Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Using Machine Learning to Bridge the Gaps in Microsegmentation

Microsegmentation has become more widely adopted in the cloud and data center because of its enormous promise. Breaking the network into smaller and smaller fragments (often as small as the individual...

View Article


Targeted Attack on Government Organizations Delivers Netwire RAT

The Zscaler ThreatLabz team has observed an interesting spear phishing campaign beginning July 2021 in which a threat actor is targeting a wide range of organizations in Pakistan. NetwiredRC is being...

View Article


IoT in the Enterprise Report: Empty Office Edition

It happened overnight for many enterprises. Bustling offices turned into desolate spaces--abandoning plants to die, snacks to go stale, and calendars to remain frozen in time. And like out of a movie,...

View Article

Active Defense Strategies for Kaseya-style Ransomware Attacks

The recent Kaseya ransomware incident combined the worst possibilities the infosec community has had to contend with in recent months: A supply-chain attack Ransomware An unpatched application...

View Article

Stop Unnecessary “APPification” of Your Core Systems

This post also appeared on LinkedIn. Enterprises are embracing mobile and cloud technology benefits in order to foster company-wide digital transformation. But with this movement comes a new set of...

View Article


IT Security in the Pharmaceutical Industry

In many ways, mergers and acquisitions (M&As) are a part of daily life in the pharmaceutical industry. They accelerate research and development and lead to rapid results within the industry....

View Article

Joker Joking in Google Play

Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by...

View Article

SAP and ZPA: A Match Made in Digital Transformation Heaven

Zscaler is thrilled to team up with SAP to increase global user accessibility to critical business applications while stamping out ransomware attacks and other threats. With the rise of digital...

View Article


Prevent Cloud Security Breaches Attributable to Cloud Misconfigurations with...

Public cloud adoption enables enterprises across all sectors to collaborate more efficiently, especially in today’s highly remote business environment. The cloud offers many advantages: faster...

View Article


Zero Trust: Security from the Cloud

Data safety and data security are the cause of continuous stress for IT departments in pharmaceutical companies. Intellectual property such as research results, manufacturing processes, formulae, and...

View Article

Winning Over the Boardroom By Enabling the Business Ecosystem 

As if managing a constantly changing mix of remote and office workers wasn't messy enough, third-party risk is among the biggest security issues boardrooms are facing following high-profile supply...

View Article

Seeing the Invisible: Network Monitoring in a Zero Trust World 

Application transformation has upended traditional monitoring approaches: applications reside in SaaS, infrastructure gets deployed in public clouds, and users (employees, partners, and customers)...

View Article

National Cybersecurity Center of Excellence (NCCoE) Selects Zscaler as...

Strengthening the nation’s cybersecurity requires more — and better — collaboration between the public and private sectors. That’s why we are honored to announce that the National Institute of...

View Article


Five Ways Banks Can Make the Most of Hybrid Infrastructures

To thrive in a fast-changing economic landscape, the finance sector has had to reinvent itself by embracing cloud and mobile computing. Even though financial organisations have made significant...

View Article

DoppelPaymer Continues to Cause Grief Through Rebranding

In early May 2021, DoppelPaymer ransomware activity dropped significantly. Although the DoppelPaymer leak site still remains online, there has not been a new victim post since May 6, 2021. In addition,...

View Article


“Go Dark” to Reduce the Attack Surface

This post also appeared on LinkedIn. Most IT security professionals would agree that the key ingredient for safeguarding networks is “reducing the attack surface.” Fewer avenues for breaches means...

View Article

How Zscaler’s New Mentorship Program Elevates Learning and Growth

It is no secret that we’re better when we work together. Learning from and working with individuals who come from different backgrounds and have varied experiences inevitably expands our own experience...

View Article


The Benefits of Adopting Zscaler’s Multimode CASB

SaaS applications have significantly altered and improved the way that we work. Scalability, increased collaboration and sharing capabilities, quick and seamless adoption, and reduced costs are some of...

View Article

Zscaler Partners with Nozomi Networks to Extend Zero Trust Security to the...

Zscaler is proud to announce a new partnership with OT/IoT security leader Nozomi Networks to address the emerging cyber threats to industrial infrastructure and remote connectivity challenges for the...

View Article

In It for the Long Run with Zero Trust Exchange

As a keen runner, I know that it takes careful planning, patience, and extensive training to prepare for a marathon. From time trials to working out the correct nutrition and hydration, the details and...

View Article
Browsing all 1471 articles
Browse latest View live