindervag-zero-trust-government-agencies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-at-the-2025-gartner-security-risk-management-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-at-the-gartner-2025-apac-security-and-risk-management-summit-in-sydney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-at-the-gartner-security-risk-management-summit-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-in-london-at-the-gartner-2025-emea-security-risk-management-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-rsa-conference-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/join-illumio-rsa-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/kaseya-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/kpmg-partner-indy-dharmi-explains-where-to-start-with-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/kubernetes-cluster-io-mess</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/kubernetes-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/labelling-tips</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/labels-tags-simplifying-cloud-migration-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/lateral-movement-how-to-solve-the-clouds-biggest-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/latin-america-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/law-firm-ransomware-attack-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/leader-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/learnings-from-3-recent-cyberattacks-point-to-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/lights-camera-hacking-cyber-experts-critique-hollywood-hackers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-illumio-core-soar-platforms-integrations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-core-services-detector</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-enhanced-data-collection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-mesh-visualization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-the-illumio-map</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-traffic-and-map</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-virtual-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/little-known-features-of-illumio-core-vulnerability-maps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/lockbit-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/log4j-vulnerabilities-devsecops</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/lost-in-the-data-forest-get-clarity-with-illumios-granular-network-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ma-and-divestitures</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/making-the-invisible-visible-how-illumio-is-innovating-visualizations-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/malware-payload-beacon</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/malware-payload-beacon-mitigation-techniques</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/manage-cyberattack-legal-fallout</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/managing-cyber-risk-building-cyber-resilience-securing-hybrid-work</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/manufacturers-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/manufacturing-ciso-tips-proactive-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/manufacturing-operations-resilient</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/manufacturing-secure-iiot-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/mapping-the-future-why-cybersecurity-visibility-is-the-greatest-advantage</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-aditi-patil-q-a-with-an-illumio-cloud-engineering-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-brian-lee-q-a-with-an-illumio-finance-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-colby-cook-q-a-with-an-illumio-sales-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-at-himss-2025-in-las-vegas</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-at-infosecurity-europe-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-at-microsoft-ignite-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-in-las-vegas-at-black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-in-london-at-the-gartner-security-risk-management-summit-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-illumio-in-tokyo-at-the-gartner-security-risk-management-summit-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-insights-agent-your-ai-teammate-for-threat-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-kayla-ishisaki-illumio-people-ops-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/meet-salinka-dhamija-q-a-with-an-illumio-marketing-ops-intern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-hi-temp-insulation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-pharmaceutical</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-policy-generator</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-policy-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-questions-app-owners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/micro-segmentation-requirements</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-accelerate-project</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-deployment-process</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-deployment-team</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-leader-forrester-new-wave</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-meets-detection-and-response-why-theyre-stronger-together</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-security-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-value</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microsegmentation-vendor-relationship-operational-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/microservices-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/mind-the-context-gap-why-uk-security-teams-are-struggling-to-investigate-what-matters</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/mitigate-ransomware-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/modern-trojan-horse-how-attackers-live-off-the-land-and-how-to-stop-them</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/money-20-20-usa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/moveit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/name-wreck-visibility-containmemt</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/national-cybersecurity-strategy-implementation-plan-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/natural-language</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ndr-vs-illumio-insights-detecting-and-containing-lateral-movement-in-the-hybrid-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/network-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/network-security-containers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/network-security-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/network-vs-security-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/new-fincen-ransomware-report-banks-must-contain-materiality-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/next-generation-firewalls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ngfw-functionality-microsegmentation-environment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/nibe-microsegmentation-deployment-success</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/nis2-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/no-zero-trust-without-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/nsa-cybersecurity-information-sheet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/oak-hill-advisors</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/operationalizing-zero-trust-step-1</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/oracle-exadata</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ot-networks-segmentation-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/our-takeaways-from-the-gartner-6-principles-of-successful-network-segmentation-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/out-of-sight-out-of-mind-the-dangers-of-ignoring-cloud-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/p2p-app-challenges</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/palo-alto-networks-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/palo-alto-networks-integration-deep-dive</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/pce-certificate-checks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/practitioners-guide-to-rsa-2017</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/preparing-for-dora-insights-from-2-cybersecurity-compliance-experts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/protect-ot-without-layer-7-deep-packet-inspection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/protect-your-cloud-workload-migration-with-illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/protecting-ibm-mainframes-with-illumio-a-practitioners-perspective</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/qbe-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransom-payments-zero-trust-microsoft-azure-firewall-uk-breaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-attacks-common-pattern</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-containment-four-core-principles</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-in-2025-cost-trends-and-how-to-reduce-your-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-protection-dashboard</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-protection-enforcement-boundaries</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-small-midsize-organizations-stop-spread</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ransomware-techniques-net-assemblies-multi-stage-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/rdp-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/rebekah-mcadams-crn-woman-channel-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/reduce-zero-trust-segmentation-complexity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/reliable-roi-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/resilient-critical-infrastructure-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/revil-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/risk-based-visibility-ransomware-protection-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/risk-mitigation-flat-network</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/roi-cybersecurity-investments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/rsa-conference-highlights-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/rsac-2024-3-conversations-you-mightve-missed</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ruchika-chopra-top-woman-leader-saas</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/russia-ukraine-crisis-mitigate-risk-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/s-and-p-global-top-3-critical-infrastructure-ransomware-threat</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/s3-buckets-log-export</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/school-districts-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/school-ransomware-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/sean-connelly-shares-how-zero-trust-modernized-federal-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/secure-connectivity-for-ot-security-what-new-global-guidance-means-for-industrial-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/secure-hybrid-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/secure-legacy-technology-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/secure-new-tcp-port-135-security-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/secure-windows-servers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/security-for-containers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/security-myths-apac</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/security-practitioners-framework-ai-safety-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/see-everything-chase-nothing-whats-new-in-illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/see-whats-new-at-illumio-better-security-visibility-and-efficiency</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/segmentation-approaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/segmentation-matters-now-cyber-insurance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/segmentation-structured-policy-control</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/sheltering-in-place</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/should-we-worry-about-cybersecurity-becoming-too-dependent-on-ai</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/simplified-automation-illumio-single-sign-on-microsoft-azure-active-directory-app</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/small-midsize-businesses-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/smbs-cant-afford-to-put-off-a-zero-trust-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/solarwinds-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/speaking-security-how-cisos-can-translate-risk-into-language-that-actually-moves-people</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/splunk-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/splunk-secops-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/state-and-local-governments-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/stop-breach-spread-illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/stop-chasing-shadows-smarter-threat-hunting-with-illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/stop-global-cyber-threats-ukraine-russia-conflict</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/successful-microsegmentation-projects-new-approach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/successful-microsegmentation-projects-right-tools</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/successful-microsegmentation-projects-strategic-principles</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/supercluster-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/supply-chain-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/take-these-3-next-steps-if-your-government-agency-is-building-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/telhio-credit-union-growth-cyber-resilience-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-business-of-cybercrime-what-a-former-fbi-assistant-director-wants-every-ciso-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-ciso-playbook-how-dxc-ciso-mike-baker-is-aligning-cybersecurity-with-business-growth</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-cisos-playbook-how-trust-makes-security-a-business-growth-engine</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-cisos-playbook-why-ai-defense-starts-with-context-not-hype</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-cisos-playbook-why-you-need-to-make-security-risk-a-business-metric</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-complete-guide-to-illumio-at-black-hat-usa-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-complete-guide-to-illumio-at-rsa-conference-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-complete-guide-to-illumio-at-rsac-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-complete-guide-to-illumio-at-rsac-conference-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-evolution-of-adaptive-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-future-of-cyber-resilience-illumio-and-nvidia-pioneer-a-new-era-of-zero-trust-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-future-of-cybersecurity-is-anti-fragile-not-just-resilient</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-future-of-secure-code-execution-embracing-collaborative-ebpf-approaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-hidden-flaw-in-data-center-security-endpoint-connectivity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-illumio-world-tour-is-coming-to-london-what-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-illumio-world-tour-is-coming-to-sydney-heres-everything-you-need-to-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-limits-of-working-memory-human-brains-vs-ai-models</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-master-key-problem-what-the-salesloft-breach-reveals-about-an-ongoing-threat</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-next-chapter-of-the-illumio-msp-program-and-what-it-means-for-partners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-segment-zero-trust-leadership-podcast-bishop-fox-rob-ragan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-segment-zero-trust-leadership-podcast-brooks-running</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-segment-zero-trust-leadership-podcast-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-segment-zero-trust-podcast-gary-barlet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/the-segment-zero-trust-podcast-microsoft-ann-johnson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/this-fiscal-years-federal-zero-trust-progress-an-expert-q-a</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/threat-detection-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/time-to-rewrite-the-entire-cybersecurity-model-or-face-the-consequences</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/toolshell-cisas-warning-to-federal-agencies-about-a-new-remote-code-execution-vulnerability</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-3-challenges-securing-containers-kubernetes-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-3-cybersecurity-news-stories-october-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-december-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-april-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-april-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-april-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-august-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-august-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-december-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-december-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-february-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-february-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-january-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-january-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-july-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-july-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-june-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-june-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-march-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-march-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-march-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-may-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-may-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-november-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-november-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-november-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-october-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-october-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-september-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/top-cybersecurity-news-stories-from-september-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/traditional-security-approaches-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/treffen-sie-illumio-auf-der-it-sa-expo-congress-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/trusted-credentialed-dangerous-the-new-insider-threat-facing-banks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/two-breaches-one-bank-lessons-from-the-icbc-cyber-crisis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/two-gartner-hype-cycle-reports</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/types-malicious-payloads</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/uncover-kubernetes-blind-spots-why-agentless-container-security-is-a-must-have</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/us-cybersecurity-strategy-healthcare-breaches-illumio-market-momentum</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/utilities-attacks-are-becoming-more-disruptive-what-operators-can-do</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/vanson-bourne-cloud-research-takeaways</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/visibility-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/visibility-vs-observability-why-context-matters-more-than-ever-in-the-cloud-era</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/vulnerabilities-stop-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/vulnerability-exposure-score</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/want-to-break-in-to-the-cybersecurity-industry-2-experts-share-their-experience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/way-beyond-visibility-how-illumio-insights-connects-your-critical-security-dots</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/welcome-to-the-post-breach-era-is-your-cyber-strategy-ready</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/west-bend-mutual-insurance-cloud-migration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-2024-taught-us-about-federal-zero-trust-momentum-and-whats-next-in-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-are-you-waiting-for-delaying-cyber-modernization-is-putting-you-at-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-illumio-fedramp-authorization-means-for-our-federal-customers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-is-a-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-is-ai-powered-cloud-observability-a-complete-guide</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-is-nano-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-is-the-principle-of-least-privilege</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-nonprofits-are-teaching-the-cybersecurity-industry</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-project-glasswing-means-for-the-people-running-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-steph-curry-can-teach-us-about-enterprise-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-steph-curry-can-teach-us-about-enterprise-security-part-two</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-to-expect-when-starting-out-with-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-us-navy-seal-and-army-strategies-can-teach-you-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-you-missed-at-rsac-2025-5-favorite-moments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/what-you-missed-at-the-illumio-world-tour-our-4-favorite-moments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/whats-the-baseline-for-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-a-zero-trust-strategy-requires-both-zts-and-ztna</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-businesses-still-pay-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-cyber-disasters-are-still-happening-how-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-detection-fails-without-containment-and-how-security-graphs-can-help-fix-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-edr-needs-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-medusa-ransomware-is-a-growing-threat-to-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-microsegmentation-is-the-answer-to-gen-ai-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-openclaw-is-a-wake-up-call-for-ai-agent-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-security-fundamentals-are-the-most-overlooked-part-of-adopting-a-zero-trust-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/why-traditional-cloud-security-is-failing-and-5-strategies-to-fix-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/will-the-eu-banking-industry-be-prepared-for-dora</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/women-in-cybersecurity-share-their-top-leadership-lessons</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/work-smarter-not-harder-with-illumios-new-ai-powered-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/workload-labelling-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/workload-security-integrating-visibility-rule-creation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/workload-segmentation-roadblock</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/workloads-applications</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/your-guide-to-illumio-at-aws-re-inforce-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-day-exploits-moveit-application-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-agile-approach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-august-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-cyber-kill-chain</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-december-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-definitions-get-wrong-how-to-make-right</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-demo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-effectiveness</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-february-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-forrester-wave</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-government-agencies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-has-grown-up-heres-what-its-founders-say-is-coming-next</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-impact-report-how-small-midsize-enterprises-fix-breach-unpreparedness</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-impact-report-key-takeaways</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-in-practice-with-creator-john-kindervag-and-ciso-jared-nussbaum</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-is-mainstream-what-that-means-for-your-organization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-january-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-july-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-metrics</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-new-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-november-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-october-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-operationalization-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-operationalization-4</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-operationalization-5</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-operationalization-6</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-policy-authoring</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-policy-discovery</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-policy-distribution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-policy-enforcement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-roadmap-forrester</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-security-assume-breach-uk-data-reform-bill</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-security-healthcare-himss-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-security-micro-segmentation-forrester-consulting</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-security-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-security-nis2-directive-illumio-partnerships</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-cisas-new-zero-trust-maturity-model</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-cloud-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-edr-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-for-dummies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-objections</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-security-hybrid-enterprise</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-st-mary-mackillop-college</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-segmentation-stops-ransomware-faster-detection-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-september-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zero-trust-united-kingdom</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ztna-security-gaps-zts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/ztna-zts-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog/zts-endpoint-benefits-vulerable-devices</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/10-big-things-to-know-about-zero-trust-security-in-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/10-hot-cybersecurity-companies-with-midmarket-solutions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/10-hot-cybersecurity-companies-you-should-watch-in-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/10-hottest-cloud-security-tools-and-products-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/10-hottest-zero-trust-vendors-watch-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/15-years-in-zero-trust-remains-elusive----with-ai-rising-to-complicate-the-challenge</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/15-years-of-zero-trust-why-it-matters-more-than-ever</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/20-coolest-cloud-security-companies-2023-cloud-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/20-coolest-new-cybersecurity-products-at-rsac-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/20-top-cybersecurity-companies-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2020-record-growth</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2020-trust-award-winners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2021-best-tech-startups-sunnyvale</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2021-tech-innovator-awards-cloud-security-finalists</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2022-tech-innovator-awards</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2022-tech-predictions-cloud-infrastructure-code-and-emergence-metaverse</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2022-threat-predictions-ransomware-ransomware-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2023-forecast-it-modernization-cyber-strengthening</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2023-threat-predictions-beware-economic-uncertainty-cybersecurity-community</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2023-workforce-predictions-lack-talent-will-haunt-firms-leadership-comes-under</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2024-forrester-wave</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2024-partner-program-guide-5-star-security-vendor-programs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2024-sc-awards-finalists-best-insider-threat-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/2026-partner-program-guide-5-star-security-vendor-programs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/3-must-have-cfo-skills-operating-finance-strategy-and-communications</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/3-ways-foster-mental-health-and-productivity-remote-workplace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/3-ways-to-boost-cybersecurity-defenses-with-limited-resources</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/3-years-after-notpetya-many-organizations-still-danger-similar-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/33-cybersecurity-leaders-name-zero-trust-their-top-priority</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/4-ways-to-make-ai-agents-safe-for-businesses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/5-hard-truths-about-the-state-of-cloud-security-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/5-mistakes-avoid-when-implementing-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/5-network-segmentation-case-studies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/5-steps-greater-cyber-resiliency</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/5g-opportunity-good-and-bad-actors</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/6-steps-implementing-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/7-eye-opening-security-predictions-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/7-security-strategies-employees-return-office</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/8-critical-lessons-from-the-change-healthcare-ransomware-catastrophe</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/8-questions-you-can-ask-meetings-show-ceo-youre-born-leader</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/98-percent-uk-organizations-plan-use-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/a-call-to-better-protect-us-critical-infrastructure-in-the-fight-against-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/a-cisos-playbook-for-anti-ransomware-day</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/a-holistic-approach-to-transitioning-to-a-fully-mature-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/a-turning-point-for-critical-infrastructure-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/accountability-in-cybersecurity-why-government-agencies-must-raise-the-stakes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/achieving-strategic-alignment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/advancing-defense-security-through-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/after-7-million-impacted-robinhood-data-breach-experts-offer-some-tips-amateur</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/agentic-security-takes-the-stage-at-black-hat-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ai-development-pipeline-attacks-expand-cisos-software-supply-chain-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ai-threats-should-we-fight-fire-with-fire</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/air-force-sbir-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/air-force-sbir-phase-2-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/air-force-turns-startup-help-implementing-zero-trust-tech</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/almost-half-it-security-leaders-believe-they-wont-be-breached</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/andrew-rubin-goldman-sachs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/apac-channel-vision</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/app-owner-view</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/appgate-joint-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/are-eu-businesses-prepared-for-the-escalating-cni-threats-of-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/arming-for-a-cyber-war-why-businesses-must-prioritise-zero-trust-and-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/as-cyber-threats-intensify-healthcare-must-adopt-a-new-mindset</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/athletic-shoe-maker-brooks-runs-down-cyberattacks-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/attacker-undetected-qld-regional-water-supplier-nine-months</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/attackers-keep-coming-every-single-day</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/aws-competency</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/aws-isv</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/aws-marketplace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/aws-public-sector-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/axios-live-ai-is-rapidly-reshaping-the-cybersecurity-landscape-industry-leaders-say</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/azure-firewall-gets-a-security-upgrade-with-illumio-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/balancing-security-and-autonomy-strategies-for-cisos-in-the-cloud-era</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/basics-zero-trust-network-access-explained</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bear-hunt-bundestag-kaiji-botnet-described-cryptojacking-joint-us-uk-warning</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/beating-chaos-with-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/best-offense-strong-defense-improve-cloud-security-visibility-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/best-places-to-work</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/best-places-to-work-2018</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/beware-analysis-paralysis-when-implementing-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/beyond-the-barriers-maximizing-roi-in-cybersecurity-in-local-government-organizations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/beyond-the-election-part-1-preparing-for-new-tech-directives</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/biden-administration-just-kicked-era-better-cybersecurity-us</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/biden-beefs-public-private-security-cooperation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/biden-executive-order-mandates-zero-trust-and-strong-encryption</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/biggest-petrol-pipeline-us-hit-windows-darkside-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bishop-fox-ransomware-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/board-of-directors-johnson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/board-of-directors-kourey</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/boards-need-to-take-a-hard-look-at-their-cyber-vulnerabilities</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bods-hot-or-not</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bolstering-cybersecurity-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bringing-resilience-to-the-cloud-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/brooks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/bt-security-partnership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/build-resilient-secure-microservices-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/building-a-secure-future-with-andrew-rubin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/building-cyber-resilience-a-roadmap-for-state-cios-in-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/building-resilience-learnings-from-moveit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/business-live-with-ian-king</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/businesses-worry-more-about-reputational-damage-than-financial-loss-following-a-breach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/can-a-global-ban-on-payments-stop-the-ransomware-plague</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/carahsoft-illumio-partner</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/case-vendors-public-private-advisory-committees</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/celebrate-2022-cyber-defenders-award-winners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/challenges-organizations-face-when-implementing-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/change-healthcare-went-without-cyber-insurance-before-debilitating-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/channel-awards-2020-winners</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/chaos-is-the-goal-ot-is-the-target</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/check-point-and-illumio-accelerate-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/chinese-hackers-covid-relief-fraud-expands-cyber-threats-us</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/chinese-hackers-will-probably-breach-protected-government-networks-within-5-years-leaked-document-says</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cisa-rolls-out-program-to-protect-critical-infrastructure-from-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cisas-strategic-plan-step-right-direction</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cisas-strategic-plan-ushering-new-cybersecurity-era</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/citizens-jmp-names-illumio-to-its-prestigious-cyber-66-list-for-a-second-year</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/citrix-and-nutanix-ready</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/closing-the-cybersecurity-gap-reducing-supply-chain-risks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cloud-security-alliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cloud-security-economy-trust-doubts-and-the-zero-trust-paradigm</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cloud-security-from-vulnerability-to-vigilance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cloud-security-index-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cloudsecure-visibility-platform-illumio-makes-its-debut</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cnbc-names-illumio-to-2018-disruptor-50-list</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cni-attacks-what-to-expect-in-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/colonial-pipeline-cyber-attack-real-world-catastrophe</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/colonial-pipeline-pumps-gas-again-after-russian-cyberattack-shut-it-down-six</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/colonial-pipelines-ransomware-attack-sparks-emergency-declaration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/combatting-cyber-attacks-requires-more-than-just-money</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/confidence-in-the-cloud-starts-with-visibility-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/congress-let-cyber-intel-sharing-act-lapse-does-it-matter</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/consolidation-blamed-for-change-healthcare-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/convergence-of-ot-and-it-systems-sees-moves-to-improve-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cost-of-ransomware-study</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/could-be-most-impactful-ransomware-attack-history</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/could-be-most-impactful-ransomware-attack-history-gas-price-begins-soar-kremlin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/creativity-can-enable-cybersecurity-hiring-federal-government</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/crippling-impact-cyberattacks-healthcare-how-can-organisations-boost-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/critical-infrastructure-sectors-fight-against-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/crn-emerging-vendor</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/crn-partner-program-guide-5-stars</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/crn-partner-program-guide-5-stars-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/crowdstrike-store-continues-momentum-diverse-applications-bolster-unified</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/csa-launches-first-zero-trust-certification</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cto-talk-qa-pj-kirner-cybersecurity-firm-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ctos-new-and-growing-responsibilities-and-how-to-prepare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/curbing-pandemic-burnout-3-steps-you-can-take-support-overwhelmed-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-anxiety-on-the-rise-in-the-uk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-attackers-if-you-cant-stop-them-disrupt-them</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-ceo-heres-how-im-combatting-economic-uncertainty</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-defender-q-a-illumios-gary-barlet-on-pain-points-ai-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-defense-mag-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-insights-2025-ot-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-insights-2025-social-engineering-gets-ai-wings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyber-why-resilience-trumps-prevention</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyberattack-against-johnson-controls-sparks-downstream-concerns</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cyberattack-youve-been-breached-now-what</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-execs-weigh-biden-executive-order</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-has-53-unicorns-here-are-10-watch</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-insights-with-illumio-s-gary-barlet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-our-greatest-national-resilience-imperative</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-startup-illumio-just-scored-225m-new-funding-thoma-bravo-and</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-startup-illumio-raises-225-million-valued-about-28-billion</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-teams-must-proactively-fight-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-unicorn-illumio-bets-automation-zero-trust-wins</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cybersecurity-vendor-accelerating-investment-uk-channel-after-funding-round</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/cylera-integrated-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/data-breaches-hackers-and-us-china-trade-tensions-are-all-driving-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/data-protection-2023s-cloud-first-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/debunking-four-common-misconceptions-around-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/debunking-persistent-zero-trust-myths-and-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/deloitte-tech-fast-500-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/dod-esi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/dont-delay-zero-trust-reviewing-security-strategies-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/dont-risk-falling-behind-when-it-comes-to-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/drive-zero-trust-approach-inside-out-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/efficacy-micro-segmentation-assessment-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/emily-couey</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/endpoint-security-survey-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/esg-zero-trust-impact</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/european-reaction-to-bidens-executive-order-on-ai</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/everything-you-need-know-about-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/evolution-of-the-cisos-role</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/evolving-landscape-top-10-cybersecurity-predictions-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/experts-react-to-leicester-city-council-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/exploring-zero-trust-and-ai-innovations-in-security-with-illumios-john-kindervag</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/exposed-why-cybercriminals-target-the-healthcare-industry-and-how-to-thwart-them</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ey-announces-andrew-rubin-as-entrepreneur-of-the-year-award-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ey-announces-andrew-rubin-of-illumio-as-an-entrepreneur-of-the-year-r-2024-bay-area-award-finalist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fact-vs-fiction-dispelling-zero-trust-misconceptions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/federal-advisory-warns-increasing-conti-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fedramp-authorized</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fedramp-in-process</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/feds-key-on-segmentation-to-set-zero-trust-foundation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fitara-scorecards-cybersecurity-focus-draws-industry-attention</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/five-ways-security-pros-can-lock-down-stay-home-workers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/five-ways-to-implement-zero-trust-based-on-nsas-latest-guidance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fixing-the-cybersecurity-skills-gap</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/florida-virginia-georgia-and-north-carolina-declare-states-emergency-over-gas</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/forbes-cloud-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/former-postal-service-oig-cio-gary-barlet-joins-illumio-federal-field-cto</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/forrester-new-wave-microsegmentation-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/forrester-total-economic-impact-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/forrester-trusting-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/forrester-wave-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/four-key-benefits-zero-trust-can-bring-your-channel-firm</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/four-ways-to-protect-the-energy-sector-from-cybersecurity-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/franco-american-cyber-cooperation-us-election-threats-executive-indias-data</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/from-a-e-to-soc-what-cyber-defenders-can-learn-from-emergency-healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/from-alert-fatigue-to-cyber-resilience-rethinking-the-future-of-the-soc-with-ai</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fy22-momentum</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/fy23-momentum</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gartner-cool-vendor</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gary-barlet-federal-field-cto</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gas-prices-could-soar-after-pipeline-cyberattack-forces-closure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gately-report-biggest-cyberattacks-so-far-year-fast-growing-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gautam-mehandru-cmo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gender-decoder-and-blind-resumes-how-remove-bias-your-hiring-process</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/george-tenet-joins-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/getting-to-grips-with-the-increasing-threat-of-cyberattacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/giving-gift-you-it-deserves-holiday-season</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/global-cost-of-ransomware-report-with-trevor-dearing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/global-infosec-editors-choice-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/goldman-sachs-100-entrepreneurs-2017</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/google-closing-down-carpool-service-tied-waze-september</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/governments-role-boosting-cyber-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/gsa-it-schedule</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/guardian-it-incident-believed-be-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/hard-truths-the-lies-we-keep-buying-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/having-many-partners-always-better</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/health-systems-can-build-zero--trust-maturity-over-time-to-optimize-security-investments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/healthcare-held-to-ransom-not-what-the-doctor-ordered</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/heres-how-one-retailer-prepping-black-friday-cyber-onslaught</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/hit-ransomware-attack-heres-what-do</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/houston-eye</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-a-federal-ban-on-ransomware-payments-could-help-cisos</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-ai-helps-strengthen-zero-trust-segmentation-labeling</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-avoid-getting-caught-ransomwares-crosshairs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-banks-can-build-cyber-resilience-and-improve-compliance-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-can-cisos-ensure-their-cyber-spending-really-counts</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-cisos-can-get-security-buy-in-from-the-board</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-federal-agencies-can-address-the-cyber-talent-gap</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-gauge-if-industry-collaboration-fit-you</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-has-2023-gone-so-far</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-ibm-i-fits-zero-trust-security-framework</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-illumio-microsegmentation-and-netskope-ztna-integration-gets-zero-trust-covered</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-improve-roi-your-cybersecurity-investments-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-make-zero-trust-reality</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-micro-segmentation-creates-uphill-battle-intruders</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-oversight-committee-can-protect-value-your-business</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-protect-your-organizations-remote-endpoints-against-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-skills-based-hiring-enhances-national-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-succeed-devops-zero-trust-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-the-healthcare-sector-can-prepare-for-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-achieve-roi-on-your-cybersecurity-during-a-recession</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-balance-security-and-rapid-innovation-in-saas-development</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-harness-ai-and-zero-trust-segmentation-to-boost-cyber-defenses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-maximize-the-impact-of-zero-trusts-next-phase</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-plan-for-and-survive-a-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-reduce-the-burden-on-soc-teams</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-to-unlock-innovation-safely-in-the-ai-revolution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-visibility-became-lifeblood-secops-and-business-success</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-will-recession-affect-cisos</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-zero-trust-can-help-healthcare-organisations-become-resilient-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-zero-trust-segmentation-keeps-cyberbreaches-spreading-across-enterprise</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/how-zero-trust-segmentation-secures-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ibm-qradar-xdr-integration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ico-fines-capita-ps14m-after-millions-had-data-stolen</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/icymi-our-channel-news-roundup-week-july-12th</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/identifying-cyber-blind-spots-vital-zero-trust-progress</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/identity-becomes-the-2026-battleground-as-ai-erases-trust-signals</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-2021-predictions-digital-acceleration-results-security-holes-iac-will</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-2022-predictions-ransomware-deterrence-will-improve-2022-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-2023-predictions-containment-key-defending-against-todays-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-achieves-300-percent-bookings-growth-in-2017</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-achieves-federal-common-criteria-certification-for-enterprise-security-management</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-achieves-federal-compliance-fips-common-criteria</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-achieves-oracle-exastack-ready-status</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-adaptive-user-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-adds-agentless-cloud-native-visibility-and-control-solution-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-adds-ecosystem-bt-security-partnership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-adds-ibm-aix-oracle-solaris-support</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-f5</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-netskope-announce-zero-trust-partnership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-nvidia-team-up-to-strengthen-zero-trust-security-for-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-qualys-deliver-first-vulnerability-based-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-wiz-join-forces</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-and-wizs-integration-enhances-cyber-resilience-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-announces-industry-first-cloud-solution</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-announces-new-zero-trust-innovations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-anup-singh-cfo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-app-for-splunk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appgate-integrate-zero-trust-network-segmentation-and-ztna</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-ben-verghese-chief-technology-officer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-christopher-khadan-vp-customer-success</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-david-kingsley-as-chief-people-officer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-jim-yares</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-john-kindervag-chief-evangelist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-john-lens-cro</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-jonathan-reiber-head-of-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-appoints-karl-van-den-bergh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-armis-solution-it-ot</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-automates-enforcement-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-awarded-three-patents</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-beefs-zero-trust-security-automated-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-best-network-security-solution-siia-codie-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-brings-in-new-emea-channel-head-from-okta</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-brings-visibility-zero-trust-principles-hybrid-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-brings-zero-trust-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-calls-change-ransomware-attacks-cost-australian-businesses-average</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-ceo-andrew-rubin-on-stopping-the-spread-of-breaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-ceo-fighting-ransomware-endpoint-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-ceo-goldman-sachs-most-intriguing-entrepreneurs-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-ceo-honored-by-goldman-sachs-for-entrepreneurship</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-cloudsecure-addresses-attacks-across-hybrid-and-multi-cloud-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-cloudsecure-announcement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-cloudsecure-drives-zero-trust-public-clouds</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-co-founder-talks-security-tactics-stop-cyber-disasters-they-happen</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-collaborates-with-kyndryl</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-colortokens-cisco-lead-microsegmentation-rankings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-continues-explosive-growth-in-apac</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-core-advancements-help-protect-key-assets-cyberattacks-and-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-core-automated-enforcement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-crowdstrike-extends-zero-trust-endpoints</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-defines-breach-containment-for-ai-era</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-delivers-agentless-visibility-and-breach-containment-for-hybrid-environments</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-doubles-down-on-partner-first-strategy-with-radius-channels-distribution-partnership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-edge</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-edge-extends-zero-trust-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-emea-channel-boss-we-have-so-much-opportunity-ahead-us</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-emea-channel-chief-partners-became-even-more-critical-2020</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-enterprise-platforms</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-expands-cybersecurity-platform-with-segmentation-across-containerized-workloads</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-expands-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-expands-partner-program-to-enhance-zero-trust-segmentation-support</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-expands-partnership-with-armis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-expert-outlines-cybersecurity-priorities-biden-administration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-extends-adaptive-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-featured-on-microsoft-marketplace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-for-azure-firewall-allows-users-to-protect-different-parts-of-their-cloud-environment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-hires-ex-tanium-veteran-to-drive-partner-sales</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-hires-veteran-of-tanium-palo-alto-networks-as-channel-chief</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-hits-275b-valuation-preaches-zero-trust-gospel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-how-does-your-zero-trust-score-stack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-in-the-microsoft-sentinel-partner-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-increases-global-customer-adoption-by-80-percent-and-expands-leadership-team-with-new-cmo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-insights-ga</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-integrates-with-nvidia</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-introduces-illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-is-a-proud-participant-in-the-microsoft-security-copilot-partner-private-preview</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-joins-ibm-security-app-exchange-community</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-joins-misa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-joins-security-unicorn-club-225m-late-stage-investment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-ai-agent-for-fast-radically-simplified-threat-detection-and-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-breakthrough-micro-segmentation-technology</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-endpoint-solution-hybrid-work-teams</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-msp-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-new-technology-alliance-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-supercluster-technology</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-launches-the-segment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-listens-to-partner-feedback-and-rolls-out-programme-enhancements</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-looks-expand-strategic-partner-tech-integration-capabilities-new</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-microsoft-azure-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-named-a-customers-choice</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-named-best-product-by-cyber-defense-magazine</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-named-forbes-2018-cloud-100-list</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-named-forbes-hottest</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-named-to-cnbc-disruptor50-list</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-names-denis-maynard-svp-sales</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-nathaniel-gleicher-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-nearly-half-of-data-breaches-originate-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-nutanix-partnership</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-partners-bt-offer-businesses-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-partners-get-new-incident-response-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-partners-with-mesosphere-and-docker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-poised-capitalize-surging-demand-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-protects-against-ransomware-with-microsoft-azure-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-pushes-segmentation-zero-trust-app-teams</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-raises-225-million-275-billion-valuation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-raises-65m-and-expands-leadership-team-with-new-cfo-and-board-director-appointment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-ranked-strong-performer-in-zero-trust-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-re-jigs-channel-strategy-across-asia-pacific</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-receives-morgan-stanley-cto-innovation-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-recognized-as-a-leader-in-zero-trust-extended-ztx-ecosystem-providers-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-report-reveals-few-companies-protect-against-breaches-with-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-research-finds-nearly-half-security-leaders-dont-think-they-will-be</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-reveals-widespread-challenge-endpoint-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-series-f</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-showcases-micro-segmentation-at-onug</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-simplifies-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-strengthens-zero-trust-segmentation-platform-illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-taps-rise-zero-trust-demand</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-unlocking-the-roi-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-unveils-cloudsecure-zero-trust-segmentation-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-updates-servicenow-app-with-support-for-new-york-release</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-wins-global-excellence-awards</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumio-wins-innovation-award-onug-spring-2018</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/illumios-latest-funding-round-puts-value-275-billion</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/importance-securing-your-data-year</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/inauguration2021-cyber-experts-react-joe-biden-set-become-46th-us-president</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/incident-response-partner-program-dashboards</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/increasing-visibility-federal-threat-landscape</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/industries-most-vulnerable-cyberattacks-and-why</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/industry-expert-views-data-privacy-day</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/information-sharing-under-cisa-2015-in-limbo-after-government-shuts-down</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/inside-the-history-of-a-child-hacker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/insurance-regulatory-ripples-likely-after-colonial-pipeline-hack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/interview-illumio-security-excellence-awards-finalist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/interview-preventing-ransomware-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/is-the-nhs-cybersecurity-strategy-to-2030-enough-to-protect-healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/iso-27001-certification</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/it-industry-pros-like-white-house-ai-order-point-to-next-steps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/its-time-to-change-the-cybersecurity-risk-management-conversation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/james-love-cro</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/james-nelson-illumio-cyber-resilience-business-continuity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/japan-expansion</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/jennifer-johnson-cmo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/jlr-extends-production-halt-after-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/jmp-securities-cyber-66</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/john-thompson-joins-illumio-board</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/katey-wood-illumio-deployment-and-using-windows-filtering-platform</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/kathleen-swift-chief-people-officer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/keeping-the-cloud-secure-with-a-mindset-shift</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/key-lessons-from-the-goanywhere-attack-a-proactive-guide-to-ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/labour-tightens-cyber-rules-after-jlr-and-m-s-breaches</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/lack-visibility-remote-endpoints-leaves-companies-vulnerable-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/lateral-movement-in-cyberattacks-continues-to-evade-detection-exposing-critical-visibility-gaps-illumio-research-finds</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/learning-from-the-tomra-cyberattack-how-can-manufacturers-increase-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/legacy-it-magnifies-cyber-risk-defra-says-nao</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/legislation-and-liability-cyber-attacks-wont-save-you-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/lies-damned-lies-and-cybersecurity-metrics</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/limiting-the-blast-radius-of-modern-cyber-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/lockbit-hits-icbc-in-latest-ransomware-strike</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/london-nhs-hospitals-divert-ambulances-and-cancel-operations-in-the-midst-of-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/looking-ahead-2023-cyber-trends-watch</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/making-case-trust-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/managing-new-security-landscape-5g-and-beyond</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/managing-the-security-estate</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/manchester-council-cyberattacks-prompt-supply-chain-risk-warnings</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/mario-espinoza-cpo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/martech-interview-jennifer-johnson-cmo-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/master-move-an-interview-with-andrew-rubin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/matching-cyber-programs-and-partnerships-with-the-pace-of-modern-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/maximize-cybersecurity-returns-5-key-steps-to-enhancing-roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/maximizing-cybersecurity-roi-a-strategic-approach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/meritalk-q-a-illumios-barlet-looking-for-cyber-policy-acceleration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/micro-segmentation-endpoints-shows-promising-defense-against-lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/micro-segmentation-three-keys-implementation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/microsoft-marketplace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/millions-of-americans-data-potentially-exposed-in-change-healthcare-hack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/mitigating-cyber-risk-while-were-still-working-home</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/mitigating-security-risks-hybrid-organization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/month-review-top-ten-start-funding-rounds-watch</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/more-apt-activity-brigading-mass-reporting-and-coordinated-inauthentic-behavior</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/more-cfos-feeling-heat-ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/most-powerful-women-channel-2020-power-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/msp-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/mythos-as-hacking-tool-fuels-company-anxiety-over-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nathanael-iversen-illumio-future-microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/national-cyber-strategy-draws-strong-initial-reviews</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nature-impact-has-changed-and-assume-breach-table-stakes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/navigating-around-cybersecurity-pandemic</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/navigating-the-cybersecurity-landscape-a-guide-for-channel-partners-in-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/neil-patel-illumio-microsegmentation-and-adopting-zero-trust-philosophy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/netskope-illumio-jumpcloud-pace-zero-trust-fund-parade</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/netsuite-selects-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/new-cooperatives-ransomware-attack-underscores-threat-food-agriculture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/new-solution-improves-visibility-and-security-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nhs-ambulance-trusts-hit-by-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nhs-cybersecurity-strategy-to-2030-is-it-enough-to-protect-healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nhs-trust-confirms-clinical-data-leaked-by-recognized-ransomware-group</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nibe-extends-zero-trust-segmentation-to-endpoint-devices-with-illumio-to-dramatically-reduce-cyber-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nightvision-live-fireside-chat-with-nasdaq-illumio-ceo-andrew-rubin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nis-2-winds-change-blowing-europe-sharply-tightens-cybersecurity-requirements</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nis2-widens-scope-of-key-eu-security-directive</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/nsas-zero-trust-guidelines-focus-on-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/officials-point-to-russia-after-electoral-commission-hack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/oil-industry-rattled-cyberattack-us-gas-pipeline</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/olympic-games-are-big-target-hackers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ominous-2023-cybersecurity-threats-ensure-active-landscape</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/one-single-hmg-department-running-600-unsupported-apps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/operational-risks-amid-cyber-policy-uncertainty</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/organizations-left-grappling-for-solutions-amid-alarming-cloud-security-gaps</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/pj-kirner-best-in-biz</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/pj-kirner-illumio-rsa-conference-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/podcast-defending-healthcare-in-cyberspace</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/poor-endpoint-visibility-exposing-firms-systemic-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/poor-remote-endpoint-visibility-puts-organizations-risk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/post-pandemic-success-two-things-you-need-know</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/practical-approach-building-resilience-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/predictable-wins-designing-data-breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/predictions-data-and-privacy-2021-what-experts-say</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/preparing-state-cios-for-the-future-of-cyber-and-ai-defense</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/prioritize-and-execute-getting-dod-zero-trust-faster</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/private-equity-firms-used-buy-fading-security-companies-were-past-their-prime</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/progress-over-perfection-security-tips-from-the-creator-of-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/protect-and-prosper</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/protecting-operations-indo-pacific</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/protecting-small-businesses-from-ransomware-on-a-budget</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/protecting-the-uks-critical-national-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/queensland-water-supplier-sunwater-breached</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/race-against-ransomware-how-the-finance-sector-can-keep-up</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ramping-cloud-security-zero-trust-micro-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ranked-59-cybersecurity-unicorns-you-need-know-about</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-attack-emulation-unveils-effectiveness-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-attack-kept-major-energy-industry-contractor-out-of-some-systems-for-6-weeks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-greatest-business-threat-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-matt-glenn-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-rise-means-greater-regulatory-legal-risk-victims</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-risk-management-calculus-changing-ot-ics-and-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ransomware-study-finds-58-of-organizations-forced-to-halt-operations</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/re-thinking-cybersecurity-for-cni-the-critical-risks-of-it-and-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/readying-enterprises-data-protection-strategy-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/reality-how-important-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/reasons-why-msps-are-the-future</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/reduce-risk-malware-and-ransomware-attacks-illumio-edge-zero-trust-endpoint-and</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/report-finds-zero-trust-segmentation-stops-5-cyber-attacks-year</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/report-orgs-zero-trust-segmentation-avoid-5-major-cyberattacks-annually</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/research-shows-nearly-half-of-all-data-breaches-originate-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/resilience-only-true-measure-cyber-success</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/resilient-critical-infrastructure-starts-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/resilient-future-cyber-warfare-roe-tech-alliances-and-legislation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/rethinking-threat-detection-in-a-decentralized-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/royal-mail-experiences-cyber-incident</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/royal-mess-uk-points-risks-cyberattacks-mail-delivery</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/rsa-conference-2020-whats-keeping-cybersecurity-experts-night</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/rsac-2025-agentic-ai-identity-and-the-new-rules-of-cyber-defense</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/rsac-2025-illumio-prepares-for-cybersecurity-in-a-post-breach-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/russia-ukraine-cyberwar-could-outlast-shooting-war</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/russian-criminal-group-suspected-colonial-pipeline-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sans-survey-dynamic-data-center</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sc-magazine-trust-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sci-fi-and-genghis-khan-heres-what-tech-ceos-read-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sd-worx-shuts-down-uk-and-irish-services-amid-cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sec-delays-final-rule-on-cyber-incident-disclosure-as-industry-pushes-back</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/secureconnect-gateway-new-encryption-in-hybrid-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/securing-distributed-networks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/securing-the-cloud-frontier-with-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/securing-worlds-energy-systems</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-and-reliability-become-one-apis-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-graphs-explained-an-innovative-approach-to-network-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-outlook-2023-cyber-warfare-expands-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-pros-more-confident-about-fending-off-ransomware-despite-being-battered-by-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-templates</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-vendor-illumio-goes-channel-only-apac</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/security-vendor-illumio-raises-225m-tighten-si-mssp-ties</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/segmentation-is-key-in-u-s-air-forces-zero-trust-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/segmentation-specialist-illumio-names-new-apac-boss</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/series-c-funding</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/series-d-funding-to-accelerate-leadership-in-adaptive-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/shay-mowlem-cmo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/should-businesses-follow-googles-footsteps-in-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/shutdown-could-erode-cyber-defenses-by-sidelining-critical-staff-experts-warn</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/small-budget-strong-security-why-zero-trust-is-key-to-protecting-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/software-dominates-deloittes-2020-tech-fast-500-71-all-companies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/software-incident-response-among-big-focus-areas-bidens-cybersecurity-executive</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/source-code-where-go-when-youre-mad-twitter</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/southern-water-confirms-cyberattack-after-black-basta-claims</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/startup50-big-50</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/states-vie-for-federal-cyber-workers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/steering-your-network-right-direction-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/stepping-up-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/stopping-cyber-threats-through-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/stowe-australia-selects-illumio-to-stop-lateral-movement-inside-its-organization</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/strengthening-cyber-resilience-in-the-manufacturing-sector</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/structure-security-2016</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/sttr-phase-1-award</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/stuck-first-gear-australia-falls-behind-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/survey-sees-greater-appreciation-software-supply-chain-risks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/swacrit-systems-sichert-fertigungsablaufe-und-vereinfacht-die-it-mit-illumio-segmentierung</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/tech-execs-flag-cybersecurity-scores-latest-fitara-scorecard</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/tech-sector-likes-cyber-orders-enterprise-wide-view-cloud-push</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/tech-trends-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/technology-alliance-partner-program</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/technology-stacks-pj-kirner-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/techstrong-tv-talks-to-illumios-ben-harel-at-rsa-conference-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-10-hottest-cybersecurity-tools-and-products-of-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-20-coolest-cloud-security-companies-of-the-2025-cloud-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-20-coolest-cloud-security-companies-of-the-2026-cloud-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-20-coolest-network-security-companies-of-2025-the-security-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-20-coolest-network-security-companies-of-2026-the-security-100</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-ai-arms-race-shaping-federal-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-cyber-war-in-iran</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-cybersecurity-talent-shortage-wsj-readers-dissect-the-problem</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-evolution-of-cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-future-of-healthcare-security-in-the-uk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-gately-report-black-hat-usa-edition-former-child-hacker-warns-of-catastrophic-cyber-event</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-godfather-of-zero-trust-joins-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-importance-of-understanding-your-minimum-viable-operation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-need-to-recruit-cyber-talent-in-the-government</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-new-normal-how-to-embrace-a-cultural-approach-to-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-power-of-the-purse-how-to-ensure-security-by-design</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-segment-podcast</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/the-top-10-technologies-defining-the-future-of-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/these-are-americas-1000-largest-and-most-inspiring-private-companies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/three-kent-councils-grapple-with-cyber-incidents-as-services-knocked-offline</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/three-tips-for-federal-cios-to-improve-cyber-resilience-in-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/ticking-time-bomb-russian-ransomware-attacks-are-coming-what-small-businesses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/time-essence-putting-zero-trust-practice-today</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/time-essence-start-your-zero-trust-journey-today</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/time-get-tough</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/tips-for-agencies-to-improve-cloud-security-posture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/todd-palmer-senior-vice-president-global-partner-sales-alliances</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-10-zero-trust-security-solutions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-100-innovative-cybersecurity-companies-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-20-cybersecurity-startups-watch-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-20-cybersecurity-startups-watch-2021-based-crunchbase</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-cybersecurity-funding-and-investments-look-out-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-cybersecurity-startups-watch-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-microsegmentation-software-2021</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/top-zero-trust-security-solutions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/traditional-cloud-security-isnt-up-to-the-task</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/two-years-it-thought-leaders-evaluate-gdprs-impact</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/uk-criminal-records-office-crippled-by-cyber-incident</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/uk-cyber-bill-teases-mandatory-ransomware-reporting</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/uk-government-releases-cloud-scada-security-guidance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/uks-new-ai-action-plan-aims-to-position-country-as-a-global-powerhouse</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/under-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/understanding-the-impact-of-ransomware-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/understanding-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/united-kingdom-zero-trust-survey</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/university-of-manchester-suffers-suspected-data-breach-during-cyber-incident</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/unleashing-visibility-cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/unraveling-the-ec-data-breach-cybersecurity-experts-weigh-in-on-the-implications</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-cyber-strategy-is-missing-accountability-and-a-ransomware-moonshot</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-government-needs-overhaul-cybersecurity-heres-how</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-issued-emergency-transport-measures-after-its-largest-fuel-pipeline-was-hit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-publishes-implementation-plan-for-national-cybersecurity-strategy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-says-national-cybersecurity-strategy-will-focus-on-market-resilience-and-private-partnerships</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/us-takes-aim-at-healthcare-cybersecurity-with-proposed-hipaa-changes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/venezuela-raid-highlights-cyber-vulnerability-of-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/video-10-minute-it-jams-an-update-from-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/vmblog-expert-interview-illumio-details-its-new-global-technology-alliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/vmblog-expert-interview-illumio-explores-cloud-security-and-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/was-the-maduro-raid-had-telltale-signs-of-a-cyber-enabled-blackout</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/we-listened-to-our-partners-feedback</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/west-point-for-cyber</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-australia-gets-wrong-about-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-could-biden-presidency-mean-cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-do-we-want-zero-trust-when-do-we-want-it-later</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-does-2025-have-in-store-for-the-channel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-does-it-take-recover-ransom</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-firewall-definition-types-business-uses</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-football-tactics-and-enterprise-security-architectures-have-common</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-the-new-administration-means-for-cyber-with-gary-barlet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-will-be-clearest-indicators-infrastructure-bill-working-intended</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/what-you-need-to-know-about-the-new-ncsc-ransomware-guidance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/whats-new-2020-forrester-zero-trust-wave</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/whether-ukraine-cyberwar-or-not-its-getting-bad</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/white-house-cyber-eo-points-agencies-cloud-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/white-house-feds-spring-action-following-colonial-pipeline-ransomware-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/white-house-meetings-aim-international-support-ransomware-fight</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-anthropics-new-ai-model-has-some-cybersecurity-pros-worried</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-cyber-resilience-banking-sectors-top-priority</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-getting-microsegmentation-right-key-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-healthcare-cloud-may-demand-zero-trust-architecture</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-its-time-stop-putting-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-its-time-to-take-control-of-cybersecurity-in-the-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-its-vital-address-cybersecurity-wider-context-business</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-security-professionals-need-engage-developers-qa</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-security-teams-are-losing-trust-term-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-the-soc-needs-its-moneyball-moment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-threat-detection-needs-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-us-tech-ends-up-being-controlled-by-european-regulation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-you-should-rethink-ot-security-for-the-cloud-era</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-zero-trust-architecture-will-disrupt-cybersecurity-industry-same-way</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-zero-trust-segmentation-is-critical-for-cloud-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/why-zero-trust-will-be-top-business-priority-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/yes-patching-companies-need-finally-embrace-zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/yes-you-can-launch-new-product-pandemic-heres-how</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/you-cant-stop-next-solarwinds-you-can-slow-it-down</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-adoption-pj-kirner-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-adoption-will-continue-mature</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-and-endpoint-security-mario-espinoza-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-and-sase-are-heating</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-at-15-the-strategy-that-refused-to-become-a-product</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-averts-cyberattacks-report-shows</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-bolsters-our-national-defense-against-rising-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-buzzword-now-what</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-creator-john-kindervag-joins-illumio-to-accelerate-adoption-of-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-critical-very-underused</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-how-can-local-councils-defend-against-the-increasing-cyber-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-impact-assessment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-intracloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-investments-surge-despite-uneven-adoptions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-is-15-years-old----why-full-adoption-is-worth-the-struggle</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-is-the-way-forward-for-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-keeps-digital-attacks-from-entering-the-real-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-leaders-avert-5-cyber-disasters-year-average</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-market-has-matured-over-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-market-shows-signs-maturity-rsa-2022</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-networking-creator-john-kindervag-joins-illumio-as-chief-evangelist</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-or-just-untrustworthy-exploring-zero-trust-fears</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-restoring-resilience-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-security-exec-predictions-2023</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-answer-mitigating-ransomware-threats</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-eliminates-5-cyber-disasters-year-and-saved-20million</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-roi-calculator</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-saves-users-20m-annually-illumio-found</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-stopping-breaches-becoming-catastrophes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-segmentation-with-illumios-raghu-nandakumara</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-survey-report</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-taskforce-accelerating-zero-trust-implementation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-unicorn-illumio-closes-225m-series-f-led-thoma-bravo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/news/zero-trust-validate-its-not-enough-deploy-zero-trust-architecture-you-need</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/afa-forsakring-protects-against-lateral-movement-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/brooks-makes-strides-in-security-strategy-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/cathay-pacific-security-takes-flight-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/davies-provides-innovative-secure-services-to-its-insurance-and-financial-services-customers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/everywhen-builds-cyber-resilience-and-stops-lateral-movement-with-illumio-and-bt-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/firjan-builds-cyber-resilience-and-protects-brazils-industrial-ecosystem-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/frankfurter-volksbank-invests-in-illumio-for-compliance-success</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/gecina-strengthens-cyber-resilience-with-illumio-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/hartwig-gains-efficiency-with-zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/hgc-accelerates-zero-trust-journey-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/hi-temp-insulation-launches-micro-segmentation-security-in-30-minutes</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/hongkong-electric-company-secures-critical-infrastructure-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-ebay-achieved-cyber-resilience-segmenting-3-000-servers-and-never-breaking-an-app</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-houston-eye-safeguards-critical-assets-and-helps-ensure-hipaa-compliance-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-illumio-lowers-ach-groups-cyber-risk-with-nearly-zero-overhead</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-illumio-secures-sunways-diverse-business-ecosystem</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-marriott-vacations-safeguards-its-data-and-secures-global-operations-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/how-swacrit-secures-its-manufacturing-and-simplifies-it-operations-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/illumio-provides-unparalleled-visibility-in-3-hours-for-mondi-group</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/insignia-financial-contains-risk-simplifies-security-and-strengthens-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/investa-builds-confidence-against-breaches-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/ixom-achieves-secure-segmentation-across-environments-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/katten-quote</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/kojima</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/le-point-news-media-elevates-its-security-beyond-traditional-vlans</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/leading-hospital-network-in-brazil-materdei-secures-its-rapid-growth-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/lion-hops-from-a-ransomware-attack-to-a-resilient-security-infrastructure-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/micro-quote</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/mondi-quote</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/nibe-builds-cyber-resilience-in-six-months-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/overland-footwear-reduces-vulnerability-risks-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/qbe-insurance-strengthens-its-zero-trust-security-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/ransomware-protection-australian-school-enterprise-grade-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/saga-bank</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/saki</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/servicenow-finds-the-smarter-way-to-segment-using-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/stowe-australia-malware-proofs-data-centers-with-illumio-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/telhio-secures-its-growth-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/the-master-group-reduces-its-attack-surface-by-80-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/west-bend-mutual-insurance-microsegmentation-cloud</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers/western-union-secures-global-money-movement-and-m-a-with-illumio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/2025-infosec-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/acpe-2025-conference-include-it</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/afcea-technet-indo-pacific</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/arkansas-it-symposium</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/black-hat-usa-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/ca-public-sector-cio-academy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/california-cybersecurity-education-summit-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/central-texas-oribe-awards</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/cio-summit-japan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/ciso-critical-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/colorado-security-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-brisbane</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-brisbane-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-canberra</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-fsi-singapore</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-melbourne-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-melbourne-8l66s</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-perth</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-perth-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-singapore-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-singapore-vaolk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/corinium-ciso-sydney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/cybersec-taiwan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/cybersec-taiwan-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/cyphercon</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/dis-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/dodiis-worldwide-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/efm-louisiana-it-symposium</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/elevate-it---tampa-technology-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-atlanta-ciso-executive-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-boston-ciso-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-chicago-ciso-executive-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-ciso-executive-summit---st-louis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-ciso-executive-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-ciso-executive-summit-ohio</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-ciso-inner-circle</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-florida-ciso-executive-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-global-ciso-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-new-york-ciso-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-nj-ciso-inner-circle</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-phoenix-cio-ciso-executive-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-seattle-cio-ciso-inner-circle</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-toronto-ciso-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/evanta-vancouver-bc-cio-ciso-executive-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/exec-sec-con</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/futurecon-atlanta-cybersecurity-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gartner-it-infrastructure-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gartner-security-risk-management-in-tokyo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gartner-security-risk-management-summi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gartner-security-risk-management-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gartner-security-risk-management-summit-in-sydney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/gosec25</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/govware-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/govware-singapore</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/hmg-10th-annual-charlotte-c-level-technology-leadership-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illuminate-world-tour</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumio-at-microsoft-ignite-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-atlanta-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-breach-containment-challenge-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-chicago</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-chicago-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-columbus-oh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-denver</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-dubai</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-dubai-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-emea</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-hong-kong</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-london</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-mexico</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-minneapolis-mn</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-norcal</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-paris</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-singapore</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-singapore-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-singapore-2026-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-st-louis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-sydney</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-taipei</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-taipei-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-taiwan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-tokyo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-tokyo-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-toronto</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-toronto-2</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/illumiverse-labs-washington-dc</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/infosec-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/infosec-world</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/interface-seattle-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/interop-tokyo-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/les-assises</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/macnica-netskope-event-in-tokyo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/michigan-digital-government-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/mindfluence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/mindfluence-dallas</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/modern-day-marine-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/napa-mind-fluence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/nastd-eastern-midwestern-regional-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/nca-annual-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/netskope-sase-summit-2024-minneapolis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/netskope-sase-summit-2024-seattle</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/netskope-sase-summit-2024-st-louis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/nlit-summit-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/oregon-public-sector-cybersecurity-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/phoenix-technology-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/ransomware-prevention-and-recovery-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/real-time-containment-across-it-ot-and-iot</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/richmond-cio-forum---the-harvard-club</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/rocky-mountain-information-and-security-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/rsa-conference-2025</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/rsac-2026</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/sector-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/secure360</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/secureworld-seattle-2024</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/security-days-fall-in-tokyo</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/security-days-osaka</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/security-days-spring-in-osaka</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/tagitm-annual-conference</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/the-richmond-cio-cybersecurity-forum-nyc</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/events/washington-dc-digital-government-summit</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/banking-financial-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/cloud-migration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/customers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/education</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/energy-utilities</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/government</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/healthcare</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/high-value-asset-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/illumio-labs</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/incident-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/insurance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/it-ot-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/it-ot-separation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/legal</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/manufacturing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/roi</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/smb</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/supply-chain-attack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/universal-tag/zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/asset-mapping-visibility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/cloud-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/cloud-workload-migration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/critical-asset-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/environmental-separation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-cloudsecure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-core</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-edge</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-endpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-insights</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-segmentation-for-data-centers</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/illumio-segmentation-for-endpoints</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/incident-recovery</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/it-ot-convergence</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/protection-strategies</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/ransomware-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/ransomware-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/vulnerability-risk-reduction</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/customers-solutions/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/aditya-krishnan</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/aiden-herrod</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/aishwarya-ramani</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/alex-goller</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/andrew-kay</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/andrew-rubin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/ben-verghese</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/beth-scutellaro</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/bharath-shashikumar</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/brian-piper</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/brittney-johnson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/candice-nepomuceno</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/charlie-bedell</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/chris-clarkson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/christer-swartz</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/darren-wolstein</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/dave-shephard</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/david-lenrow</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/david-vance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/dorothy-moore</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/erika-bagby</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/gary-barlet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/gina-geraci</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/gwyn-hampton</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/haider-jarral</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/illumio-editorial</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/irvin-maldonado</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/jaclyn-woodward</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/jeff-stauffer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/john-kindervag</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/karl-van-den-bergh</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/kuhu-gupta</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/maritza-marie-dubec</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/michael-adjei</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/michele-novick</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/mindy-semling</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/natalio-pincever</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/nathan-tran</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/noam-syrkin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/paula-perez</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/rachna-srivastava</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/raghu-nandakumara</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/rajoo-nagar</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/rob-lubinsky</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/ron-isaacson</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/sam-sarnicke</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/scott-smith</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/stacey-martinez</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/tina-lam</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/todd-palmer</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/trevor-dearing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/wassim-daghash</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/blog-authors/wendy-batten</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/ai-transparency</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/beta-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/cookie-notice</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/distributor-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/mutual-non-disclosure-agreement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/partner-portal-terms</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/partner-portal-terms-of-use-jp</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/patents</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/privacy-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/pstc</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/recruiting-and-hiring-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/reseller-terms-and-conditions</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/responsible-disclosure-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/sf-eula</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/standard-provider-agreement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/sub-processor-list</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/terms-of-use</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/trademark-usage-guidelines</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/trademarks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/legal/xpress-eula</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/application-dependency-mapping</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/attack-surface</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/botnet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/breach-containment</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/ci-cd-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cloud-detection-and-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cloud-migration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cloud-workload-protection</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/common-criteria</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/container-orchestration</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/container-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cyber-resilience</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cyberattack</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cybersecurity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/cybersecurity-compliance</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/devsecops</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/endpoint-detection-and-rsponse</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/endpoint-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/gitops</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/hypervisor</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/incident-response</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/infrastructure-as-code</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/kubernetes-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/lateral-movement</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/malware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/microsegmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/network-access-control-nac</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/network-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/network-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/observability</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/pci-dss</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/phishing</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/pii</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/policy-compute-engine</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/ransomware</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/rbac</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/security-breach</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/security-policy</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/shift-left-security</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/software-defined-networking</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/ssl</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/transport-layer-security-tls</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/vdi-virtual-desktop-infrastructure</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/visbility</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/zero-day-attacks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/zero-trust</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/zero-trust-segmentation</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/cybersecurity-101/ztna</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/amazon-web-services</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/appgate-sdp</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/arista</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/armis</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/avi-networks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/azure-firewall</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/bmc</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/checkpoint</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/chef</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/cisco</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/citrix</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/cloudera</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/cohesity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/docker</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/f5-networks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/firemon</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/gcp</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/hashicorp</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/hortonworks</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/infoblox</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/microsoft</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/microsoft-sentinel</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/netskope</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/nvidia</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/okta</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/onelogin</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/oracle-exadata</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/palo-alto</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/palo-alto-networks-cortex-xsoar</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/ping-identity</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/precisely</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/puppet</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/qualys</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/rapid7</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/red-hat</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/redseal</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/servicenow</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/splunk</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/suse</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/tenable</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/partners-tap/wiz</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/gsi/ibm</loc>
    </url>
    <url>
        <loc>https://www.illumio.com/gsi/kyndryl</loc>
    </url>
</urlset>