Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Seeing the Invisible - Performance Monitoring in a Zero Trust World

Performance monitoring of private applications accessed remotely via VPN has always been a challenge. The encrypted tunnel between the user and the data center blocked the ability to truly understand...

View Article


Deception Engineering

Introduction One skill that the Zscaler Deception team has become really good at is analyzing adversary tactics, techniques, and toolsets and hypothesizing how we could disrupt the adversary playbook...

View Article


How to Embrace Productivity and Secure BYOD

Bring your own device (BYOD) refers to the personal endpoints that employees use to perform their work duties. While enabling personal device access to corporate resources may have seemed unthinkable...

View Article

CNAPP and SASE: Two Platforms to Rule Them All

In the early days of a new market in B2B information technology, it is common for the vendor community to step up with dozens of point products, each with their own points of differentiation within...

View Article

Honoring Vets @ Z on Veteran’s Day 2021

Zscaler prides itself on innovation, customer obsession, and securing the future, but our people make it all possible. Because we have a hugely diverse workforce composed of people from a wide range of...

View Article


Start Your Zero Trust Journey with These Suggestions from Gartner

Whether you are new to the cloud security space and trying to figure out the latest security trends or you have an extensive background in the industry with years of experience, you've certainly come...

View Article

Worried About Your VPN? Zero Trust is the Answer

If you’re using VPN and legacy firewalls, it’s time to reconsider. Here’s why: VPNs are slow, vulnerable, and downright dangerous. With the massive adoption of remote work, a spotlight has been put on...

View Article

Comcast Monday Blues: How We Stayed Productive During an ISP Outage

“Switch over to your smartphone hotspot if you have Comcast,” the Slack message said. It was 9:45 pm on Monday, November 8th. At first, it seemed like a childish prank, but it was coming from a legit...

View Article


Data@Risk Report: Remote Work Challenges Putting Data at Risk

From intellectual property to customer details, sensitive information is the lifeblood of any organization. Where data breaches occur, revenue, brand reputation, and stakeholder wellbeing suffer. As a...

View Article


Overcoming Sensitive Data Protection Challenges in AWS S3 Storage

AWS S3 buckets are the destination for much of the data moving to the cloud. This service, and similar services in other cloud providers such as Azure Storage Blobs, enable organizations of any size or...

View Article

Return of Emotet malware

Key Points Emotet is one of the most dangerous, prolific, and long-lasting malware Trojans that has ever existed. In January 2021, a law enforcement action disrupted the Emotet malware and its...

View Article

Zscaler Welcomes Passage of Bipartisan Infrastructure Bill to Bolster US...

President Biden signed the Infrastructure Investment and Jobs Act into law earlier this week, bringing new funding to strengthen cyber defenses for transportation, public water systems, the energy...

View Article

Overcoming the Five Headwinds to Microsegmentation

This post was originally published on the EdgeWise Networks site. EdgeWise was acquired by Zscaler in May 2020. In the past, corporate networks were flat, open places with unfettered access. Anything...

View Article


Technology as a Driver, Not an Inhibitor, of Change

Companies striving to implement cloud applications that are always available, from anywhere, may hit several stumbling blocks. Often, they are held back by their existing IT architectures or IT budgets...

View Article

Helping Veterans Transition to a New Mission

When Nathan Green started thinking about life after serving in the Air Force, he had no idea where to start searching for a new career. He only knew military life — the requirements to be met, the...

View Article


The Zscaler Data Protection Tour: How to Find and Stop Sensitive Data Loss

In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...

View Article

Do You Understand Your SLAs? A Guide to Demystifying Cloud Security SLAs

Why SLAs? Service level agreements (SLAs)—in the context of this blog—are a cloud security vendor’s expression of confidence in its ability to deliver a resilient, scalable, and high-performing...

View Article


Women Making an Impact: Catherine Lee on Building a Balance Between Career...

This year, at the annual Zscaler Sales Kickoff (SKO) in August, we were joined by powerful and inspiring women who shared their stories of setbacks, persistence, and triumphs. Supported by the WIZE...

View Article

How to Enforce Least-Privileged Cloud Permissions and Stay Friends with Your...

Modern organizations are keen on agility. This leads to fast adoption of public cloud, DevOps best practices like infrastructure as code, and a significant increase in the number of software releases...

View Article

Tackling Patch Management with Zero Trust

For some security professionals, patch management can be boiled down to the popular Nike slogan: Just Do It. But as anyone who has ever managed a network knows, patch management isn’t as simple as a...

View Article
Browsing all 1471 articles
Browse latest View live