Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Countdown to Zenith Live

In less than a week, some of the brightest minds in cloud computing, networking, and security will be gathering in Las Vegas for Zenith Live 2019, the Zscaler Cloud Summit. Are you ready? At Zenith...

View Article


InnfiRAT: A new RAT aiming for your cryptocurrency and more

Recently, the Zscaler ThreatLabZ team came across a new RAT called InnfiRAT, which is written in .NET and designed to perform specific tasks from an infected machine. This blog provides an analysis of...

View Article


Welcome to Zenith Live 2019!

What a morning! I stepped on stage at 8:00 a.m. to welcome over 700 people to this year’s Zscaler Cloud Summit, Zenith Live 2019. We’ve been planning for this event for the better part of a year and...

View Article

New Report from Gartner Research: The Future of Network Security Is in the Cloud

The IT networking world is evolving rapidly: The new universe of cloud and mobility can neither be built nor scaled on the network architectures of the past. Gartner Research VP analyst Lawrence Orans...

View Article

Reflections on Zenith Live Las Vegas

Zenith Live, the Zscaler Cloud Summit, is the highlight of the year for me. There’s nothing I enjoy more than meeting with customers and hearing first-hand their accounts of the challenges they face...

View Article


Ignore DNS at your peril 

DNS—the Domain Name System protocol—is known as the phone book for the internet. It’s what enables a person to type a familiar website address, such as zscaler.com, into a browser and have it...

View Article

Phishing attacks abusing appspot.com and web.app domains on Google Cloud

In July, Zscaler ThreatLabZ posted a blog about a rise in the use of Microsoft Azure domains to host phishing attacks. Our researchers recently detected similar activity on the Google domains...

View Article

Magecart hits again, leveraging compromised sites and newly registered domains

During alert monitoring, ThreatLabZ researchers came across multiple cases of shopping sites being compromised and injected with a skimming script. This injected script looks for the payment method and...

View Article


Everything is Moving to the Cloud

In August 2019, Gartner published a report entitled “The Future of Network Security is in the Cloud.” The report offers a detailed and thorough explanation of why companies must recognize that their...

View Article


Why a holistic approach to cloud transformation is the key to success

This article originally appeared in CloudTech.   As applications increasingly move to the cloud, businesses often voice concerns about soaring WAN costs as well as latency issues when accessing apps....

View Article

Examining the Ryuk Ransomware

Ryuk ransomware had a disturbingly successful debut, being used to hit at least three organizations in its first two months of activity for more than $640,000 in ransom. Several attacks followed, where...

View Article

Why cybersecurity must be viewed as more than an IT issue

This article originally appeared in Digitalisation World.   Cybersecurity will have to remain a priority for the foreseeable future. The truth is that data breaches are now an inevitability, which is...

View Article

What makes Zscaler a great place to work?

Zscaler was born around a dining room table by our founder and a small, select team of technologists, and it’s grown into a company of more than 1,500 people worldwide. We’ve experienced a lot of...

View Article


UC Browser app abuses may have exposed 500 million users

Recently, when examining the Zscaler cloud for unusual activity, ThreatLabZ researchers found some questionable hits in relation to a particular domain: 9appsdownloading[.]com. Upon analysis, we found...

View Article

Join me at the Gartner IT Symposium/Xpo

Zscaler was founded at a time when the use of cloud applications was emerging in the enterprise and users were becoming more mobile, connecting over unsecured networks and using unmanaged devices like...

View Article


October: A Month of Wickedware

October is the perfect month for scary stories, with darkness falling early, howling autumn winds, and signs of Halloween everywhere. While ghost stories may frighten children, there are few things...

View Article

The Move to SD-WAN: Why Traditional Security Doesn’t Cut It

Is your company one of the thousands considering SD-WAN as part of its digital transformation?  As companies across every industry move more of their vital infrastructure to the cloud, they recognize...

View Article


SOX Doesn’t Mean Secure

This article originally ran in Forbes.   The legislation was crafted with the best of intentions. Some 17 years ago, the U.S. federal government enacted the Sarbanes-Oxley Act to create better controls...

View Article

Zenith Live Lisbon: Empowering transformation and celebrating relationships

The Zenith Live Summit 2019 in Lisbon, Portugal, concluded a little less than a month ago, yet I am still buzzing with excitement and energy from this amazing event. It’s kind of appropriate that the...

View Article

Emotet is back in action after a short break

It’s common for cybercriminals to launch an attack, then shortly thereafter stop the campaign before they are detected. These breaks also give these bad actors a chance to change tactics to, once...

View Article
Browsing all 1471 articles
Browse latest View live