Eighty-Seven Percent of Your Network Paths are Only Used by Attackers
The first phase of deploying microsegmentation on a corporate network involves taking full inventory of your environment, mapping workload communication paths, and then analyzing that data to determine...
View ArticleCelebrating Women at Zscaler: Dianhuan Lin and Wendy Case
In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential and powerful women at Zscaler who have made a significant impact within their careers, teams,...
View ArticleZero Trust: The Key to Securing Business Now and in the Post-COVID World
Foreword: First, to the IT security leaders who spent countless hours responding to the need to secure a new, remote workforce during the pandemic - congratulations for what I’m sure, for many of you,...
View ArticleYear One, A.C. (“After COVID”): What’s Next for Cyber Professionals in the...
I used to work in an office. Now—like most enterprise IT professionals—I work from the kitchen. Or my guest room. Or the patio. Or a socially-distanced “anywhere” with good Wi-Fi. COVID-19 has forced...
View ArticleCelebrating Women at Zscaler: Pratibha Nayak, the First Female Zscaler...
In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential women at Zscaler who have made a significant impact within their careers, teams, and on the...
View ArticleYear One, A.C. (“After COVID”): What’s Next for Cyber Professionals in the...
I used to work in an office. Now—like most enterprise IT professionals—I work from the kitchen. Or my guest room. Or the patio. Or a socially-distanced “anywhere” with good Wi-Fi. COVID-19 has forced...
View ArticleCelebrating Women at Zscaler: Pratibha Nayak, the First Female Zscaler...
In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential women at Zscaler who have made a significant impact within their careers, teams, and on the...
View ArticleAres Malware: The Grandson of the Kronos Banking Trojan
Kronos is a banking trojan that first emerged in 2014 and marketed in underground forums as a crimeware kit to conduct credit card, identity theft, and wire fraud. In September 2018, a new Kronos...
View ArticleAre you Consistent, Confident, or Courageous? Diving into the Zero Trust...
This post also appeared on LinkedIn. The 2020 Gartner Zero Trust Market Guide predicts that in just two years, 80 percent of businesses will access new digital applications using Zero Trust Network...
View ArticleCelebrating Women at Zscaler: Pooja Deshmukh & Dorothy Meshack
In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential and powerful women at Zscaler who have made a significant impact within their careers, teams,...
View ArticleMicrosegmentation 101
Microsegmentation can be a very effective cybersecurity strategy, helping to stop lateral threat movement, thereby minimizing the blast radius and damage caused by a cybersecurity incident. Despite its...
View ArticleDiagnosing Network Performance Problems in the Work-from-Anywhere Enterprise
Whether IT likes it or not, home networks and local internet service providers (ISP) are now part of the corporate network infrastructure. IT teams must monitor and diagnose performance issues that...
View ArticleFull Cloud Ahead: A Journey to Zenith Live 2021
When I joined Zscaler last fall, the company was in the final few days before launching its first all-virtual Zenith Live Cloud Summit. It was an enormous undertaking, and dozens of people had worked...
View ArticleA Novel Concept: Enabling Companies To Do What They’re Supposed To Do.
This post also appeared on LinkedIn. As an F500-company leader and former management consultant, I’ve spent much of my IT professional career adapting enterprise infrastructure to meet “digital...
View ArticleAndroid apps targeting JIO users in India
Introduction In March 2021, through Zscaler cloud we identified a few download requests for malicious Android applications which were hosted on sites crafted by the threat actor to social engineer...
View ArticleTaking the Micromanagement out of Microsegmentation
Enterprise security teams have long been looking for more effective solutions to protect their cloud and data center environments. Once secured solely by perimeter-based technologies, today’s network...
View ArticleA look at HydroJiin campaign
Zscaler ThreatLabZ recently came across an interesting campaign involving multiple infostealer RAT families and miner malware. We’ve dubbed the campaign “HydroJiin” based on aliases used by the threat...
View ArticleLet's Talk CASB: The Data Protection Dialogues
For a more in-depth look into what it takes to build a comprehensive data protection and security strategy, be sure to check out our new video series, Data Protection Dialogues. Like most progressive...
View ArticleJoin Us Live: Seize the Zero Trust Moment.
Accelerate digital transformation with confidence. Join Zscaler for Seize the Zero Trust Moment: a virtual broadcast covering the latest Zscaler innovations, how to implement and leverage zero trust to...
View ArticlePeanut butter and chocolate: Virtual Desktop Infrastructure and Zscaler’s...
Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA) complement each other to secure Virtual Desktop Infrastructure (VDI) solutions. Like peanut butter and chocolate: Two great things that...
View Article