Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Zenith Live 2020 Speaker Profile: Mike Towers, CISO, Takeda Pharmaceutical...

Mike Towers will speak on the main stage December 9 at the Zscaler virtual cloud summit Zenith Live 2020 - Americas Conference. Two events solidified Mike Towers' commitment to secure digital...

View Article


State of Digital Transformation in EMEA: Is the Increase in Remote Work...

The events of 2020 caused quite a bit of upheaval for enterprises in EMEA. But what effect, if any, did it have on their digital transformation plans? Amidst the landscape of a global pandemic,...

View Article


Going Beyond: Zenith Live 2020

Zenith Live is bringing together some of the boldest and brightest minds in security, cloud, and beyond. Kicking off December 8, this year’s event will be completely virtual, free, and focused on...

View Article

Rethinking VPN: ManpowerGroup Modernizes Remote Access in Just 18 Days

“Within 18 days we were able to scale up and support more than 97 percent of our users in order to support activities, keep productivity high, and keep businesses running with the resources supplied...

View Article

Coverage Advisory for Ransomware Activity Targeting Healthcare and Public...

Background A joint cybersecurity advisory was released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human...

View Article


Election 2020-themed scams and threat activities

The United States presidential election is here. And as COVID-19 still runs unchecked throughout the world, 2020 continues to be an outlier year in so many ways. But one thing remains constant—scammers...

View Article

Zenith Live 2020 Speaker Profile: Andy Greenberg, author of Sandworm

Wired Magazine journalist and acclaimed author Andy Greenberg will deliver the day-two keynote at the Zscaler annual cloud summit Zenith Live 2020."On June 27, 2017, something strange and terrible...

View Article

Zenith Live Will Accelerate Your Digital Transformation Journey

Zenith Live 2020, the Zscaler Annual Cloud Summit will bring together the best experts and brightest minds in security, cloud, and enterprise digital transformation. Kicking off December 8, this year’s...

View Article


How the Cloud Helps San Mateo County CARE for its Employees and Citizens

Sean Thakkar is the Deputy CIO for the County of San Mateo, California. His post originally appeared on LinkedIn and you can view a short video about the County's work-from-anywhere journey here. When...

View Article


Modernizing Security with Six Capabilities for Zero Trust Architectures

Security modernization is top of mind for most organizations, especially with increasingly complex hybrid environments and the need to support a remote workforce. At the same time, IT budgets are...

View Article

Android Spyware Targeting Tanzania Premier League

The Zscaler ThreatLabZ team is always hunting for malware out in the wild. Recently, there have been endless cases where attackers were targeting mobile users with malware leveraging the COVID-19...

View Article

Cybercriminals Targeting Multiple Vulnerabilities in WordPress Plugins

WordPress is, by far, the most popular open source software used to build and host websites. So much so that, according to a July 2020 survey, around 455,000,000 websites are using WordPress. Overall,...

View Article

Meet Zscaler: Language, Localization, and Learning - How Isabella Muma Found...

From the journalism spotlight in Cameroon to making waves behind-the-scenes at Zscaler in Munich, Isabella Muma has had a remarkable journey. Fluent in three languages, she supports almost every team...

View Article


Zero Trust, Microsegmentation, and Cloud Security

The benefits of the cloud are seemingly endless. You can access it from anywhere, scalability is infinite, and any changes that you make are applied everywhere, instantaneously. But migrating to the...

View Article

PurpleWave—A New Infostealer from Russia

Infostealer is one of the most profitable tools for cybercriminals, as information gathered from systems infected with this malware could be sold in the cybercrime underground or used for credential...

View Article


Day in the Cloud: Education and Entertainment For a Good Cause

Trying to get a large group of people together—even for a good cause—seems like a near impossibility these days. Still, it’s important—maybe more important than ever—to continue learning and...

View Article

Dirty Devices: Are They on Your Network?

When COVID-19 was first declared a pandemic, companies scrambled to get employees working away from the office as quickly as possible. The speed at which this shift needed to happen posed some serious...

View Article


A New Paradigm Shift Threatens the Fate of VPN

If you’d told me five months ago that today I would be solely working out of my home office in San Jose, California, I would have said you were crazy. As each month has passed, I have begun to realize...

View Article

Agencies Need to Ask These Seven Critical Questions of Security Providers

In the ever-changing security landscape, federal agencies are challenged to find a security solution that not only works right now but will also address future security needs without adding...

View Article

LinkedIn Job Seeker Phishing Campaign Spreads Agent Tesla

Making the decision to leave your current job and seek employment elsewhere can be an exciting time as you imagine how much better your life and career will be when you find that dream job. But that...

View Article
Browsing all 1471 articles
Browse latest View live