Six Steps for Effective Public-Sector Cloud Adoption in a Post-COVID World
Throughout Australia and New Zealand, governments and public-sector bodies are facing significant challenges caused by the rapid impact of technology. New work patterns are replacing those that have...
View ArticleRansomware’s Pivot: A Business School Case Study
There are very few technology companies that successfully pivot their business strategy to adapt to a macro paradigm shift. A classic case study in adapting to changing market conditions is the Netflix...
View ArticleA Crowning Achievement: Cyber Security Essentials Certification in the UK
The National Cyber Security Centre (NCSC) is on a mission to make the UK the safest place to live and work online. I’m excited to say that Zscaler has joined the NCSC’s effort by attaining the...
View ArticleZPA and CrowdStrike: What This New Device Health Integration Means for You
Summary: Zscaler and CrowdStrike announced a new device health integration Device health score will be used to automatically update ZPA access policies Joint customers of ZPA and CrowdStrike ZTA can...
View ArticleVPNs: The Biggest Threat to Your Industrial Control System
Is zero trust access the answer to the growing problem of VPN access to industrial control systems? I think so, and I’m not the only one. What makes VPNs dangerous Virtual private networks (VPNs) are...
View ArticleZenith Live 2020: Beyond the Limits of Legacy Thinking
This post also appeared on LinkedIn on October 17, 2020. The way the world works has changed. And so has the way we put on conferences. In the last two years, I've had the great privilege to meet and...
View ArticleMeasuring Your Attackable Threat Surface With the Zscaler Internet Attack...
This was originally published on LinkedIn on October 13, 2020, Did you leave the window open? Lock the door? The invitations to cyberattacks are there. And bad actors can see them. But can you? Few...
View ArticleThe Formula for Flawless Data Protection
Your data is under attack. That statement shouldn’t take anyone by surprise. But do you have the right data protection platform in place to keep your data safe? Judging by recent news reports and...
View ArticleAPT-31 Leverages COVID-19 Vaccine Theme and Abuses Legitimate Online Services
Recently, Zscaler's ThreatLabZ team discovered several malicious MSI installer binaries that were hosted on attacker-controlled GitHub accounts and distributed in-the-wild in August 2020. These MSI...
View ArticleZenith Live 2020 Speaker Profile: Mike Towers, CISO, Takeda Pharmaceutical...
Mike Towers will speak on the main stage December 9 at the Zscaler virtual cloud summit Zenith Live 2020 - Americas Conference. Two events solidified Mike Towers' commitment to secure digital...
View ArticleElection 2020-themed scams and threat activities
The United States presidential election is here. And as COVID-19 still runs unchecked throughout the world, 2020 continues to be an outlier year in so many ways. But one thing remains constant—scammers...
View ArticleState of Digital Transformation in EMEA: Is the Increase in Remote Work...
The events of 2020 caused quite a bit of upheaval for enterprises in EMEA. But what effect, if any, did it have on their digital transformation plans? Amidst the landscape of a global pandemic,...
View ArticleGoing Beyond: Zenith Live 2020
Zenith Live is bringing together some of the boldest and brightest minds in security, cloud, and beyond. Kicking off December 8, this year’s event will be completely virtual, free, and focused on...
View ArticleRethinking VPN: ManpowerGroup Modernizes Remote Access in Just 18 Days
“Within 18 days we were able to scale up and support more than 97 percent of our users in order to support activities, keep productivity high, and keep businesses running with the resources supplied...
View ArticleCoverage Advisory for Ransomware Activity Targeting Healthcare and Public...
Background A joint cybersecurity advisory was released by the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the Department of Health and Human...
View ArticleZenith Live 2020 Speaker Profile: Andy Greenberg, author of Sandworm
Wired Magazine journalist and acclaimed author Andy Greenberg will deliver the day-two keynote at the Zscaler annual cloud summit Zenith Live 2020."On June 27, 2017, something strange and terrible...
View ArticleZenith Live Will Accelerate Your Digital Transformation Journey
Zenith Live 2020, the Zscaler Annual Cloud Summit will bring together the best experts and brightest minds in security, cloud, and enterprise digital transformation. Kicking off December 8, this year’s...
View ArticleZenith Live 2020 Speaker Profile: Markus Sontheimer, CIO/CDO, DB Schenker AG
Markus Sontheimer will speak on the main stage December 9 at the Zscaler annual cloud summit Zenith Live 2020. Early investment in cloud transformation has paid (metaphorical) dividends for DB Schenker...
View ArticleHelping Changes You: Zscaler Employee Raises Funds for an Orphanage in...
Zscaler strongly believes in being a leader when it comes to giving back and helping others. And one of the great things about working at Zscaler is that it is filled with people who feel the same way...
View ArticleJoker Playing Hide-and-Seek with Google Play
Joker is one of the most prominent malware families that continually targets Android devices. Despite awareness of this particular malware, it keeps finding its way into Google’s official application...
View Article