Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Malicious JavaScript injected into WordPress sites using the latest plugin...

WordPress is by far the most popular content management system (CMS) and, because of its wide usage, it is also popular among cybercriminals. Most of the WordPress sites that have been compromised are...

View Article


Top exploit kit activity roundup – Spring 2019

This is the tenth in a series of quarterly roundups by the Zscaler ThreatLabZ research team in which we collect and analyze the activity of the top exploit kits over the last three months. Exploit kits...

View Article


Don’t let Skype derail your Office 365 migration

What are the biggest concerns when considering an Office 365 migration? Generally, they’re centered around network performance and user experience. And those concerns are heightened when organizations...

View Article

The best route to the cloud: SD-WAN and cloud security

In the modern world, enterprises are entering a place where they have legitimate uses for all types of networks—private line, Ethernet, satellite, DSL, broadband, and so on. As a result, companies have...

View Article

The holistic approach to a successful cloud transformation

As applications move to the cloud, businesses often complain about skyrocketing WAN costs as well as latency issues when accessing apps. The much-anticipated benefits of a cloud transformation—greater...

View Article


How Zscaler leverages Google Cloud to deliver unprecedented security in real...

Cloud security is a complicated endeavor that requires different technologies to work together to attain the ultimate outcome: protecting today’s digital organizations. Platforms like Google Cloud can...

View Article

The great Office 365 migration: Are we there yet?

If you work in the U.S., you may well be using Office 365. As of 2019, more than 500,000 businesses in the U.S. alone use Office 365, including 70 percent of the Fortune 500. And adoption continues to...

View Article

SDP, ZTNA, and CARTA: Making sense of the zero trust security buzz

SDP and ZTNA and CARTA. Oh my! Ok, so my ditty doesn’t have quite the same ring as the memorable song from The Wizard of Oz. But the anxiety exhibited in that refrain can certainly be applied to my...

View Article


Why SD-WAN requires you to rebalance your cybersecurity portfolio

SD-WAN is an exciting new technology that allows your organization to harness the speed, availability, and comparatively low costs of the internet to manage the lion’s share of your enterprise traffic....

View Article


Felipe, a new infostealer Trojan

The Zscaler ThreatLabZ team came across a new strain of infostealer Trojan called Felipe, which silently installs itself onto a user’s system and connects to a command-and-control (C&C) server to...

View Article

Zero trust: ten years later. Is it time to think bigger?

As the concept of zero trust turns 10 years old, many of us in cybersecurity are asking two key questions: Why is zero trust popping up so much? Is zero trust something we believe we can implement?...

View Article

The Unintended Consequences Of Strong Encryption

This article originally appeared in Forbes. Secure sockets layer (SSL) is an industry-standard method for secure communications on the internet. SSL—along with its successor, transport layer security...

View Article

TIC 3.0 Will Remove a Significant Cloud Barrier

The Office of Management and Budget (OMB) in coordination with the Department of Homeland Security (DHS) recently proposed an update to the Trusted Internet Connections (TIC) policy: TIC 3.0. Still in...

View Article


Zscaler Academy World Tour 2019 Wrap-up

My education didn’t end when I walked across the stage to receive my college diploma. It continues daily, as it does for just about everyone. You wouldn’t be where you are in your life and career...

View Article

Ransomware rakes in $1 million in a week

So many brilliant and outrageous news headlines start with the words “Florida man…” that it has officially become a meme. Here are a few zingers from the past week.   Florida man reportedly breaks into...

View Article


Cloud security and the public sector: A dangerous partnership or a growing...

When it comes to making a move to the cloud, one of the biggest concerns is security. These concerns tend to be even greater among the public sector organisations, given the value and nature of the...

View Article

Will “fake” clouds stall your enterprise cloud transformation?

This article originally appeared in Forbes.    “The cloud? Sure, we're in the cloud. We ported our on-prem solution to a virtual machine.” Heard that from your network hardware vendor recently? Don't...

View Article


Magecart activity and campaign enhancements

Magecart is a hacker group known for skimming credit or debit card details by injecting malicious JavaScript code into e-commerce sites. Back in September 2018, the Zscaler ThreatLabZ research team...

View Article

How SD-WAN will change your IT department

We’ve been covering SD-WAN extensively in blogs—this is the fourth in a recent series—and the theme that has run throughout them all is that SD-WAN has the potential to reshape the enterprise network....

View Article

Zero trust is shaking up VPN strategies.

The zero trust model has been developed because the distinction between “external” and “internal” areas of information systems has begun to blur. Private applications stand alongside their SaaS-based...

View Article
Browsing all 1471 articles
Browse latest View live