Zenith Live 2020 Speaker Profile: Mike Towers, CISO, Takeda Pharmaceutical...
Mike Towers will speak on the main stage December 9 at the Zscaler virtual cloud summit Zenith Live 2020 - Americas Conference. Two events solidified Mike Towers' commitment to secure digital...
View ArticleState of Digital Transformation in EMEA: Is the Increase in Remote Work...
The events of 2020 caused quite a bit of upheaval for enterprises in EMEA. But what effect, if any, did it have on their digital transformation plans? Amidst the landscape of a global pandemic,...
View ArticleGoing Beyond: Zenith Live 2020
Zenith Live is bringing together some of the boldest and brightest minds in security, cloud, and beyond. Kicking off December 8, this year’s event will be completely virtual, free, and focused on...
View ArticleRethinking VPN: ManpowerGroup Modernizes Remote Access in Just 18 Days
“Within 18 days we were able to scale up and support more than 97 percent of our users in order to support activities, keep productivity high, and keep businesses running with the resources supplied...
View ArticleCoverage Advisory for Ransomware Activity Targeting Healthcare and Public...
Background A joint cybersecurity advisory was released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human...
View ArticleElection 2020-themed scams and threat activities
The United States presidential election is here. And as COVID-19 still runs unchecked throughout the world, 2020 continues to be an outlier year in so many ways. But one thing remains constant—scammers...
View ArticleZenith Live 2020 Speaker Profile: Andy Greenberg, author of Sandworm
Wired Magazine journalist and acclaimed author Andy Greenberg will deliver the day-two keynote at the Zscaler annual cloud summit Zenith Live 2020."On June 27, 2017, something strange and terrible...
View ArticleZenith Live Will Accelerate Your Digital Transformation Journey
Zenith Live 2020, the Zscaler Annual Cloud Summit will bring together the best experts and brightest minds in security, cloud, and enterprise digital transformation. Kicking off December 8, this year’s...
View ArticleHow the Cloud Helps San Mateo County CARE for its Employees and Citizens
Sean Thakkar is the Deputy CIO for the County of San Mateo, California. His post originally appeared on LinkedIn and you can view a short video about the County's work-from-anywhere journey here. When...
View ArticleModernizing Security with Six Capabilities for Zero Trust Architectures
Security modernization is top of mind for most organizations, especially with increasingly complex hybrid environments and the need to support a remote workforce. At the same time, IT budgets are...
View ArticleAndroid Spyware Targeting Tanzania Premier League
The Zscaler ThreatLabZ team is always hunting for malware out in the wild. Recently, there have been endless cases where attackers were targeting mobile users with malware leveraging the COVID-19...
View ArticleCybercriminals Targeting Multiple Vulnerabilities in WordPress Plugins
WordPress is, by far, the most popular open source software used to build and host websites. So much so that, according to a July 2020 survey, around 455,000,000 websites are using WordPress. Overall,...
View ArticleMeet Zscaler: Language, Localization, and Learning - How Isabella Muma Found...
From the journalism spotlight in Cameroon to making waves behind-the-scenes at Zscaler in Munich, Isabella Muma has had a remarkable journey. Fluent in three languages, she supports almost every team...
View ArticleZero Trust, Microsegmentation, and Cloud Security
The benefits of the cloud are seemingly endless. You can access it from anywhere, scalability is infinite, and any changes that you make are applied everywhere, instantaneously. But migrating to the...
View ArticlePurpleWave—A New Infostealer from Russia
Infostealer is one of the most profitable tools for cybercriminals, as information gathered from systems infected with this malware could be sold in the cybercrime underground or used for credential...
View ArticleDay in the Cloud: Education and Entertainment For a Good Cause
Trying to get a large group of people together—even for a good cause—seems like a near impossibility these days. Still, it’s important—maybe more important than ever—to continue learning and...
View ArticleDirty Devices: Are They on Your Network?
When COVID-19 was first declared a pandemic, companies scrambled to get employees working away from the office as quickly as possible. The speed at which this shift needed to happen posed some serious...
View ArticleA New Paradigm Shift Threatens the Fate of VPN
If you’d told me five months ago that today I would be solely working out of my home office in San Jose, California, I would have said you were crazy. As each month has passed, I have begun to realize...
View ArticleAgencies Need to Ask These Seven Critical Questions of Security Providers
In the ever-changing security landscape, federal agencies are challenged to find a security solution that not only works right now but will also address future security needs without adding...
View ArticleLinkedIn Job Seeker Phishing Campaign Spreads Agent Tesla
Making the decision to leave your current job and seek employment elsewhere can be an exciting time as you imagine how much better your life and career will be when you find that dream job. But that...
View Article