The Zero Trust Hub

Trends, insights, and resources for today's cybersecurity leaders. Updated weekly.

Subscribe on LinkedIn
Weekly Podcast

The Monday Microsegment

NEWS

Out of Sight...At Risk! The Disappearing Workload Problem in Cloud Security

In Business Reporter, Mario Espinoza unpacks new wave of cloud-native threats that evade traditional tools by spinning up and almost instantly disappearing. He explains how Illumio’s graph-based detection model brings these invisible attacks to light in real time.

NEWS

Why Conviction Beats Timing: Andrew Rubin on Early Bets and the Illumio Origin Story

On the Product Market Fit podcast, Andrew Rubin shares the long game behind building Illumio. From launching in stealth to creating an entirely new market, he dives into why conviction, not timing, was the key to surviving (and thriving) in a world that wasn’t ready yet.

Weekly Briefing

Hold the Edge: There’s No One-Size-Fits-All Way to Start a Zero Trust Journey

If you think there’s a single “correct” way to start Zero Trust, think again.

We’ve all seen the headlines, the frameworks, the checklists. And while they offer helpful guidance, they can also give organizations the false idea that Zero Trust is a linear process. If you just follow step one, step two, and step three, you’ll be secure.

The reality is that there’s no universal starting point for Zero Trust. Chasing the wrong one, whether it’s the perimeter, identity, or some shiny new security tool, can actually make you more vulnerable, not less.

Zero Trust isn’t a product or a prescription. It’s a mindset. And that mindset needs to be applied to your specific risks, environments, and operational realities, not someone else’s.

Zero Trust is a strategy, not a sequence

One of the most damaging myths in security today is that Zero Trust begins at the edge — that protecting the perimeter should come first. But the perimeter as we once knew it is gone.

Workloads span on-premises and cloud. Employees log in from airports, coffee shops, and home offices. Vendors, partners, and contractors need access across environments. The edge has become fluid, and perimeter defenses can’t keep up.

Recognizing this, many organizations pivot to a new default: “Start with identity.” That’s not a bad instinct. Identity is foundational. But the problem is that it’s not automatically the right place to start for you.

If your identity infrastructure is already mature, but your network is flat and overexposed internally, then identity-first Zero Trust might not reduce risk in any meaningful way.  

In fact, it can give a false sense of security while attackers move laterally through your environment, unnoticed.

If your identity infrastructure is already mature, but your network is flat and overexposed internally, then identity-first Zero Trust might not reduce risk in any meaningful way.  

Start where you’ll reduce the most risk, fastest

Every organization has different risk priorities. What’s critical in a hospital won’t be the same for a financial services firm.

Your best place to begin Zero Trust isn’t where someone else started. It’s where you can make the biggest impact with the least friction.

For some, that means microsegmentation, breaking apart overly flat networks to contain the spread of ransomware and other threats. For others, it’s gaining visibility into workload traffic to understand who and what’s communicating and whether it should be.

Your best place to begin Zero Trust isn’t where someone else started. It’s where you can make the biggest impact with the least friction.

The only “right” starting point is the one that fits your environment, addresses your gaps, and delivers real, measurable security gains early in the journey.

Beware of shiny objects and dogmatic roadmaps

There’s a lot of noise in the Zero Trust space right now.  

Tool vendors claim they can deliver Zero Trust in a box. Consultants offer paint-by-number strategies. It seems like new acronyms spin up every quarter.

It’s easy to get distracted. But the point of Zero Trust isn’t to check a box. It’s to limit the damage attackers can do when they inevitably get in.

The only way to do that well is to build a strategy that’s tailored to your threat model, your architecture, and your mission.

That might mean starting with:

  • Workload segmentation to stop lateral movement
  • Visibility to see what’s really happening inside your environment
  • Policy enforcement to limit what users or devices can access
  • Or yes, identity, if that’s where your biggest exposure lies

But it should never mean following a one-size-fits-all playbook.

Zero Trust is a compass, not a map

At its core, Zero Trust is about making smarter, more deliberate decisions about who and what has access to your resources and under what conditions.

If you’re taking every step with the goal of enforcing least privilege, verifying continuously, and assuming breach, then you’re moving in the right direction. But if you're chasing someone else's path without considering your own risks and gaps, you're likely to miss the mark.

The bottom line is that the best place to start Zero Trust is the place where not starting will hurt you the most. It’s up to you to decide what that looks like for your organization.

STATSHOT

Small Targets, Big Risk

Small businesses are bearing the brunt of ransomware attacks, according to the 2025 Data Breach Investigations Report. While fewer than 4 in 10 breaches at large enterprises involve ransomware, that number skyrockets to nearly nine in ten for SMBs. Attackers still rely on core tactics — stolen credentials, phishing, and exploiting vulnerabilities — regardless of company size. But with fewer defenses, SMBs are far more targeted and exposed to ransomware.

Zero Trust Resources

eBook

Strategies for DORA Compliance: Key Role of Zero Trust Segmentation

Is your organization ready for the January 2025 DORA deadline? Discover key strategies for cyber resilience and how Illumio Zero Trust Segmentation simplifies compliance.

GUIDE

Zero Trust Segmentation for Dummies

Breaches are inevitable, but the damage isn’t. Zero Trust Segmentation for Dummies simplifies how to stop threats from spreading, protecting your organization before they cause harm.

REPORT

2025 Global Cost of Ransomware Study

Some 88% of organizations were hit by ransomware in the last year. Are your defenses ready to stand up to today’s ransomware threat? Uncover the real impact of ransomware and strategies to stay resilient against the next inevitable attack.

Introducing Illumio Insights:
AI Cloud Detection and Response

Get an early look at the first cloud detection and response (CDR) solution built on an AI security graph. Watch the on-demand webinar now.

Top contributors

John Kindervag

Chief Evangelist

Raghu Nandakumara

Senior Director, Industry Strategy

Gary Barlet

Public Sector CTO

Trevor Dearing

Director of Critical Infrastructure Solutions

Michael Adjei

Director, Systems Engineering

Christer Swartz

Director of Industry Solutions

Scott Smith

Analyst Relations Director