Coverage Advisory for DarkSide Ransomware Activity Targeting Manufacturing,...
Background A cybersecurity advisory was released by the Federal Bureau of Investigation (FBI) related to a DarkSide ransomware infection targeting manufacturing, legal, insurance, healthcare and energy...
View ArticleThreatLabZ Ransomware Review: The Advent of Double Extortion
The recent ransomware attack on the Colonial Pipeline abruptly halted operations on the largest refined products pipeline in the United States, impacting fuel availability across the eastern half of...
View ArticleThe New Cybersecurity Executive Order
The Biden Administration’s new Executive Order on Federal Cybersecurity underscores a growing understanding of cyber vulnerabilities and IT’s vital role in every Federal program and mission. The EO...
View ArticleHow CSPM Secures Your Public Multicloud Environment
Public cloud brings tremendous advantages to enterprise IT teams, including significant flexibility and agility, along with economies of scale. It allows the organization to set up the required...
View ArticleZscaler is the 2021 Zero Trust Champion at Microsoft’s 20/20 Partner Awards...
In my previous blog, I was proud to share that Zscaler was nominated for two awards from the Microsoft community, including the Zero Trust Champion of the year. On May 12, Microsoft announced the award...
View ArticleThe Colonial Pipeline Cyberattack and The Executive Order: A CISO’s Perspective
This post also appeared on LinkedIn. The ransomware event at Colonial Pipeline highlights the need for major cyber improvements across the public and private sectors. It was likely the impetus behind...
View ArticleThreat Actors Distribute Malicious VPN Apps Masquerading as Popular Vendors
Introduction In May 2021, Zscaler ThreatLabZ observed several new domains registered by a threat actor for distribution of spoofed and malicious versions of popular VPN softwares. Threat actors have...
View ArticleZscaler Protections Against Flubot Banking Malware
A huge wave of the Flubot malware has been making its rounds in the wild, primarily targeting users in Europe -- particularly the UK -- and in the US. Flubot is an Android banking malware which lures...
View ArticleGot VPN? It’s Only a Matter of Time Before You’re the Next Cyberattack Headline.
This post also appeared on LinkedIn. Legacy VPN technology puts business operations at risk Listen in as we discuss this and many more topics on the podcast The CISO's Gambit. Virtual Private Network...
View ArticleResponsible Organizations Must Take Decisive Actions After a Ransomware Attack
This post also appeared on LinkedIn. The recent spate of ransomware attacks and the release of the new cybersecurity Executive Order foreshadow increased scrutiny for companies managing critical...
View ArticleCIEM: The Solution to the Top Four Public Cloud Permissions Challenges
Adopting the public cloud is both a challenge and an opportunity for security professionals. It’s an opportunity because it means a blank slate where mistakes of the past, that you might have been...
View ArticleCoverage Advisory For Email Based Attack From Nobelium
Background: On 27th May Microsoft released a blog on a very sophisticated attack conducted by the threat actor, named Nobelium. While it is believed that threat actor kept changing the initial attack...
View ArticleCoverage Advisory For Email Based Attack From Nobelium
Background: On 27th May Microsoft released a blog on a very sophisticated attack conducted by the threat actor, named Nobelium. While it is believed that threat actor kept changing the initial attack...
View ArticleNever Waste a Good (InfoSec) Crisis
This post originally appeared on LinkedIn. While the best-managed crises are undoubtedly the avoided ones, there are some that plunge businesses and countries into turmoil en masse. The current global...
View Article5G and the Power of the Edge
The buzzwords of 5G and edge computing have forced their way into the spotlight of digital transformation, bringing with them huge potential to spark the next major wave of change. While 5G has the...
View ArticleA Powerful Combination: Active Defense, the Bridge to Zero Trust
The end of May marked a monumental juncture for Zscaler as we continued to extend the company’s cybersecurity reach with our intent to acquire Smokescreen Technologies, a leader in active defense...
View ArticleIntroducing Zscaler and ServiceNow: Protect More, Work Smarter
As a cloud platform, ServiceNow delivers digital workflows that create great experiences and unlock productivity.. But it also consumes and distributes massive amounts of sensitive data, which in...
View ArticleZscaler Customers Are Moving Full Cloud Ahead
What an incredible conclusion to day one of our fourth annual Zenith Live virtual conference! It was an honor to share the stage with my colleagues, guest luminaries, and our marquee multinational...
View ArticleCelebrating Juneteenth — Listen, Learn, and Reflect on African American History
Most people are familiar with the celebration and history behind Independence Day. While the United States became free with the signing of the Declaration of Independence in 1776, Black people had not...
View ArticleWhat our Latest Glassdoor Award Means to Zscaler
I just learned that Zscaler’s CEO, Jay Chaudhry, has been named one of the Top 100 CEOs by Glassdoor. The award is based on a rating system submitted by employees and, for that reason, above all, I am...
View Article