Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Six Steps for Effective Public-Sector Cloud Adoption in a Post-COVID World

Throughout Australia and New Zealand, governments and public-sector bodies are facing significant challenges caused by the rapid impact of technology. New work patterns are replacing those that have...

View Article


Ransomware’s Pivot: A Business School Case Study

There are very few technology companies that successfully pivot their business strategy to adapt to a macro paradigm shift. A classic case study in adapting to changing market conditions is the Netflix...

View Article


A Crowning Achievement: Cyber Security Essentials Certification in the UK

The National Cyber Security Centre (NCSC) is on a mission to make the UK the safest place to live and work online. I’m excited to say that Zscaler has joined the NCSC’s effort by attaining the...

View Article

ZPA and CrowdStrike: What This New Device Health Integration Means for You

Summary: Zscaler and CrowdStrike announced a new device health integration Device health score will be used to automatically update ZPA access policies Joint customers of ZPA and CrowdStrike ZTA can...

View Article

VPNs: The Biggest Threat to Your Industrial Control System

Is zero trust access the answer to the growing problem of VPN access to industrial control systems? I think so, and I’m not the only one. What makes VPNs dangerous Virtual private networks (VPNs) are...

View Article


Zenith Live 2020: Beyond the Limits of Legacy Thinking

This post also appeared on LinkedIn on October 17, 2020. The way the world works has changed. And so has the way we put on conferences. In the last two years, I've had the great privilege to meet and...

View Article

Measuring Your Attackable Threat Surface With the Zscaler Internet Attack...

This was originally published on LinkedIn on October 13, 2020, Did you leave the window open? Lock the door? The invitations to cyberattacks are there. And bad actors can see them. But can you? Few...

View Article

The Formula for Flawless Data Protection

Your data is under attack. That statement shouldn’t take anyone by surprise. But do you have the right data protection platform in place to keep your data safe? Judging by recent news reports and...

View Article


APT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services

Recently, Zscaler's ThreatLabZ team discovered several malicious MSI installer binaries that were hosted on attacker-controlled GitHub accounts and distributed in-the-wild in August 2020. These MSI...

View Article


Zenith Live 2020 Speaker Profile: Mike Towers, CISO, Takeda Pharmaceutical...

Mike Towers will speak on the main stage December 9 at the Zscaler virtual cloud summit Zenith Live 2020 - Americas Conference. Two events solidified Mike Towers' commitment to secure digital...

View Article

Election 2020-themed scams and threat activities

The United States presidential election is here. And as COVID-19 still runs unchecked throughout the world, 2020 continues to be an outlier year in so many ways. But one thing remains constant—scammers...

View Article

State of Digital Transformation in EMEA: Is the Increase in Remote Work...

The events of 2020 caused quite a bit of upheaval for enterprises in EMEA. But what effect, if any, did it have on their digital transformation plans? Amidst the landscape of a global pandemic,...

View Article

Going Beyond: Zenith Live 2020

Zenith Live is bringing together some of the boldest and brightest minds in security, cloud, and beyond. Kicking off December 8, this year’s event will be completely virtual, free, and focused on...

View Article


Rethinking VPN: ManpowerGroup Modernizes Remote Access in Just 18 Days

“Within 18 days we were able to scale up and support more than 97 percent of our users in order to support activities, keep productivity high, and keep businesses running with the resources supplied...

View Article

Coverage Advisory for Ransomware Activity Targeting Healthcare and Public...

Background A joint cybersecurity advisory was released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human...

View Article


Zenith Live 2020 Speaker Profile: Andy Greenberg, author of Sandworm

Wired Magazine journalist and acclaimed author Andy Greenberg will deliver the day-two keynote at the Zscaler annual cloud summit Zenith Live 2020."On June 27, 2017, something strange and terrible...

View Article

Zenith Live Will Accelerate Your Digital Transformation Journey

Zenith Live 2020, the Zscaler Annual Cloud Summit will bring together the best experts and brightest minds in security, cloud, and enterprise digital transformation. Kicking off December 8, this year’s...

View Article


Zenith Live 2020 Speaker Profile: Markus Sontheimer, CIO/CDO, DB Schenker AG

Markus Sontheimer will speak on the main stage December 9 at the Zscaler annual cloud summit Zenith Live 2020. Early investment in cloud transformation has paid (metaphorical) dividends for DB Schenker...

View Article

Helping Changes You: Zscaler Employee Raises Funds for an Orphanage in...

Zscaler strongly believes in being a leader when it comes to giving back and helping others. And one of the great things about working at Zscaler is that it is filled with people who feel the same way...

View Article

Joker Playing Hide-and-Seek with Google Play

Joker is one of the most prominent malware families that continually targets Android devices. Despite awareness of this particular malware, it keeps finding its way into Google’s official application...

View Article
Browsing all 1471 articles
Browse latest View live