Entitlements: The Most Overlooked Risk in the Public Cloud
Understanding the threat vectors that introduce business risk is an important early step towards developing a strong cybersecurity strategy. The same is true as your organization embraces the public...
View ArticleIs Microsegmentation a Security Project or an Infrastructure Project?
The desired effects of microsegmentation are clear. They include: Limiting the “blast radius” of a data center or cloud environment compromise Preventing lateral movement of threats within the...
View ArticleThe Advantage of Implicit DIStrust in Traffic Inspection
Zero trust comes up in almost every conversation I have. It's definitely THE hot topic across the industry right now. And yet, I see confusion in terms of how, when, and where to get started with it....
View ArticleSimplifying Security: Automation is the Way Forward with ZPA
Network engineers looking to automate processes for private applications: look no further. Zscaler Private Access (ZPA) now has API capabilities to help manage and operate secure access to private...
View ArticleAnnouncing REvolutionaries, the Revolutionary New CXO Community, and the Zero...
Digital transformation requires zero trust. But successfully adopting zero trust requires not only getting the right platform but driving the entire organization to adopt a new cultural mindset....
View ArticleBest-selling Author Ben Mezrich Joins Zenith Live as Keynote Speaker
Zenith Live, the world’s largest cloud transformation conference, is right around the corner—but that hasn’t stopped us from adding to our impressive list of executive and future-forward keynote...
View ArticleCIEM vs. CSPM: Which is Better for Reducing Public Cloud Risk?
The vast majority of public cloud security incidents are the customer’s own fault. Most prominent among these has been the huge number of AWS S3 bucket exposures over the last several years, with big...
View ArticleAchieve True Zero Trust with Zscaler and Splunk
Zscaler is proud to announce our zero trust partnership with Splunk, giving security analysts more ways to incorporate telemetry from our world-class Zero Trust Exchange into their workflows and...
View ArticlePartnership with Steel Root to Support CMMC Requirements for Defense Contractors
In an effort to strengthen federal supply chain security, it will be necessary for more than 300,000 defense contractors to meet Cybersecurity Maturity Model Certification (CMMC) requirements over the...
View ArticleHow and When to Embed Machine Learning in Your Product
Machine learning can enable a company to make sense of mass quantities of data, separate noise from signal on an immense level and unleash a product’s ability to truly scale. Many CapitalG companies...
View ArticleInsight from the Front Lines: Zscaler ThreatLabZ to Give Keynote at Zenith Live
We’re excited to announce that Zscaler ThreatLabZ will be a part of our keynote lineup at this year’s Zenith Live on June 15 and 16. Backed by the world’s largest security cloud, Zscaler ThreatLabZ is...
View ArticleThink CASB Will Solve All Your Problems? Think Again.
What’s new in the world of Data Protection? For a closer look at how cloud apps are increasing data risk and what role CASB can play in your data protection strategy, be sure to check out our new Data...
View ArticleNetwork Segmentation: Issues and Opportunities to Look Beyond
Data centers today are sprawling, highly complex, interconnected behemoths. In a large enterprise, managing just one on-premises data center could prove challenging, but the reality is that most...
View ArticleJoin Zscaler at the ONUG Spring 2021 Virtual Conference
Zscaler has been pleased to sponsor ONUG conferences in years past, and 2021 is no exception. This week’s ONUG Spring 2021 Virtual Conference promises to cover the key challenges we all faced and the...
View ArticleDistributing the Future: Enable the New Hybrid Workforce with Cloud-Native...
This post also appeared on LinkedIn. My favorite science-fiction author, William Gibson, once said, "The future is already here—it's just not evenly distributed." The same can be said for zero trust....
View ArticleCatching RATs Over Custom Protocols
Adversaries generally use Standard Application Layer Protocols for communication between malware and command and control (C&C) servers. This is for several reasons: first, malicious traffic...
View ArticleGo Beyond the Perimeter: Zero Trust Transformation with CrowdStrike and Zscaler
The perimeter has dissolved. The “new normal” of employees working from home has now transformed into working from anywhere, due to the flexibility it has provided over the last year. Because of this...
View ArticleCIEM vs. CSPM: Which is Better for Reducing Public Cloud Risk?
The vast majority of public cloud security incidents are the customer’s own fault. Most prominent among these has been the huge number of AWS S3 bucket exposures over the last several years, with big...
View ArticleMagecart Attacks in 2021
Skimmer groups are growing rapidly and targeting various e-commerce platforms using a variety of ways to remain undetected. The Zscaler ThreatLabZ research team has been tracking these skimmer groups...
View ArticleMenace-Free IT Audits: How SASE takes the Fear out of Inspections
This post also appeared on LinkedIn. Enterprise IT teams spend a great deal of their time aligning infrastructure with business objectives and goals. They enable product development teams to bring new...
View Article