Illumio is a Customers’ Choice in the 2026 Gartner Peer Insights for Network Security Microsegmentation.

The Zero Trust Hub

Trends, insights, and resources for today's cybersecurity leaders. Updated weekly.

Subscribe on LinkedIn
May 18, 2026
Want more Zero Trust segmentation trends, insights, and resources?
Explore past editions
The Monday Microsegment for the week of 5/18/2026
NEWS
Who Pays the Price When Ransomware Hits Your Network?

In Cyber Daily, Gary Barlet warns that paying ransomware demands may end one crisis while encouraging future attacks. In the wake of the Canvas breach, he argues the real issue is whether organizations can contain attackers before breaches escalate into full-scale crises.

Read more
NEWS
The Risk Behind Washington’s New IT Efficiency Mandate

In GovCIO, Gary Barlet says the OMB's new procurement mandate could cut wasteful software spending and strengthen CIO oversight. But he warns that rushing the rollout risks bottlenecks, shadow IT, and slowdowns — critical issues that most agencies can't afford.

Read more

How a Zero Trust Architecture Would’ve Rewritten Last Year’s Biggest Breaches

Gary Barlet
Public Sector CTO

Nobody wants to be in The Big Book of Breaches. And yet every year, more organizations end up in it.  

They had security teams, tools, and budgets. Their architecture just gave attackers room to turn a small compromise into a catastrophe.

I’ve spent nearly three decades in cybersecurity — in uniform, in the federal government, and now in the private sector. I’ve watched organizations pour billions into security tools, hire elite teams, and build layered defenses. And I’ve watched them get breached anyway.

What The Big Book of Breaches highlights for me is that the problem is architecture.

Attackers got in through common network weak points and walked away with billions in damage. What they all had in common was flat, permissive network architecture that gave attackers unrestricted room to move once they were inside.

Zero Trust is how you stay out of next year’s edition.

“Assume breach” means rethinking how your environment is built

I hear “assume breach” constantly, to the point it’s become almost meaningless.  

The problem is that most organizations respond to it by adding detection layers. That response treats a structural problem like an operational one.

Assume breach means designing your environment as if the attacker is already inside. The question to ask is: if someone has valid credentials in this segment, what can they reach?  

If the honest answer is a lot more than they should, you have an architecture problem.

The Change Healthcare breach featured in this year’s book of breaches answers that question at scale.  

ALPHV/BlackCat entered through a single remote access path and spread across claims processing, pharmacy systems, and payment platforms — all connected through shared network paths.  

The result was 193 million patient records exposed, $22 million in ransom paid, and over $1.6 billion spent on recovery.  

Change Healthcare’s architecture made it extraordinarily efficient to operate. It also made a single compromised path enough to take down an entire national healthcare system.

A Zero Trust architecture grounded in real-time visibility and microsegmentation treats each of those platforms as an independent, isolated segment. The ransomware still might have gotten in, but segmentation would’ve stopped it from reaching anything beyond its initial foothold.

Attack blast radius is the security metric to track

Mean time to detect and mean time to respond tell you how quickly you found the fire. They say nothing about how much burned while you were looking.

Marks & Spencer’s attackers were inside the environment for months before deploying DragonForce ransomware over Easter weekend — one of the busiest retail periods of the year.  

Using stolen credentials, they moved through Active Directory and across e-commerce, logistics, supply chain, and point-of-sale systems. By the time detection happened, the estimated damage was £300 million.

At TriZetto, attackers pulled 3.4 million patients’ Social Security numbers, dates of birth, and insurance records through a provider-facing web portal undetected for nearly a year. The access looked legitimate because in an unsegmented environment, there was no boundary to cross, no anomaly to flag, nothing to make the theft visible.

An attack’s blast radius, which describes how far an attacker moves from their initial point of compromise, is what actually captures organizational risk. A Zero Trust architecture grounded in visibility and microsegmentation is what shrinks it.

The cost of waiting is in the report

The organizations in this report had teams, tools, and cybersecurity budgets. What they shared was an architecture that assumed the perimeter would hold, with no structural plan for limiting damage once access was gained.

The attackers in these breaches used common techniques and went as far as the environment allowed. And in every case, that was far enough to cause catastrophic damage.

Zero Trust changes what far enough means. When access is earned at every boundary, a compromised credential stays an isolated incident and the blast radius shrinks from catastrophic to manageable.  

Nearly all the CISOs I talk to understands this. The ones who haven’t made it an architectural priority are the ones I worry about.

The architecture you have today defines the blast radius of your next breach.

Read more

PDF Problems

PDFs are the clear favorite for attackers, appearing far more often in malicious file detections than Word, Excel, or any other file type. The reason is simple: these are the files people trust and open every day without a second thought. In most cases, the real threat is not the file itself. Instead, attackers use familiar-looking documents to hide malicious URLs that direct users to phishing sites, fake login pages, and other harmful destinations. The tactic works because it blends seamlessly into normal business activity, turning routine clicks into opportunities for attackers.

Get the industry’s first vendor-neutral Zero Trust certification.

The Hub Contributors

John Kindervag

Chief Evangelist

Read now

Raghu Nandakumara

Vice President, Industry Strategy

Read now

Gary Barlet

Public Sector CTO

Read now

Trevor Dearing

Director of Critical Infrastructure Solutions

Read now

Michael Adjei

Director, Systems Engineering

Read now

Christer Swartz

Director of Industry Solutions

Read now

Aishwarya Ramani

Sr. Solutions Marketing Manager

Read now

Trupti Shiralkar

Director of Product Security

Read now

Scott Smith

Analyst Relations Director

Read now