Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

My Journey That Began at IIT (BHU)

Yesterday, I had the distinct pleasure of addressing the graduates of my alma mater, the Indian Institute of Technology (BHU) in Varanasi. I’ve spoken to many audiences over the past decades about my...

View Article


A Resolution for 2021: More Focus on the Attack Surface

The rise of successful ransomware attacks in 2020 speaks volumes: Companies have either lost sight of potential gateways for online attacks, or never had a handle on them in the first place. Hackers...

View Article


Will CASB Provide All the Security Your Agency Needs?

Cloud access security brokers (CASBs) extend an agency’s security policy to third-party cloud services, providing visibility into the cloud services an agency uses and then building policies to control...

View Article

These Two Identity Juggernauts Identified Zscaler as a Leader in Zero Trust...

Security. Communication. Collaboration. These were the three areas that companies invested in most since the beginning of last year. Don’t just take my word for it— reports from both Microsoft and Okta...

View Article

Preventing the Spread of Ransomware

For most of the world, 2020 was devastating, a year mired in multiple crises. But in at least one industry, 2020 was a banner year! Cybercriminals had a massively productive and profitable year,...

View Article


What Everybody Thinks About VPN but Nobody Talks About 

A new report from Cybersecurity Insiders focuses on the use of virtual private networks. The fact that they are a part of the infrastructure in almost every organization in every industry is known. It...

View Article

No More Putting Out Fires (and Other Benefits of Working with Zscaler)

As a member of the volunteer fire brigade, one of my tasks is to put out fires. I like to do this in my free time, but not in the context of my job. In the area of ​​cybersecurity, in particular,...

View Article

It’s Time for Banks to Release the Brakes and Accelerate Their Digital...

Over the past year, like many industries, the financial sector has faced a range of both challenges and opportunities, leading to a decade’s worth of digital transformation in 12 short months. From...

View Article


Three Paths for Reducing the Network Attack Surface

With each passing year, companies’ networks grow. Increasing amounts of data, expanded business partnerships, and the introduction of new technology to replace outdated methods of conducting business...

View Article


Return of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures

Introduction In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes...

View Article

Cloud Data Protection: Six Critical Challenges To Tackle

Data Loss Prevention (DLP) is the first term that comes to mind for most when thinking about data protection, but DLP is really just one piece of a broader cloud data protection strategy. DLP must...

View Article

What Does CMMC Accreditation Mean for Zscaler Customers and DoD Vendors?

Those of us who work within the DoD community have spent many hours over the last few months discussing the Cybersecurity Maturity Model Certification (CMMC) and what it will mean for the defense...

View Article

Cyber Monday: Shopping Scams and Skimmers

As Black Friday and Cyber Monday, the biggest shopping days of the year, are just behind us, Zscaler has noticed that the attackers have taken advantage of this holiday activity for their targeted...

View Article


Why Next-Generation Firewalls Can Never Be Proxies: The Right Architecture...

On rare occasions, a company has the vision, tenacity, execution—and a helping of luck—to think differently about a significant challenge and effect change across an industry. Once upon a time, the...

View Article

Honoring Black History Month at Zscaler

At Zscaler, we pride ourselves on many things, but most of all, we take pride in our people and the wide range of expertise, cultures, and life experience they contribute. Our goal is always to build...

View Article


Cloud and Mobility Mean Rethinking Your Performance Monitoring Perimeter

This article originally appeared on LinkedIn. No longer do employees work within the confines of an office, or for that matter, a corporate network. Those employees use applications hosted outside of...

View Article

Why Bet Your Business on Zero Trust Security?

This article originally appeared on Medium. We are now in year two of “The Digital Decade.” Many traditional industries, capabilities, products, and services have moved online, either as part of...

View Article


Coverage Advisory for Exploits Related to Microsoft Exchange Servers

Background Microsoft has reported multiple exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor...

View Article

The Five Things CIOs and CISOs Must Know to Secure OT Systems

This post originally appeared on LinkedIn. CIOs and CISOs are used to calling the shots when it comes to IT security. But to secure Operational Technology (OT) for the new cloud- and mobile-first...

View Article

Microsoft-Themed Phishing Attack Targets Executives Using Fake Google...

ThreatLabZ, the Zscaler threat research team, recently observed a new series of Microsoft-themed phishing attacks aimed at senior-level employees at multiple organizations. The Zscaler cloud has...

View Article
Browsing all 1471 articles
Browse latest View live