Using Machine Learning to Bridge the Gaps in Microsegmentation
Microsegmentation has become more widely adopted in the cloud and data center because of its enormous promise. Breaking the network into smaller and smaller fragments (often as small as the individual...
View ArticleTargeted Attack on Government Organizations Delivers Netwire RAT
The Zscaler ThreatLabz team has observed an interesting spear phishing campaign beginning July 2021 in which a threat actor is targeting a wide range of organizations in Pakistan. NetwiredRC is being...
View ArticleIoT in the Enterprise Report: Empty Office Edition
It happened overnight for many enterprises. Bustling offices turned into desolate spaces--abandoning plants to die, snacks to go stale, and calendars to remain frozen in time. And like out of a movie,...
View ArticleActive Defense Strategies for Kaseya-style Ransomware Attacks
The recent Kaseya ransomware incident combined the worst possibilities the infosec community has had to contend with in recent months: A supply-chain attack Ransomware An unpatched application...
View ArticleStop Unnecessary “APPification” of Your Core Systems
This post also appeared on LinkedIn. Enterprises are embracing mobile and cloud technology benefits in order to foster company-wide digital transformation. But with this movement comes a new set of...
View ArticleIT Security in the Pharmaceutical Industry
In many ways, mergers and acquisitions (M&As) are a part of daily life in the pharmaceutical industry. They accelerate research and development and lead to rapid results within the industry....
View ArticleJoker Joking in Google Play
Joker is one of the most prominent malware families targeting Android devices. Despite public awareness of this particular malware, it keeps finding its way into Google’s official application market by...
View ArticleSAP and ZPA: A Match Made in Digital Transformation Heaven
Zscaler is thrilled to team up with SAP to increase global user accessibility to critical business applications while stamping out ransomware attacks and other threats. With the rise of digital...
View ArticlePrevent Cloud Security Breaches Attributable to Cloud Misconfigurations with...
Public cloud adoption enables enterprises across all sectors to collaborate more efficiently, especially in today’s highly remote business environment. The cloud offers many advantages: faster...
View ArticleZero Trust: Security from the Cloud
Data safety and data security are the cause of continuous stress for IT departments in pharmaceutical companies. Intellectual property such as research results, manufacturing processes, formulae, and...
View ArticleWinning Over the Boardroom By Enabling the Business Ecosystem
As if managing a constantly changing mix of remote and office workers wasn't messy enough, third-party risk is among the biggest security issues boardrooms are facing following high-profile supply...
View ArticleSeeing the Invisible: Network Monitoring in a Zero Trust World
Application transformation has upended traditional monitoring approaches: applications reside in SaaS, infrastructure gets deployed in public clouds, and users (employees, partners, and customers)...
View ArticleNational Cybersecurity Center of Excellence (NCCoE) Selects Zscaler as...
Strengthening the nation’s cybersecurity requires more — and better — collaboration between the public and private sectors. That’s why we are honored to announce that the National Institute of...
View ArticleFive Ways Banks Can Make the Most of Hybrid Infrastructures
To thrive in a fast-changing economic landscape, the finance sector has had to reinvent itself by embracing cloud and mobile computing. Even though financial organisations have made significant...
View ArticleDoppelPaymer Continues to Cause Grief Through Rebranding
In early May 2021, DoppelPaymer ransomware activity dropped significantly. Although the DoppelPaymer leak site still remains online, there has not been a new victim post since May 6, 2021. In addition,...
View Article“Go Dark” to Reduce the Attack Surface
This post also appeared on LinkedIn. Most IT security professionals would agree that the key ingredient for safeguarding networks is “reducing the attack surface.” Fewer avenues for breaches means...
View ArticleHow Zscaler’s New Mentorship Program Elevates Learning and Growth
It is no secret that we’re better when we work together. Learning from and working with individuals who come from different backgrounds and have varied experiences inevitably expands our own experience...
View ArticleThe Benefits of Adopting Zscaler’s Multimode CASB
SaaS applications have significantly altered and improved the way that we work. Scalability, increased collaboration and sharing capabilities, quick and seamless adoption, and reduced costs are some of...
View ArticleZscaler Partners with Nozomi Networks to Extend Zero Trust Security to the...
Zscaler is proud to announce a new partnership with OT/IoT security leader Nozomi Networks to address the emerging cyber threats to industrial infrastructure and remote connectivity challenges for the...
View ArticleIn It for the Long Run with Zero Trust Exchange
As a keen runner, I know that it takes careful planning, patience, and extensive training to prepare for a marathon. From time trials to working out the correct nutrition and hydration, the details and...
View Article