Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Eighty-Seven Percent of Your Network Paths are Only Used by Attackers

The first phase of deploying microsegmentation on a corporate network involves taking full inventory of your environment, mapping workload communication paths, and then analyzing that data to determine...

View Article


Celebrating Women at Zscaler: Dianhuan Lin and Wendy Case

In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential and powerful women at Zscaler who have made a significant impact within their careers, teams,...

View Article


Zero Trust: The Key to Securing Business Now and in the Post-COVID World

Foreword: First, to the IT security leaders who spent countless hours responding to the need to secure a new, remote workforce during the pandemic - congratulations for what I’m sure, for many of you,...

View Article

Year One, A.C. (“After COVID”): What’s Next for Cyber Professionals in the...

I used to work in an office. Now—like most enterprise IT professionals—I work from the kitchen. Or my guest room. Or the patio. Or a socially-distanced “anywhere” with good Wi-Fi. COVID-19 has forced...

View Article

Celebrating Women at Zscaler: Pratibha Nayak, the First Female Zscaler...

In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential women at Zscaler who have made a significant impact within their careers, teams, and on the...

View Article


Year One, A.C. (“After COVID”): What’s Next for Cyber Professionals in the...

I used to work in an office. Now—like most enterprise IT professionals—I work from the kitchen. Or my guest room. Or the patio. Or a socially-distanced “anywhere” with good Wi-Fi. COVID-19 has forced...

View Article

Celebrating Women at Zscaler: Pratibha Nayak, the First Female Zscaler...

In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential women at Zscaler who have made a significant impact within their careers, teams, and on the...

View Article

Ares Malware: The Grandson of the Kronos Banking Trojan

Kronos is a banking trojan that first emerged in 2014 and marketed in underground forums as a crimeware kit to conduct credit card, identity theft, and wire fraud. In September 2018, a new Kronos...

View Article


Are you Consistent, Confident, or Courageous? Diving into the Zero Trust...

This post also appeared on LinkedIn. The 2020 Gartner Zero Trust Market Guide predicts that in just two years, 80 percent of businesses will access new digital applications using Zero Trust Network...

View Article


Celebrating Women at Zscaler: Pooja Deshmukh & Dorothy Meshack

In honor of Women’s History Month and International Women’s Day on March 8, we’re recognizing influential and powerful women at Zscaler who have made a significant impact within their careers, teams,...

View Article

Microsegmentation 101

Microsegmentation can be a very effective cybersecurity strategy, helping to stop lateral threat movement, thereby minimizing the blast radius and damage caused by a cybersecurity incident. Despite its...

View Article

Diagnosing Network Performance Problems in the Work-from-Anywhere Enterprise

Whether IT likes it or not, home networks and local internet service providers (ISP) are now part of the corporate network infrastructure. IT teams must monitor and diagnose performance issues that...

View Article

Full Cloud Ahead: A Journey to Zenith Live 2021

When I joined Zscaler last fall, the company was in the final few days before launching its first all-virtual Zenith Live Cloud Summit. It was an enormous undertaking, and dozens of people had worked...

View Article


A Novel Concept: Enabling Companies To Do What They’re Supposed To Do.

This post also appeared on LinkedIn. As an F500-company leader and former management consultant, I’ve spent much of my IT professional career adapting enterprise infrastructure to meet “digital...

View Article

Android apps targeting JIO users in India

Introduction In March 2021, through Zscaler cloud we identified a few download requests for malicious Android applications which were hosted on sites crafted by the threat actor to social engineer...

View Article


Taking the Micromanagement out of Microsegmentation

Enterprise security teams have long been looking for more effective solutions to protect their cloud and data center environments. Once secured solely by perimeter-based technologies, today’s network...

View Article

A look at HydroJiin campaign

Zscaler ThreatLabZ recently came across an interesting campaign involving multiple infostealer RAT families and miner malware. We’ve dubbed the campaign “HydroJiin” based on aliases used by the threat...

View Article


Let's Talk CASB: The Data Protection Dialogues

For a more in-depth look into what it takes to build a comprehensive data protection and security strategy, be sure to check out our new video series, Data Protection Dialogues. Like most progressive...

View Article

Join Us Live: Seize the Zero Trust Moment.

Accelerate digital transformation with confidence. Join Zscaler for Seize the Zero Trust Moment: a virtual broadcast covering the latest Zscaler innovations, how to implement and leverage zero trust to...

View Article

Peanut butter and chocolate: Virtual Desktop Infrastructure and Zscaler’s...

Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA) complement each other to secure Virtual Desktop Infrastructure (VDI) solutions. Like peanut butter and chocolate: Two great things that...

View Article
Browsing all 1471 articles
Browse latest View live