Illumio blog

Dive deeper into Illumio Zero Trust Segmentation with think pieces, Illumineer profiles, instructional guides, and more

Ransomware Containment

Why Medusa Ransomware Is a Growing Threat to Critical Infrastructure
Ransomware Containment

Why Medusa Ransomware Is a Growing Threat to Critical Infrastructure

Learn how Medusa ransomware works and why it’s so dangerous to critical infrastructure globally.

Ransomware in 2025: Cost, Trends, and How to Reduce Your Risk
Ransomware Containment

Ransomware in 2025: Cost, Trends, and How to Reduce Your Risk

Learn how attackers exploit security gaps, why ransomware is now a business model, and how microsegmentation can stop threats in their tracks.

Global Cost of Ransomware Study: What the Numbers Tell Us
Ransomware Containment

Global Cost of Ransomware Study: What the Numbers Tell Us

Learn how attackers are shifting to operational disruption, why prevention isn’t enough, and how Zero Trust and microsegmentation contain ransomware impact.

How to Meet CISA’s Phobos Ransomware Guidance With Illumio
Ransomware Containment

How to Meet CISA’s Phobos Ransomware Guidance With Illumio

Discover CISA’s guidance to protect against Phobos ransomware and how the Illumio Zero Trust Segmentation Platform helps meet these standards.

Contain Ransomware at Its Source With Zero Trust Segmentation
Ransomware Containment

Contain Ransomware at Its Source With Zero Trust Segmentation

Learn why the ransomware threat is so critical and how to achieve ransomware containment with Zero Trust Segmentation.

Utilities Attacks Are Becoming More Disruptive: What Operators Can Do
Ransomware Containment

Utilities Attacks Are Becoming More Disruptive: What Operators Can Do

Learn how utilities attacks are changing and the five strategies operators can use to mitigate today’s threats.

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help
Ransomware Containment

Kubernetes Isn’t Immune to Ransomware – And How Illumio Can Help

Learn why ransomware is a very real cybersecurity risk in Kubernetes that DevSecOps architects can't afford to ignore.

AWS and Illumio: Helping Healthcare Modernize Their Ransomware Response
Ransomware Containment

AWS and Illumio: Helping Healthcare Modernize Their Ransomware Response

Join Illumio on September 21 at 9 AM PST for a free webinar featuring Amazon Web Services (AWS).

Demystifying Ransomware Techniques Using .Net Assemblies: A Multi-Stage Attack
Ransomware Containment

Demystifying Ransomware Techniques Using .Net Assemblies: A Multi-Stage Attack

Learn the fundamentals of a multi-stage payload attack using a set of staged payloads.

Demystifying Ransomware Techniques Using .Net Assemblies: EXE vs. DLL Assemblies
Ransomware Containment

Demystifying Ransomware Techniques Using .Net Assemblies: EXE vs. DLL Assemblies

Learn the key differences between .Net assemblies (EXE vs. DLL) and how they are executed on an initial high-level code.

3 Steps to Reduce Ransomware Risk With Illumio’s New Ransomware Protection Dashboard
Ransomware Containment

3 Steps to Reduce Ransomware Risk With Illumio’s New Ransomware Protection Dashboard

Learn how Illumio’s Ransomware Protection Dashboard and improved user interface (UI) gives you key visibility into ransomware risk.

Assume Breach with Zero Trust Endpoint Security
Ransomware Containment

Assume Breach with Zero Trust Endpoint Security

Learn why traditional approaches to endpoint security aren't enough and how Illumio Endpoint can complement your existing detection tools.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?