My Journey That Began at IIT (BHU)
Yesterday, I had the distinct pleasure of addressing the graduates of my alma mater, the Indian Institute of Technology (BHU) in Varanasi. I’ve spoken to many audiences over the past decades about my...
View ArticleA Resolution for 2021: More Focus on the Attack Surface
The rise of successful ransomware attacks in 2020 speaks volumes: Companies have either lost sight of potential gateways for online attacks, or never had a handle on them in the first place. Hackers...
View ArticleWill CASB Provide All the Security Your Agency Needs?
Cloud access security brokers (CASBs) extend an agency’s security policy to third-party cloud services, providing visibility into the cloud services an agency uses and then building policies to control...
View ArticleThese Two Identity Juggernauts Identified Zscaler as a Leader in Zero Trust...
Security. Communication. Collaboration. These were the three areas that companies invested in most since the beginning of last year. Don’t just take my word for it— reports from both Microsoft and Okta...
View ArticlePreventing the Spread of Ransomware
For most of the world, 2020 was devastating, a year mired in multiple crises. But in at least one industry, 2020 was a banner year! Cybercriminals had a massively productive and profitable year,...
View ArticleWhat Everybody Thinks About VPN but Nobody Talks About
A new report from Cybersecurity Insiders focuses on the use of virtual private networks. The fact that they are a part of the infrastructure in almost every organization in every industry is known. It...
View ArticleNo More Putting Out Fires (and Other Benefits of Working with Zscaler)
As a member of the volunteer fire brigade, one of my tasks is to put out fires. I like to do this in my free time, but not in the context of my job. In the area of cybersecurity, in particular,...
View ArticleIt’s Time for Banks to Release the Brakes and Accelerate Their Digital...
Over the past year, like many industries, the financial sector has faced a range of both challenges and opportunities, leading to a decade’s worth of digital transformation in 12 short months. From...
View ArticleThree Paths for Reducing the Network Attack Surface
With each passing year, companies’ networks grow. Increasing amounts of data, expanded business partnerships, and the introduction of new technology to replace outdated methods of conducting business...
View ArticleReturn of the MINEBRIDGE RAT With New TTPs and Social Engineering Lures
Introduction In Jan 2021, Zscaler ThreatLabZ discovered new instances of the MINEBRIDGE remote-access Trojan (RAT) embedded in macro-based Word document files crafted to look like valid job resumes...
View ArticleCloud Data Protection: Six Critical Challenges To Tackle
Data Loss Prevention (DLP) is the first term that comes to mind for most when thinking about data protection, but DLP is really just one piece of a broader cloud data protection strategy. DLP must...
View ArticleWhat Does CMMC Accreditation Mean for Zscaler Customers and DoD Vendors?
Those of us who work within the DoD community have spent many hours over the last few months discussing the Cybersecurity Maturity Model Certification (CMMC) and what it will mean for the defense...
View ArticleCyber Monday: Shopping Scams and Skimmers
As Black Friday and Cyber Monday, the biggest shopping days of the year, are just behind us, Zscaler has noticed that the attackers have taken advantage of this holiday activity for their targeted...
View ArticleWhy Next-Generation Firewalls Can Never Be Proxies: The Right Architecture...
On rare occasions, a company has the vision, tenacity, execution—and a helping of luck—to think differently about a significant challenge and effect change across an industry. Once upon a time, the...
View ArticleHonoring Black History Month at Zscaler
At Zscaler, we pride ourselves on many things, but most of all, we take pride in our people and the wide range of expertise, cultures, and life experience they contribute. Our goal is always to build...
View ArticleCloud and Mobility Mean Rethinking Your Performance Monitoring Perimeter
This article originally appeared on LinkedIn. No longer do employees work within the confines of an office, or for that matter, a corporate network. Those employees use applications hosted outside of...
View ArticleWhy Bet Your Business on Zero Trust Security?
This article originally appeared on Medium. We are now in year two of “The Digital Decade.” Many traditional industries, capabilities, products, and services have moved online, either as part of...
View ArticleCoverage Advisory for Exploits Related to Microsoft Exchange Servers
Background Microsoft has reported multiple exploits being used to attack on-premises versions of Microsoft Exchange Server in limited and targeted attacks. In the attacks observed, the threat actor...
View ArticleThe Five Things CIOs and CISOs Must Know to Secure OT Systems
This post originally appeared on LinkedIn. CIOs and CISOs are used to calling the shots when it comes to IT security. But to secure Operational Technology (OT) for the new cloud- and mobile-first...
View ArticleMicrosoft-Themed Phishing Attack Targets Executives Using Fake Google...
ThreatLabZ, the Zscaler threat research team, recently observed a new series of Microsoft-themed phishing attacks aimed at senior-level employees at multiple organizations. The Zscaler cloud has...
View Article