How to Protect Your Data from Ransomware and Double-Extortion
Malware has been the archenemy of organizations around the globe for years, with ransomware, in particular, being an extremely deadly foe. Locking down victims’ files through encryption and demanding a...
View ArticleIs Poor User Experience Killing Your M365 Apps?
This post originally ran on LinkedIn. Microsoft’s cloud-based application suite (Microsoft 365 or M365) provides all the regular apps for productivity such as Exchange, Word, PowerPoint, and Excel, and...
View ArticleDigital Transformation for Banks using SASE and Zero Trust
Digitalisation has become a baptism of fire for the financial industry as traditional financial institutions compete with new banks from the Fintech scene. Established IT infrastructures meet...
View ArticleHow to Find Externally Exposed Sensitive Cloud Data
Publicly exposed cloud data has led to dozens of high-profile security incidents for some very large organizations over the past few years. Many of the most well-known incidents related to AWS S3...
View ArticleThe Anchor of Legacy Debt
Read more posts like this on Zscaler's CXO REvolutionaries. On a warm summer evening, two CIO technology veterans and I—decades-old friends—sipped beers and reminisced about our experiences running...
View ArticleHow to Bridge Organizational Divides and Build a Cloud-Enabled Enterprise
This post also appeared on LinkedIn. Progressive enterprises are transforming infrastructure to become cloud-based. It seems straightforward: Remove legacy hardware and software, replace it with PaaS,...
View ArticleFake Streaming & Adware Target Olympics 2020
Online streaming of sporting events has increased since the Rio 2016 Olympics. The Olympics is a very popular event attracting billions of viewers across the globe -- and between cord-cutting and...
View ArticleSecuring Access to Smart Factories: The CISO’s Next Frontier
Industry 4.0 cannot operate with air gaps: it’s time for a new paradigm The application of digital technologies including sensors, digital twins, artificial intelligence, cloud and edge computing -...
View ArticleModern Enterprise Security is a Big Data Problem and it’s Best Solved in the...
Read this and more articles like it on Zscaler CXO REvolutionaries. One common question we get about cloud-based zero trust architectures is about stability and scalability. If you’ve seen any of our...
View ArticleThe Six Business Benefits of Zero Trust Segmentation
At a theoretical level, implementing zero trust makes significant sense. Cybersecurity threats can come from anywhere—outside or inside the network, and even start in one place then move to another....
View ArticleFor Australian Enterprises of All Sizes, the Future Starts with Zero
I am thrilled to announce that Zscaler has selected Orca Tech to be our exclusive distributor for Australia and New Zealand (ANZ). Orca Tech is the only value-added distributor in the region solely...
View ArticleHow to Unlock Maximum Performance in Data Protection
A boat that only stays afloat sometimes (or even most of the time) is effectively just an anchor. Likewise, if a data protection solution is unable to perform well consistently, then it is essentially...
View ArticleCIEM: Who (Or What) Can Access This AWS S3 Bucket?
Who can access this public cloud resource? It’s a simple question. A question you might ask for a number of reasons. Perhaps there has been a security incident related to the resource, and this is part...
View ArticleCloudFall Targets Researchers and Scientists Invited to International...
In August 2021, Zscaler ThreatLabz identified several malicious Microsoft Word documents which used a multi-stage attack-chain abusing Cloudflare Workers and features of MS Office Word to target users...
View ArticleZscaler Executives Honored to Receive Federal 100 Awards
Zscaler is honored to share that Stephen Kovac, Vice President of Global Government and Head of Corporate Compliance, and Drew Schnabel, Vice President, Federal, were honored as Federal 100 Awards...
View ArticleDon’t Hire a “Network Complication Engineer”: Enterprise IT Requires Simplicity
Visit Zscaler CXO Revolutionaries to see more content like this. The purpose of digital transformation (and I’ve already commented on how I don’t particularly like this phrase) is enabling core...
View ArticleSecurity Advisory: Microsoft MSHTML Remote Code Execution Vulnerability...
Background On 7th September 2021, Microsoft released an advisory for CVE-2021-40444. The CVE has a CVSS score of 8.8. What is the issue? Microsoft MSHTML Remote Code Execution Vulnerability...
View ArticleZscaler Launches Partner Demand Center to Support Partner Demand Gen Efforts
Did you know that Partner co-marketing efforts that leverage digital channels see four times the pipeline of non-digital partnerships? But digital marketing is often easier said than done, right? At...
View ArticleZscaler is First and Only Cloud-based SaaS Security Company to Achieve...
This week, Zscaler Private Access (ZPA) and Zscaler Internet Access (ZIA) achieved StateRAMP Ready status, underscoring Zscaler’s commitment to securing state and local government employees and data....
View ArticleWhy Perimeter Security Doesn't Work for the Cloud
For the past 40 years or so, and more recently with the use of next-gen firewalls and secure web gateways, there has always been an outwards vantage point for security. The reactive processes and...
View Article