Zenith Live EMEA is a Wrap!
Another Zenith Live is in the books, and we’re proud to say this was our biggest event and arguably our best one yet. While we wish we could have gathered together in person, the sense of community,...
View ArticleBlocking the Unknown Threat with Machine Learning
This post also appeared on LinkedIn. Finding the needle in the haystack is difficult enough as it is. Finding the unknown threat in 160 billion transactions a day is like trying to find a single needle...
View ArticleWe’re Pleased to Announce our 2021 Partner Award Winners
This year we’re celebrating our very first Zscaler Partner Awards, honoring our “zero trust heroes” who’ve gone above and beyond in their partnership with Zscaler to help our mutual customers embrace...
View Article2021 “Exposed” Report – An Exposé on the True Corporate Network Attack Surface
Exposure noun ex·po·sure | \ ik-ˈspō-zhər a: the condition of being made known b: the condition of being unprotected c: the condition of being subject to some effect d: the condition of being at risk...
View ArticleIntroducing New Partner Certifications and Learning Formats!
Introducing New Partner Certifications Zscaler is pleased to announce new pre-sales certifications featuring all-new content and interactive learning opportunities. These courses were specifically...
View ArticleRevolutionize DEM with 360-Degree Monitoring for the Cloud Era
Imagine watching an action movie with only one fixed camera angle. It would be an incredibly frustrating experience. Not only would your understanding of scenes be limited, but you would need to...
View ArticleHow Getting Outside Your Comfort Zone Will Change Your Career
We all have aspirations of the person we want to become and the things we want to achieve. Humanity has benefitted countless times from the ripple effects of such visions. But ask anyone who tasted the...
View ArticleThe Asia-Pacific Region is Moving Full Cloud Ahead
Zenith Live APJ marks the end of what I believe was our most extensive and possibly our best Zenith Live to date. First of all, thank you to all our attendees, customers, partners, and speakers across...
View ArticleHow to Successfully Roll Out M365: Remote Work as a Transformation Template
This post also appeared on LinkedIn. When I worked in the area of network and security architectures in a previous life, we’d plan, assess, and make IT decisions right after the new year. Now that we...
View ArticleDemystifying the full attack chain of MineBridge RAT
Introduction In March 2021, threat actors started distributing MineBridge RAT with an updated distribution mechanism. Morphisec blogged about the partial attack chain of this new attack but they could...
View ArticleWhy You Need SaaS Security Posture Management (SSPM) for Microsoft 365
Companies embrace Microsoft 365 (M365) to reduce IT complexity and drive end-user productivity and collaboration. Over 258 million people use the Microsoft 365 productivity and collaboration suite...
View ArticleZero Trust Microsegmentation: It’s All About the Data
The digital nature of today’s businesses puts significant pressure on cybersecurity practitioners to be everywhere—all the time. As a result, it’s easy to forget the fundamental reasons for managing...
View ArticleZscaler + Coursera: The Journey to Leading at Z
Since its inception, Zscaler has always prioritized its people, searching diligently for the best talent and making employee retention a key focus. However, every company has its challenges with hiring...
View ArticleDefense Innovation Unit Issues Success Memo to Zscaler
Today, we are proud to share that the Department of Defense (DoD) Defense Innovation Unit (DIU) announced that Zscaler successfully completed a Secure Cloud Management (SCM) prototype. The project...
View ArticleCoverage Advisory for Kaseya VSA Supply-Chain Ransomware Attack
Background On July 2, 2021, Kaseya, an IT Management software firm, disclosed a security incident impacting their on-prem version of Kaseya VSA software. Kaseya VSA is a cloud-based MSP platform that...
View ArticleThe (Thick) Branch is Dead. Long Live the (Thin) Branch.
This post also appeared on LinkedIn. Even with the pandemic (hopefully) winding down, mass remote work will stick around for the foreseeable future. Twitter, Google, Facebook, Deutsche Bank and other...
View ArticleKaseya Supply Chain Ransomware Attack - Technical Analysis of the REvil Payload
On July 2, 2021, Kaseya, an IT Management software firm, disclosed a security incident impacting their on-premises version of Kaseya's Virtual System Administrator (VSA) software. Kaseya VSA is a...
View ArticleCybersecurity, Governance, and the Implications of Oversight: How your Board...
Read more posts like this on Zscaler's CXO REvolutionaries. Our increasingly entrenched and extensive use of technology in nearly every facet of life urgently calls for security solutions that keep our...
View ArticleStop the Next Kaseya Attack
Join the ThreatLabz team on July 13th for a webinar discussion of the Kaseya attack and how to defend against it. While Americans were prepping for their long Fourth of July weekends, cybercriminals...
View ArticleThreatLabZ June 2021 Report: Deconstructing Kaseya Supply-Chain Attack and...
This post also appeared on the CXO REvolutionaries site. Read more here. With the petabytes of daily data transactions it secures, the Zscaler ThreatLabZ security research team has a unique view of the...
View Article