Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Ransomware Containment

The Master Key Problem: Inside the Salesloft Breach and Ongoing Threat
Ransomware Containment

The Master Key Problem: Inside the Salesloft Breach and Ongoing Threat

Discover what the Salesloft breach reveals about OAuth token abuse, hidden trust risks, and how to contain threats before they spread.

How AI-Powered CDR + Segmentation Power Simpler Breach Containment
Ransomware Containment

How AI-Powered CDR + Segmentation Power Simpler Breach Containment

Learn how AI-powered CDR and segmentation transform hybrid cloud security by combining intelligent detection with real-time containment for faster, simpler breach defense.

Kubernetes Blind Spots: Why Agentless Container Security Is a Must-Have
Ransomware Containment

Kubernetes Blind Spots: Why Agentless Container Security Is a Must-Have

Learn why Illumio’s agentless container security delivers the visibility and automated segmentation teams need to stay secure.

Modern Trojan Horse: How Attackers Live Off the Land and How to Stop Them
Ransomware Containment

Modern Trojan Horse: How Attackers Live Off the Land and How to Stop Them

Uncover how attackers “live off the land” using trusted tools like PowerShell and SSH and how to stop LOTL threats with visibility and containment.

Inside the Investigation: Hunting Hackers Through the ‘Foundational Four’
Ransomware Containment

Inside the Investigation: Hunting Hackers Through the ‘Foundational Four’

Learn key questions, tactics, and tools for uncovering malicious activity, tracing attacker behavior, and protecting critical data in today’s complex threat landscape.

Dr. Larry Ponemon on Why Containment — Not Prevention — Is the Future of Cybersecurity
Ransomware Containment

Dr. Larry Ponemon on Why Containment — Not Prevention — Is the Future of Cybersecurity

Learn from cybersecurity expert Dr. Larry Ponemon on why prevention is no longer enough and why containment, Zero Trust, and strong leadership are key to surviving modern ransomware attacks.

Why Medusa Ransomware Is a Growing Threat to Critical Infrastructure
Ransomware Containment

Why Medusa Ransomware Is a Growing Threat to Critical Infrastructure

Learn how Medusa ransomware works and why it’s so dangerous to critical infrastructure globally.

Ransomware in 2025: Cost, Trends, and How to Reduce Your Risk
Ransomware Containment

Ransomware in 2025: Cost, Trends, and How to Reduce Your Risk

Learn how attackers exploit security gaps, why ransomware is now a business model, and how microsegmentation can stop threats in their tracks.

Global Cost of Ransomware Study: What the Numbers Tell Us
Ransomware Containment

Global Cost of Ransomware Study: What the Numbers Tell Us

Learn how attackers are shifting to operational disruption, why prevention isn’t enough, and how Zero Trust and microsegmentation contain ransomware impact.

How to Meet CISA’s Phobos Ransomware Guidance With Illumio
Ransomware Containment

How to Meet CISA’s Phobos Ransomware Guidance With Illumio

Discover CISA’s guidance to protect against Phobos ransomware and how the Illumio Zero Trust Segmentation Platform helps meet these standards.

Contain Ransomware at Its Source With Zero Trust Segmentation
Ransomware Containment

Contain Ransomware at Its Source With Zero Trust Segmentation

Learn why the ransomware threat is so critical and how to achieve ransomware containment with Zero Trust Segmentation.

Utilities Attacks Are Becoming More Disruptive: What Operators Can Do
Ransomware Containment

Utilities Attacks Are Becoming More Disruptive: What Operators Can Do

Learn how utilities attacks are changing and the five strategies operators can use to mitigate today’s threats.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?