Digital Acceleration Puts CIOs in the Driver’s Seat
A few weeks ago, we were pleased to be able to meet up with state CIOs in person at the 2021 National Association of State CIOs (NASCIO) Annual Conference. This was the first annual in-person gathering...
View ArticleReflecting on One Year at Zscaler
I just finished my first year at Zscaler, and as many do when they cross such milestones, I spent a little time reflecting on how my time at the company has gone so far. My gut-level feeling is that it...
View ArticleBlack Friday Shoppers Once Again Scrooged By Cyber Attacks
The holidays are here, and along with the eggnog and tacky sweaters comes the annual spike in phishing, scam, and card skimmer attacks targeting seasonal shoppers – particularly during the Black Friday...
View ArticleRamping Up Secure Cloud: Zscaler Testimony to Senate Committee
At a U.S. Senate Homeland Security and Governmental Affairs Committee roundtable this week, I was honored to be selected to testify on behalf of Zscaler in support of bipartisan legislation to improve...
View ArticleWhat You Need to Know About Gartner’s New Security Service Edge
This blog is the first in a three-part series covering Gartner's new market category called security service edge (SSE) The cybersecurity world is constantly evolving—updating existing technologies and...
View ArticleWhat to Consider in Preparation for Hybrid Work
For months now, employees have been working from home, trying to balance multiple aspects of their lives while contributing to work as if things were business as usual. While most employees have found...
View ArticleThe Hidden World of Cloud Permissions: a Growing Risk to your Workloads and Data
Your services, data, and infrastructure have left the building. Identities, both human and non-human, now enjoy all kinds of access to your resources and suddenly, the private, contained neighborhood...
View ArticleThe Zscaler Data Protection Tour: Controlling Personal Apps with Tenant...
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View ArticleThe 2021 State of Cloud (In)Security
Over the last two years, organizations have significantly accelerated their shift to the cloud. IT teams who hadn’t already started this process by 2020 were kickstarted by the global pandemic, when...
View ArticleSecuring workloads in multi-cloud environments with Zscaler’s Zero Trust...
The cloud has become the new data center for most enterprises, with multi-cloud environments increasingly becoming the norm. Cloud workloads have to communicate both with each other and to the internet...
View ArticleZscaler Secures Cloud Workloads with the Zscaler Zero Trust Exchange™
Since its inception, Zscaler has remained dedicated to protecting our customers—it’s at the very core of everything we do. In our first decade, we focused intently on providing users secure access to...
View ArticleUnused Public Cloud Permissions - Should We Simply Disable Them?
Large public cloud providers offer multiple services. In 2021, AWS comprises over 200 products and services, Azure offers more than 160 services, and GCP provides more than 90 different services. The...
View ArticleSecurity Advisory: log4j 0-day Remote Code Execution Vulnerability...
Background The Apache Software Foundation has released a security advisory with patch and mitigation details to address a remote code execution vulnerability (CVE-2021-44228) affecting Log4j versions...
View ArticlePrevent the Apache Log4j Java Library Vulnerability With a Zero Trust...
Recently, a zero-day vulnerability (CVE-2021-44228) was discovered in the popular Apache Log4j logging library, which could allow an attacker full remote code execution. There is evidence that this...
View ArticleZscaler Private Access now Available to SAP Customers and Partners Through...
We are very pleased to announce that Zscaler Private Access (ZPA) for SAP S/4HANA® is now available on SAP® Store, the online marketplace for SAP and SAP partner offerings. SAP customers and SAP...
View ArticleZscaler Private Access now Available to SAP Customers and Partners Through...
We are very pleased to announce that Zscaler Private Access (ZPA) for SAP S/4HANA® is now available on SAP® Store, the online marketplace for SAP and SAP partner offerings. SAP customers and SAP...
View ArticleReturn of Emotet: Malware Analysis
Key Points Emotet is a downloader malware used to download and execute additional modules and payloads. In January 2021, a law enforcement action disrupted the malware, its infrastructure, and some of...
View ArticleAdapting to Hybrid Work: Improving Digital Experience by Capturing Data from...
With the emergence of hybrid work, poor user experience has become far too common—users complaining about slow applications, network outages, and machine crashes is now an everyday occurrence. But the...
View ArticleKeeping Clean Water Flowing and Giving Our Employees Back Time in Their Lives
If you’re accustomed to enjoying a refreshing shower in the morning, conveniently starting a load of laundry, or just getting a cold glass of water on a hot day, but you take for granted how the water...
View ArticleNeutralizing Apache Log4j Exploits with Identity-Based Segmentation
On December 11, Zscaler’s TheatLabz observed exploit attempts of the Log4j in the wild, analyzed the vulnerability, and recommended protection strategies. Read the blogs here and here. Among the...
View Article