Seeing the Invisible - Performance Monitoring in a Zero Trust World
Performance monitoring of private applications accessed remotely via VPN has always been a challenge. The encrypted tunnel between the user and the data center blocked the ability to truly understand...
View ArticleDeception Engineering
Introduction One skill that the Zscaler Deception team has become really good at is analyzing adversary tactics, techniques, and toolsets and hypothesizing how we could disrupt the adversary playbook...
View ArticleHow to Embrace Productivity and Secure BYOD
Bring your own device (BYOD) refers to the personal endpoints that employees use to perform their work duties. While enabling personal device access to corporate resources may have seemed unthinkable...
View ArticleCNAPP and SASE: Two Platforms to Rule Them All
In the early days of a new market in B2B information technology, it is common for the vendor community to step up with dozens of point products, each with their own points of differentiation within...
View ArticleHonoring Vets @ Z on Veteran’s Day 2021
Zscaler prides itself on innovation, customer obsession, and securing the future, but our people make it all possible. Because we have a hugely diverse workforce composed of people from a wide range of...
View ArticleStart Your Zero Trust Journey with These Suggestions from Gartner
Whether you are new to the cloud security space and trying to figure out the latest security trends or you have an extensive background in the industry with years of experience, you've certainly come...
View ArticleWorried About Your VPN? Zero Trust is the Answer
If you’re using VPN and legacy firewalls, it’s time to reconsider. Here’s why: VPNs are slow, vulnerable, and downright dangerous. With the massive adoption of remote work, a spotlight has been put on...
View ArticleComcast Monday Blues: How We Stayed Productive During an ISP Outage
“Switch over to your smartphone hotspot if you have Comcast,” the Slack message said. It was 9:45 pm on Monday, November 8th. At first, it seemed like a childish prank, but it was coming from a legit...
View ArticleData@Risk Report: Remote Work Challenges Putting Data at Risk
From intellectual property to customer details, sensitive information is the lifeblood of any organization. Where data breaches occur, revenue, brand reputation, and stakeholder wellbeing suffer. As a...
View ArticleOvercoming Sensitive Data Protection Challenges in AWS S3 Storage
AWS S3 buckets are the destination for much of the data moving to the cloud. This service, and similar services in other cloud providers such as Azure Storage Blobs, enable organizations of any size or...
View ArticleReturn of Emotet malware
Key Points Emotet is one of the most dangerous, prolific, and long-lasting malware Trojans that has ever existed. In January 2021, a law enforcement action disrupted the Emotet malware and its...
View ArticleZscaler Welcomes Passage of Bipartisan Infrastructure Bill to Bolster US...
President Biden signed the Infrastructure Investment and Jobs Act into law earlier this week, bringing new funding to strengthen cyber defenses for transportation, public water systems, the energy...
View ArticleOvercoming the Five Headwinds to Microsegmentation
This post was originally published on the EdgeWise Networks site. EdgeWise was acquired by Zscaler in May 2020. In the past, corporate networks were flat, open places with unfettered access. Anything...
View ArticleTechnology as a Driver, Not an Inhibitor, of Change
Companies striving to implement cloud applications that are always available, from anywhere, may hit several stumbling blocks. Often, they are held back by their existing IT architectures or IT budgets...
View ArticleHelping Veterans Transition to a New Mission
When Nathan Green started thinking about life after serving in the Air Force, he had no idea where to start searching for a new career. He only knew military life — the requirements to be met, the...
View ArticleThe Zscaler Data Protection Tour: How to Find and Stop Sensitive Data Loss
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View ArticleDo You Understand Your SLAs? A Guide to Demystifying Cloud Security SLAs
Why SLAs? Service level agreements (SLAs)—in the context of this blog—are a cloud security vendor’s expression of confidence in its ability to deliver a resilient, scalable, and high-performing...
View ArticleWomen Making an Impact: Catherine Lee on Building a Balance Between Career...
This year, at the annual Zscaler Sales Kickoff (SKO) in August, we were joined by powerful and inspiring women who shared their stories of setbacks, persistence, and triumphs. Supported by the WIZE...
View ArticleHow to Enforce Least-Privileged Cloud Permissions and Stay Friends with Your...
Modern organizations are keen on agility. This leads to fast adoption of public cloud, DevOps best practices like infrastructure as code, and a significant increase in the number of software releases...
View ArticleTackling Patch Management with Zero Trust
For some security professionals, patch management can be boiled down to the popular Nike slogan: Just Do It. But as anyone who has ever managed a network knows, patch management isn’t as simple as a...
View Article