Related blog posts
Where Does Zero Trust Segmentation Slot Into CISA's New Zero Trust Maturity Model?
Get insight into how CISA's updated Zero Trust Maturity Model will help federal agencies better achieve their cyber resilience objectives.
Illumio Achieves Common Criteria Designation
Learn about Illumio's Common Criteria designation from Natalio Pincever, Senior Director of Product Management for Global Public Sector at Illumio.
Gerald Caron Shares 5 Zero Trust Insights for Federal Agencies
Learn the 5 Zero Trust insights for federal agencies shared by Gerald Caron in episode 3 of The Segment podcast.
Why Cyber Disasters Are Still Happening — And How to Fix It
Get insight from Gary Barlet, Illumio Federal CTO, on why decades of trying to prevent and detect direct attacks by adversaries – and failing – means it's time to shift the focus to containment.
Illumio is "In Process" on the FedRAMP Marketplace
Get the details about what Illumio's new FedRAMP in-process designation means for your federal organization.
7 Reasons Why the Federal Sector Should Choose Illumio for Micro-Segmentation
Federal agencies require micro-segmentation. Learn why Illumio is the best choice.
3 Challenges Federal Agencies Face When Implementing Modern Cybersecurity
The U.S. federal government collects the personal information of almost every citizen. And federal agencies hold valuable data, some of which could put the country in danger if it was released.
Operationalizing the Biden Administration's Cybersecurity Executive Order with Zero Trust
Ready to operationalize President Biden's cybersecurity executive order with Zero Trust? Read this blog to find out how.
What President Biden’s New Security Policy Means for the Future of Cyber
The Biden Administration just cemented its legacy in cybersecurity policy with a sweeping Executive Order aimed at improving the resilience and reducing the risk of the United States Government.
How Federal Agencies Can Create a Zero Trust Pilot Project
If you want to implement Zero Trust in your organization, start by figuring out the critical security priorities and current Zero Trust capabilities.
Ready to learn more about Zero Trust Segmentation?