microsegment.io

segment all the things

M-Trends 2025: Unpacking the Threats and Why Microsegmentation is Your Strongest Defense

The recently released Mandiant M-Trends 2025 report offers a insightful look into the evolving cybersecurity landscape. As we digest its key findings, one thing becomes abundantly clear: attackers are becoming more opportunistic and sophisticated, exploiting any weakness they can find. For those of us focused on building resilient security architectures, the report underscores the importance of granular control and containment – principles at the heart of microsegmentation.


Attackers think in graphs

Defenders think in tables

The Graph Advantage: Why Attackers Think in Networks While Defenders Think in Rows

When a security analyst opens their SIEM dashboard, they typically see what defenders have seen for decades: endless tables of logs, sorted by timestamp, filtered by IP address, grouped by event type. Meanwhile, somewhere in the digital shadows, an attacker is mapping out their target’s infrastructure like a cartographer charting new territory—not in rows and columns, but as an interconnected web of relationships, vulnerabilities, and opportunities.


Recommended reading: Cyber Resilience: A Perishable Skill That Needs Practice

Recommended Reading: Cyber Resilience: A Perishable Skill That Needs Practice

Great piece on LinkedIn by Prof. Dan Haagman:

Cyber resilience is like going to the gym: skip your workouts and you’ll get flabby fast. His big insight? Even seasoned execs throw out the playbook under pressure and just wing it.

The fix? Get those tabletop exercises scheduled and keep adversary sims running. Your DR plan from 2015 won’t cut it against modern ransomware. Building muscle memory through practice is what separates the pros from the panicked.


The microsegmentation landscape in 2025

Current state and future directions

The Microsegmentation Landscape in 2025: Current State and Future Directions

Introduction

Microsegmentation has evolved significantly since its early days as a network security approach, becoming a cornerstone of modern zero trust security architectures. As we move through 2025, the microsegmentation landscape continues to mature with new technologies, integration capabilities, and use cases expanding beyond traditional data center environments. This overview examines the current state of microsegmentation, key trends, leading vendors, and future directions.


Thoughts on the Attack matrix for Kubernetes

This is just a datacenter

Introduction

In a recent blog post Yossi Weizman talks about the Attack matrix for Kubernetes and i had a couple of thoughts about it. As Yossi rightly says, Kubernetes is becoming a vital part in the compute stack of many companies. What i hear in my network and during sessions with IT security teams is that they face new challenges with Kubernetes-based orchestration platforms. The container platforms are also perceived like a black box for traditional networking and IT security folks, so it makes sense to understand the security risks that are inherent to those platforms first.