Zscaler’s Stephen Kovac Named Vice Chair for Alliance for Digital Innovation...
Zscaler is honored to announce that Stephen Kovac, Chief Compliance Officer and Head of Global Government Affairs, was named Vice Chair of the Alliance for Digital Innovation (ADI)’s 2021 Board of...
View ArticleNew Insights: Is China watching your IoT traffic?
To add insult to injury, the Internet of Things (IoT) doesn’t just have notoriously poor security, the connected devices are now front and center in the fallout of critical control systems. These days,...
View ArticleThe Zscaler Data Protection Tour: How to Control Risky File Sharing
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View ArticleWhy Identity is Critical for Zero Trust
A few years back, few companies were talking about zero trust, a concept first teased by the Jericho Forum in the early 2000s and later codified by John Kindervag (then at Forrester) at the end of the...
View ArticleNew MultiloginBot Phishing Campaign
Multilogin is an application designed to make it easier to log into multiple accounts on a single website or platform simultaneously. Recently, Zscaler ThreatLabz has come across a live phishing...
View ArticleWhy is Zero Trust Essential for Infrastructure Modernization?
Should I trust you? Zero trust is the name of the game when it comes to providing security for your organization. But what is zero trust and why should you care? The phrase has gained momentum in...
View ArticleBeyond the Marketing Hype, Zero Trust Has Much to Offer Government
Australia’s national and state governments are facing a growing challenge from cyberthreats that have the potential to cause large-scale disruption and loss. Ransomware, phishing campaigns, and...
View ArticleSimplify Security and Connectivity for Workers in China with Zscaler Solutions
“You cannot mandate productivity; you must provide the tools to let people become their best.” – Steve Jobs One of the tools required in business today is fast and secure access to the internet and...
View ArticleUnderstanding Attack Progression
Dave Shackleford is a SANS Analyst and serves on the Board of Directors at the SANS Technology Institute. This post was originally published on the EdgeWise Networks site. EdgeWise was acquired by...
View ArticleEncrypted Attacks Rise 314%
The Zscaler Zero Trust Exchange is built on the world’s largest security cloud, which brokers over 190 billion daily transactions (that’s roughly 50x the number of daily Google searches), and extracts...
View ArticleHow a Phishing Campaign Targeting Indian Banking Users is Distributing an SMS...
Scammers are always coming up with new, more sophisticated social engineering techniques to collect user credentials for financial benefit. However, when it comes to banking websites, capturing login...
View ArticleThe Growing Importance of the Cloud-Native Application Protection Platform...
Over the past five years, public cloud adoption has shifted from mostly lift-and-shift of traditional VM workloads to a single cloud provider to today’s reality of rapid adoption of cloud-native...
View ArticleCloud Connector and Cryptojacking
Cryptocurrency has been in the news quite a bit lately, and Bitcoin is currently the most popular cryptocurrency. Proponents of Bitcoin cite the distributed nature of the currency as one of its main...
View ArticleThe Zscaler Data Protection Tour: How to Secure SaaS Misconfigurations
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View Article“We can’t hear you!” Diagnose poor call quality issues with digital...
The most dreaded call that someone working the IT help desk can receive is from a user complaining about poor call quality. These user experience problems are typically highly visible, disruptive, and...
View ArticleInnovation to Protect the World
As I reflect on Zscaler’s journey and progress over the last 14 years, it is clear that our solutions, which help organizations become more secure and agile in the cloud world, are having a positive...
View ArticleZero Trust: The Key to OT Security Modernization
Today, secure remote access has not only become paramount to business continuity on the IT side, but also on the OT side where even short-lived disruptions to factory operations and production lines...
View ArticleSpike in DanaBot Malware Activity
Key Points Two large software supply chain attacks distributed the DanaBot malware. DanaBot is a malware-as-a-service platform discovered in 2018 that focuses on credential theft and banking fraud....
View ArticleFive Things to Consider Before Deploying a Network Sandbox in the Cloud Era
Over the last two years, the pandemic has changed everything. What was supposed to be a gradual high-growth transition to the cloud turned into an accelerated race to digital transformation....
View Article“We Can’t Hear You!” Diagnose Poor Call Quality Issues with Digital...
One of the most dreaded calls that IT support can receive is from a user complaining about poor call quality. These problems are usually highly visible, highly disruptive, hard to isolate, and are...
View Article