Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

How to Protect Your Data from Ransomware and Double-Extortion

Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a...

View Article


Is Poor User Experience Killing Your M365 Apps?

This post originally ran on LinkedIn. Microsoft’s cloud-based application suite (Microsoft 365 or M365) provides all the regular apps for productivity such as Exchange, Word, PowerPoint, and Excel, and...

View Article


Digital Transformation for Banks using SASE and Zero Trust

Digitalisation has become a baptism of fire for the financial industry as traditional financial institutions compete with new banks from the Fintech scene. Established IT infrastructures meet...

View Article

How to Find Externally Exposed Sensitive Cloud Data

Publicly exposed cloud data has led to dozens of high-profile security incidents for some very large organizations over the past few years. Many of the most well-known incidents related to AWS S3...

View Article

The Anchor of Legacy Debt

Read more posts like this on Zscaler's CXO REvolutionaries. On a warm summer evening, two CIO technology veterans and I—decades-old friends—sipped beers and reminisced about our experiences running...

View Article


How to Bridge Organizational Divides and Build a Cloud-Enabled Enterprise

This post also appeared on LinkedIn. Progressive enterprises are transforming infrastructure to become cloud-based. It seems straightforward: Remove legacy hardware and software, replace it with PaaS,...

View Article

Fake Streaming & Adware Target Olympics 2020

Online streaming of sporting events has increased since the Rio 2016 Olympics. The Olympics is a very popular event attracting billions of viewers across the globe -- and between cord-cutting and...

View Article

Securing Access to Smart Factories: The CISO’s Next Frontier

Industry 4.0 cannot operate with air gaps: it’s time for a new paradigm The application of digital technologies including sensors, digital twins, artificial intelligence, cloud and edge computing -...

View Article


Modern Enterprise Security is a Big Data Problem and it’s Best Solved in the...

Read this and more articles like it on Zscaler CXO REvolutionaries. One common question we get about cloud-based zero trust architectures is about stability and scalability. If you’ve seen any of our...

View Article


The Six Business Benefits of Zero Trust Segmentation

At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another....

View Article

For Australian Enterprises of All Sizes, the Future Starts with Zero

I am thrilled to announce that Zscaler has selected Orca Tech to be our exclusive distributor for Australia and New Zealand (ANZ). Orca Tech is the only value-added distributor in the region solely...

View Article

How to Unlock Maximum Performance in Data Protection

A boat that only stays afloat sometimes (or even most of the time) is effectively just an anchor. Likewise, if a data protection solution is unable to perform well consistently, then it is essentially...

View Article

CIEM: Who (Or What) Can Access This AWS S3 Bucket?

Who can access this public cloud resource? It’s a simple question. A question you might ask for a number of reasons. Perhaps there has been a security incident related to the resource, and this is part...

View Article


CloudFall Targets Researchers and Scientists Invited to International...

In August 2021, Zscaler ThreatLabz identified several malicious Microsoft Word documents which used a multi-stage attack-chain abusing Cloudflare Workers and features of MS Office Word to target users...

View Article

Zscaler Executives Honored to Receive Federal 100 Awards

Zscaler is honored to share that Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, and Drew Schnabel, Vice President, Federal, were honored as Federal 100 Awards...

View Article


Don’t Hire a “Network Complication Engineer”: Enterprise IT Requires Simplicity

Visit Zscaler CXO Revolutionaries to see more content like this. The purpose of digital transformation (and I’ve already commented on how I don’t particularly like this phrase) is enabling core...

View Article

Security Advisory: Microsoft MSHTML Remote Code Execution Vulnerability...

Background On 7th September 2021, Microsoft released an advisory for CVE-2021-40444. The CVE has a CVSS score of 8.8. What is the issue? Microsoft MSHTML Remote Code Execution Vulnerability...

View Article


Zscaler Launches Partner Demand Center to Support Partner Demand Gen Efforts

Did you know that Partner co-marketing efforts that leverage digital channels see four times the pipeline of non-digital partnerships? But digital marketing is often easier said than done, right? At...

View Article

Zscaler is First and Only Cloud-based SaaS Security Company to Achieve...

This week, Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA) achieved StateRAMP Ready status, underscoring Zscaler’s commitment to securing state and local government employees and data....

View Article

Why Perimeter Security Doesn't Work for the Cloud

For the past 40 years or so, and more recently with the use of next-gen firewalls and secure web gateways, there has always been an outwards vantage point for security. The reactive processes and...

View Article
Browsing all 1471 articles
Browse latest View live