Welcome to the Zero Trust Hospital
In the rapidly evolving landscape of healthcare IT, the need for robust cybersecurity measures has never been more critical. Healthcare facilities continue to be high value targets for cyber criminals...
View ArticleTechnical Analysis of Xloader Versions 6 and 7 | Part 2
This is Part 2 of our two-part technical analysis on Xloader versions 6 and 7. For details on how Xloader conceals its critical code and data, go to Part 1.IntroductionIn Part 2 of this blog series, we...
View ArticleMobile World Congress: The Demand for Uniformity in Zero Trust
My key take away from last year’s Mobile World Congress was that now almost everything is SIM-enabled, the industry focus moving forward will be on how telcos can make use of connectivity being...
View ArticleMaximize Your SaaS Investments with the Contract Management Feature in...
Zscaler is excited to announce the release of the Contract Management feature within Zscaler Business Insights. This new feature is designed to help customers effectively manage their SaaS application...
View ArticleThe New Healthcare Triad: Safety, Cybersecurity, and Profitability in...
Let’s talk about numbers. Without diagnostic devices, the $4 trillion U.S. healthcare industry crumbles. These tools are the compass guiding clinicians toward accurate treatments and life-saving...
View ArticleUncovering AI Toxic Combinations - How to defend your data from Agentic AI...
OverviewData is the lifeblood of modern enterprise applications. Large volumes of data have enabled modern businesses to generate business insights, improve ROI and deliver customer excellence....
View ArticleFeeling a Bit… Exposed When It Comes to Your Assets? Zscaler Has You Covered!
Zscaler – it’s not just for zero trust anymore. Today, we launch our Continuous Threat Exposure Management (CTEM) platform, bringing you unparalleled capabilities in posture management. Zscaler...
View ArticleLegacy Architecture is Preventing a Modern Digitised NHS
May 12th, 2017 is a day burned into the memories of IT and security teams nationwide. For those lucky enough to not be impacted, it was the first large-scale ransomware attack - titled WannaCry - which...
View ArticleDeepSeek Lure Using CAPTCHAs To Spread Malware
IntroductionThe rapid rise of generative AI tools has created opportunities and challenges for cybercriminals. In an instant, industries are being reshaped while new attack surfaces are being exposed....
View ArticleLessons from Gartner on Infusing Resilience Into Your Security and Risk Program
2025 demands a new approach to cybersecurity resilience. As network complexity collides with ever-more volatile threat and operating landscapes, traditional security measures have become...
View ArticleUnlocking Secure Business Transformation with Zero Trust for RISE with SAP
The global push toward cloud-first strategies is changing the way we think about business systems, and enterprise resource planning (ERP) solutions are no exception. Recognizing this seismic shift,...
View ArticleHow Zero Trust Architecture Drives Cost Efficiency and Modernization in...
Government agencies are under increasing pressure to modernize IT systems, deliver cost savings, and enhance cybersecurity—all while navigating and maintaining legacy networks that slow operations and...
View ArticleZscaler and the Accenture Cloud Innovation Center in Rome: Pioneering Cloud...
Since its inception in 2018, the Accenture Cloud Innovation Center (ACIC) Rome has been at the forefront of developing advanced cloud-first solutions.At Zscaler, we are proud to collaborate with...
View ArticleThe Zero Trust Hospital: A New Approach to Securing Healthcare
The healthcare industry is undergoing a major digital transformation. AI-assisted diagnostics, electronic health records (EHRs), telemedicine, and wearable health devices are revolutionizing patient...
View ArticleZscaler Copilot Simplifies Troubleshooting During Slack Outage on February...
On February 26, 2025, organizations using Slack faced significant disruptions, causing frustration and productivity challenges across many businesses. During this widespread Slack outage, Zscaler...
View ArticleZscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New...
Zscaler and IBM Expand Partnership to Drive Zero Trust Adoption with New Delivery Services AuthorizationZscaler and IBM have a long history of empowering organizations to securely access and protect...
View ArticleThe Return-to-Office Blueprint: Modernizing the Workplace with Zero Trust
It started with a ping in the quiet stillness of your home office—the all-too-familiar sound of a calendar invite updating your week. The subject line read: "Return-to-Office Transition Plan." For...
View ArticleZero Trust: Begin Your Journey with These First Steps
If you’ve ever wished someone would explain zero trust to you in plain English, you're not alone. It can be hard to cut through the noise and understand what it really means. Widespread overuse and...
View ArticleCracking the Code: HIMSS 2025 Takeaways on AI, Cybersecurity, and Clinician...
If you wandered through the packed halls of HIMSS 2025, you probably heard familiar buzzwords—AI, cybersecurity, interoperability—but this year, attendees wanted more than just flashy demos. They...
View ArticleEmpowering the Next Generation: Zscaler Hosts a Brilliant Breakfast for...
On March 13, Zscaler partnered with The King’s Trust to host a Brilliant Breakfast in celebration of International Women’s Day. Part of the Trust’s 'Change a Girl’s Life’ campaign, this inspiring event...
View ArticleBusiness Interruption: What It Means and How to Stop It
A business interruption is any unexpected event that halts an organization’s operations. In the ever-increasing competitive pressure of today’s business environment, such interruptions can prove...
View ArticleWhy Zero Trust Architecture Is Superior to Traditional Security Models
Today’s threat landscape is marked by increasingly sophisticated cyberattacks. Ransomware incidents grew by 18% in 2024, while the Dark Angels cybercrime group walked away from a single attack with a...
View ArticleExtending Zero Trust Principles On-Prem: The Next Step for the...
In Part 1 of our Zero Trust Office blog series, Jose Padin discussed how and why organizations should use Zero Trust to support their return-to-office strategies, replacing legacy network trust models...
View ArticleAI in the Enterprise: Key Findings from the ThreatLabz 2025 AI Security Report
Artificial intelligence (AI) has rapidly shifted from buzz to business necessity over the past year—something Zscaler has seen firsthand while pioneering AI-powered solutions and tracking enterprise...
View ArticleCVE-2025-24813: Apache Tomcat Vulnerable to RCE Attacks
IntroductionCVE-2025-24813 was originally published on March 10 with a medium severity score of 5.5, and Apache Tomcat released an update to fix it. On March 12, the first attack was detected in Poland...
View ArticleLessons Learned in the Eye of the Storm: Rebuilding Healthcare Resilience...
Through the Looking Glass: Reflecting on Ransomware Reality and Healthcare ResilienceLet me take you back to a dark moment in healthcare cybersecurity. It’s the middle of a crisp October night. A...
View ArticleCan AI Detect and Mitigate Zero Day Vulnerabilities?
IntroductionCybersecurity is a never-ending arms race. Every time security analysts develop a new defense, threat actors find a way to circumvent it. Nowhere is this more evident than in the case of...
View ArticleShadow AI: A Growing Threat to Corporate Data Security
Welcome to a rapidly evolving landscape of opportunity—and risk. The corporate embrace of today's AI tools has revolutionized efficiency, creativity, and collaboration. But lurking in the shadows is a...
View ArticleAnnouncing New Innovations on GovClouds: Enhancing Security, Compliance, and...
In today’s rapidly evolving threat landscape, government agencies and defense organizations face unprecedented challenges. From safeguarding classified information to ensuring uninterrupted...
View ArticleCoffeeLoader: A Brew of Stealthy Techniques
IntroductionZscaler ThreatLabz has identified a new sophisticated malware family that we named CoffeeLoader, which originated around September 2024. The purpose of the malware is to download and...
View ArticleAI-Driven Threat Detection: Revolutionizing Cyber Defense
Introduction Cyberthreats have evolved at an unprecedented pace, growing in both complexity and scale. Ransomware, phishing campaigns, and supply chain attacks have become more sophisticated, making...
View ArticleCVE-2025-29927: Next.js Middleware Authorization Bypass Flaw
IntroductionOn March 21, 2025, a critical vulnerability, CVE-2025-29927, was publicly disclosed with a CVSS score of 9.1, signifying high severity. Discovered by security researcher Rachid Allam, the...
View ArticleGlobal Access, Local Control: Breaking Geo Restrictions with Zscaler Internet...
Built upon the core tenet of unrestricted access to global resources, the internet was hailed as an open gateway that fostered a borderless digital economy where businesses could operate, collaborate,...
View ArticleAnalyzing New HijackLoader Evasion Tactics
IntroductionHijackLoader (also known as IDAT Loader and GHOSTPULSE) is a malware loader initially discovered in 2023. The loader is not only capable of delivering second-stage payloads, but also offers...
View ArticleSecuring Future Growth: How FICO Embraces the Cloud with Confidence
Securing a global enterprise like FICO, widely known for its credit scoring system, is no small task. This is especially true for FICO, as our offerings extend beyond the consumer.A large part of our...
View ArticleSecure Developer Workflows with ZIA’s Automated TLS/SSL Inspection and Code...
The Developer's Dilemma: Innovate Rapidly without CompromiseDevelopers use cloud-based code repositories, CI/CD pipelines, and tools to build and deploy applications faster than ever before. While this...
View ArticleEnterprises Embracing Zero Trust Everywhere
Digital transformation is a complex but essential journey for organizations striving to remain relevant in today’s hyper-connected, hyper-competitive world. At Zscaler’s recent Global IT Leadership...
View ArticleHow DSPM Helps Prevent Data Exposure from Overprivileged Access
The Rise of Data and Identities The explosion of data across enterprises, coupled with the adoption of public cloud environments and AI-driven innovations, has dramatically increased the complexity of...
View ArticleFighting AI-Driven Malware: Using AI for Effective Defense
Cybercrime continues to escalate—with global costs projected to hit $10.5 trillion annually this year¹—as attackers use advanced technologies to bypass traditional defenses. Among these advancements is...
View ArticleHow organisations can weather future storms by becoming ‘Resilient by Design‘
In today's world of escalating cyber threats, organisations face unprecedented challenges trying to maintain IT and business operations without disruption. As the pressure to digitally transform...
View ArticleData Loss Prevention (DLP) Explained: Essential Strategies, Tools, and Best...
While data protection is all the rage, it's important to understand one key aspect of it: DLP. Short for data loss prevention, this often gets confused with the broader concept of data protection as a...
View ArticleGranular Control and Flexibility with Cloud Traffic Forwarding
IntroductionZero Trust Cloud, our product under the Zscaler Zero Trust Networking portfolio helps securely connect workloads in the public cloud. The solution uses purpose built gateways deployed into...
View ArticleInsights from ViVE 2025 and HIMSS25: Reflections on Zero Trust, Generative...
ViVE 2025 and HIMSS25 were invigorating reminders of just how dynamic, and challenging, the world of healthcare cybersecurity continues to be. From my speaking sessions to the launch of the Zero Trust...
View ArticleSecuring AI Communication Protocols with ZIA’s Innovative Cybersecurity...
As organizations adopt generative artificial intelligence (GenAI) to increase the velocity of productivity and decision-making, they must address the security challenges to the enterprise: threat...
View ArticleThe Zero Trust Experience: Driving User Visibility and Performance In and Out...
As organizations adapt to hybrid work models, IT teams have to balance user needs for productivity and seamless experience with security. Zero Trust has helped bridge this gap for remote workers and...
View ArticleSecuring the Future of Automotive Manufacturing: A Zero Trust Approach
As auto manufacturers transition toward a world of electric vehicles, they are shuffling profits from gasoline-powered vehicles into research and development for EVs. This research generates new...
View ArticleThreatLabz 2025 VPN Report: Why 81% of Organizations Plan to Adopt Zero Trust...
VPN technologies have long been a backbone of remote access — but according to new ThreatLabz research, the security risks and performance challenges of VPNs may be rapidly changing the status quo for...
View ArticleMy Cloud Connector Monitoring Stack - AWS (Part 1)
Sometimes the best ideas start with a simple “what if”. Over the years, I’ve had countless conversations with customers around how to monitor and alert on Zscaler Cloud Connectors – especially in...
View Article