Quantcast

Welcome to the Zero Trust Hospital

In the rapidly evolving landscape of healthcare IT, the need for robust cybersecurity measures has never been more critical. Healthcare facilities continue to be high value targets for cyber criminals...

View Article


Technical Analysis of Xloader Versions 6 and 7 | Part 2

This is Part 2 of our two-part technical analysis on Xloader versions 6 and 7. For details on how Xloader conceals its critical code and data, go to Part 1.IntroductionIn Part 2 of this blog series, we...

View Article


Mobile World Congress: The Demand for Uniformity in Zero Trust

My key take away from last year’s Mobile World Congress was that now almost everything is SIM-enabled, the industry focus moving forward will be on how telcos can make use of connectivity being...

View Article

EMEA Partner Summit Recap: Partnering with Purpose

undefined

View Article

Maximize Your SaaS Investments with the Contract Management Feature in...

Zscaler is excited to announce the release of the Contract Management feature within Zscaler Business Insights. This new feature is designed to help customers effectively manage their SaaS application...

View Article


The New Healthcare Triad: Safety, Cybersecurity, and Profitability in...

Let’s talk about numbers. Without diagnostic devices, the $4 trillion U.S. healthcare industry crumbles. These tools are the compass guiding clinicians toward accurate treatments and life-saving...

View Article

Uncovering AI Toxic Combinations - How to defend your data from Agentic AI...

OverviewData is the lifeblood of modern enterprise applications. Large volumes of data have enabled modern businesses to generate business insights, improve ROI and deliver customer excellence....

View Article

Feeling a Bit… Exposed When It Comes to Your Assets? Zscaler Has You Covered!

Zscaler – it’s not just for zero trust anymore. Today, we launch our Continuous Threat Exposure Management (CTEM) platform, bringing you unparalleled capabilities in posture management. Zscaler...

View Article


Legacy Architecture is Preventing a Modern Digitised NHS

May 12th, 2017 is a day burned into the memories of IT and security teams nationwide. For those lucky enough to not be impacted, it was the first large-scale ransomware attack - titled WannaCry - which...

View Article


DeepSeek Lure Using CAPTCHAs To Spread Malware

IntroductionThe rapid rise of generative AI tools has created opportunities and challenges for cybercriminals. In an instant, industries are being reshaped while new attack surfaces are being exposed....

View Article

Lessons from Gartner on Infusing Resilience Into Your Security and Risk Program

2025 demands a new approach to cybersecurity resilience. As network complexity collides with ever-more volatile threat and operating landscapes, traditional security measures have become...

View Article

Unlocking Secure Business Transformation with Zero Trust for RISE with SAP

The global push toward cloud-first strategies is changing the way we think about business systems, and enterprise resource planning (ERP) solutions are no exception. Recognizing this seismic shift,...

View Article

How Zero Trust Architecture Drives Cost Efficiency and Modernization in...

Government agencies are under increasing pressure to modernize IT systems, deliver cost savings, and enhance cybersecurity—all while navigating and maintaining legacy networks that slow operations and...

View Article


Zscaler and the Accenture Cloud Innovation Center in Rome: Pioneering Cloud...

Since its inception in 2018, the Accenture Cloud Innovation Center (ACIC) Rome has been at the forefront of developing advanced cloud-first solutions.At Zscaler, we are proud to collaborate with...

View Article

The Zero Trust Hospital: A New Approach to Securing Healthcare

The healthcare industry is undergoing a major digital transformation. AI-assisted diagnostics, electronic health records (EHRs), telemedicine, and wearable health devices are revolutionizing patient...

View Article


Zscaler Copilot Simplifies Troubleshooting During Slack Outage on February...

On February 26, 2025, organizations using Slack faced significant disruptions, causing frustration and productivity challenges across many businesses. During this widespread Slack outage, Zscaler...

View Article

Zscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New...

Zscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New Delivery Services AuthorizationZscaler and IBM have a long history of empowering organizations to securely access and protect...

View Article


The Return-to-Office Blueprint: Modernizing the Workplace with Zero Trust

It started with a ping in the quiet stillness of your home office—the all-too-familiar sound of a calendar invite updating your week. The subject line read: "Return-to-Office Transition Plan." For...

View Article

Zero Trust: Begin Your Journey with These First Steps

If you’ve ever wished someone would explain zero trust to you in plain English, you're not alone. It can be hard to cut through the noise and understand what it really means. Widespread overuse and...

View Article

Cracking the Code: HIMSS 2025 Takeaways on AI, Cybersecurity, and Clinician...

If you wandered through the packed halls of HIMSS 2025, you probably heard familiar buzzwords—AI, cybersecurity, interoperability—but this year, attendees wanted more than just flashy demos. They...

View Article

Empowering the Next Generation: Zscaler Hosts a Brilliant Breakfast for...

On March 13, Zscaler partnered with The King’s Trust to host a Brilliant Breakfast in celebration of International Women’s Day. Part of the Trust’s 'Change a Girl’s Life’ campaign, this inspiring event...

View Article


Business Interruption: What It Means and How to Stop It

A business interruption is any unexpected event that halts an organization’s operations. In the ever-increasing competitive pressure of today’s business environment, such interruptions can prove...

View Article


Why Zero Trust Architecture Is Superior to Traditional Security Models

Today’s threat landscape is marked by increasingly sophisticated cyberattacks. Ransomware incidents grew by 18% in 2024, while the Dark Angels cybercrime group walked away from a single attack with a...

View Article

Extending Zero Trust Principles On-Prem: The Next Step for the...

In Part 1 of our Zero Trust Office blog series, Jose Padin discussed how and why organizations should use Zero Trust to support their return-to-office strategies, replacing legacy network trust models...

View Article

AI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report

Artificial intelligence (AI) has rapidly shifted from buzz to business necessity over the past year—something Zscaler has seen firsthand while pioneering AI-powered solutions and tracking enterprise...

View Article


CVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks

IntroductionCVE-2025-24813 was originally published on March 10 with a medium severity score of 5.5, and Apache Tomcat released an update to fix it. On March 12, the first attack was detected in Poland...

View Article

Lessons Learned in the Eye of the Storm: Rebuilding Healthcare Resilience...

Through the Looking Glass: Reflecting on Ransomware Reality and Healthcare ResilienceLet me take you back to a dark moment in healthcare cybersecurity. It’s the middle of a crisp October night. A...

View Article

Can AI Detect and Mitigate Zero Day Vulnerabilities?

IntroductionCybersecurity is a never-ending arms race. Every time security analysts develop a new defense, threat actors find a way to circumvent it. Nowhere is this more evident than in the case of...

View Article

Shadow AI: A Growing Threat to Corporate Data Security

Welcome to a rapidly evolving landscape of opportunity—and risk. The corporate embrace of today's AI tools has revolutionized efficiency, creativity, and collaboration. But lurking in the shadows is a...

View Article



Announcing New Innovations on GovClouds: Enhancing Security, Compliance, and...

In today’s rapidly evolving threat landscape, government agencies and defense organizations face unprecedented challenges. From safeguarding classified information to ensuring uninterrupted...

View Article

Americas Executive Partner Summit Recap: Partnering for Tomorrow's Success

undefined

View Article

CoffeeLoader: A Brew of Stealthy Techniques

IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and...

View Article

AI-Driven Threat Detection: Revolutionizing Cyber Defense

Introduction Cyberthreats have evolved at an unprecedented pace, growing in both complexity and scale. Ransomware, phishing campaigns, and supply chain attacks have become more sophisticated, making...

View Article


CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw

IntroductionOn March 21, 2025, a critical vulnerability, CVE-2025-29927, was publicly disclosed with a CVSS score of 9.1, signifying high severity. Discovered by security researcher Rachid Allam, the...

View Article

Global Access, Local Control: Breaking Geo Restrictions with Zscaler Internet...

Built upon the core tenet of unrestricted access to global resources, the internet was hailed as an open gateway that fostered a borderless digital economy where businesses could operate, collaborate,...

View Article

Analyzing New HijackLoader Evasion Tactics

IntroductionHijackLoader (also known as IDAT Loader and GHOSTPULSE) is a malware loader initially discovered in 2023. The loader is not only capable of delivering second-stage payloads, but also offers...

View Article


Securing Future Growth: How FICO Embraces the Cloud with Confidence

Securing a global enterprise like FICO, widely known for its credit scoring system, is no small task. This is especially true for FICO, as our offerings extend beyond the consumer.A large part of our...

View Article


Secure Developer Workflows with ZIA’s Automated TLS/SSL Inspection and Code...

The Developer's Dilemma: Innovate Rapidly without CompromiseDevelopers use cloud-based code repositories, CI/CD pipelines, and tools to build and deploy applications faster than ever before. While this...

View Article

Enterprises Embracing Zero Trust Everywhere

Digital transformation is a complex but essential journey for organizations striving to remain relevant in today’s hyper-connected, hyper-competitive world. At Zscaler’s recent Global IT Leadership...

View Article

How DSPM Helps Prevent Data Exposure from Overprivileged Access

The Rise of Data and Identities The explosion of data across enterprises, coupled with the adoption of public cloud environments and AI-driven innovations, has dramatically increased the complexity of...

View Article

Fighting AI-Driven Malware: Using AI for Effective Defense

Cybercrime continues to escalate—with global costs projected to hit $10.5 trillion annually this year¹—as attackers use advanced technologies to bypass traditional defenses. Among these advancements is...

View Article


How organisations can weather future storms by becoming ‘Resilient by Design‘

In today's world of escalating cyber threats, organisations face unprecedented challenges trying to maintain IT and business operations without disruption. As the pressure to digitally transform...

View Article

Data Loss Prevention (DLP) Explained: Essential Strategies, Tools, and Best...

While data protection is all the rage, it's important to understand one key aspect of it: DLP. Short for data loss prevention, this often gets confused with the broader concept of data protection as a...

View Article


Granular Control and Flexibility with Cloud Traffic Forwarding

IntroductionZero Trust Cloud, our product under the Zscaler Zero Trust Networking portfolio helps securely connect workloads in the public cloud. The solution uses purpose built gateways deployed into...

View Article

Insights from ViVE 2025 and HIMSS25: Reflections on Zero Trust, Generative...

ViVE 2025 and HIMSS25 were invigorating reminders of just how dynamic, and challenging, the world of healthcare cybersecurity continues to be. From my speaking sessions to the launch of the Zero Trust...

View Article


Securing AI Communication Protocols with ZIA’s Innovative Cybersecurity...

As organizations adopt generative artificial intelligence (GenAI) to increase the velocity of productivity and decision-making, they must address the security challenges to the enterprise: threat...

View Article

The Zero Trust Experience: Driving User Visibility and Performance In and Out...

As organizations adapt to hybrid work models, IT teams have to balance user needs for productivity and seamless experience with security. Zero Trust has helped bridge this gap for remote workers and...

View Article

Securing the Future of Automotive Manufacturing: A Zero Trust Approach

As auto manufacturers transition toward a world of electric vehicles, they are shuffling profits from gasoline-powered vehicles into research and development for EVs. This research generates new...

View Article

ThreatLabz 2025 VPN Report: Why 81% of Organizations Plan to Adopt Zero Trust...

VPN technologies have long been a backbone of remote access — but according to new ThreatLabz research, the security risks and performance challenges of VPNs may be rapidly changing the status quo for...

View Article


My Cloud Connector Monitoring Stack - AWS (Part 1)

Sometimes the best ideas start with a simple “what if”. Over the years, I’ve had countless conversations with customers around how to monitor and alert on Zscaler Cloud Connectors – especially in...

View Article