SASE Vs. SSE: The Ever-Growing Bowl of Alphabet Soup in Cybersecurity
When it comes to the cybersecurity space, there is no shortage of acronyms. With DLP, CASB, SSL, IPS, ATP, CIEM, ZTNA, CSPM, ML, SWG, and a myriad of others, the alphabet soup can simply become too...
View ArticleZscaler Extends Inline, AI-Powered Protection to Online Student Safety
Today, we are excited to announce new innovations in the Zero Trust Exchange for K-12 schools to enhance student safety by preventing cyberbullying and online self-harm activity. The rapid acceleration...
View ArticleThe Zscaler Data Protection Tour: Alerting Users of DLP Policy Violations
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View ArticleFive Reasons to Leave Legacy Firewalls Behind and Adopt Zero Trust
Until recently, everything from data and applications to machines pretty much resided on-premises. Establishing a perimeter with firewalls and trusting everything inside that “zone of trust” met the...
View ArticleAnnouncing Zscaler’s New XDR Partnership with SentinelOne
Register for our webinar discussion on Thursday, March 3rd to hear directly from customers and product leaders about the Zscaler + SentinelOne integration. Zscaler’s customers rely on us as the leader...
View ArticleThe Zscaler Data Protection Tour: How to Secure Unmanaged Devices
In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...
View ArticleFreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of...
Introduction In January 2022, the ThreatLabz research team identified a crypto scam, which we've dubbed "FreeCryptoScam." In this scam, the threat actor targets crypto users by luring them with an...
View ArticleZero Trust That Rogue Host
“What if a rogue host gets stood up in my public cloud environment, either by accident or by a malicious attacker? And then, what if that rogue host is used as a launchpad to inflict further damage on...
View ArticleMalware delivered via Microsoft Teams
Background Recently, Avanan released a blog post mentioning the interest of adversaries in Microsoft Teams as a launchpad for their malicious attacks. Attackers have always targeted online...
View ArticleCloud Security Modernization - as Easy as 1-2-3
Most companies can't just "jump" into the cloud and successfully move off-prem cold turkey, so they need a plan to get there over time. Often, the starting point is a “lift and shift” for a specific...
View ArticleUncovering the Truth of Firewalls and Zero Trust
Join us for a webinar as Zscaler experts explore why zero trust is necessary, how firewalls and VPNs are failing, and what it takes to successfully implement zero trust. Businesses have changed...
View ArticleMaking a Difference in Africa with Agapé
Going through a significant loss or change often has the potential to make us drastically rethink our lives. This is exactly what happened to me when I lost my mother to cancer in 2011 and had to write...
View ArticleHermeticWiper & resurgence of targeted attacks on Ukraine
Summary Since Jan 2022, ThreatLabz has observed a resurgence in targeted attack activity against Ukraine. We identified two attack-chains in the timeframe - Jan to Feb 2022, which we attribute to the...
View ArticleWIZE Speaker Series Spotlight: Tami Booth
Our internal employee resource group Women in Zscaler Engage (WIZE) has had the privilege of inviting powerful women in technology to speak to our group about their personal career journeys while also...
View ArticleThreatLabz Security Advisory: Cyberattacks Stemming from the Russia-Ukraine...
ThreatLabz has observed a resurgence in targeted attack activity against Ukraine in the recent months. We’ve identified two targeted attack chains that were likely waged by the Gamaredon APT threat...
View ArticleAre you prepared for Russian cyberwarfare attacks?
On Thursday February 24th, Russia began invading Ukraine with a combination of physical strikes and cyberattacks on banks, security services, and government websites in Ukraine. Government officials...
View ArticleTechnical Analysis of PartyTicket Ransomware
Key Points PartyTicket is an unsophisticated and poorly designed ransomware family that is likely intended to be a diversion from the Hermetic wiper attack The ransomware generates a single AES key...
View ArticleHow Modern Companies Secure a Hybrid Workforce
This blog is the first in a three-part series that details using security service edge (SSE) to modernize enterprise cybersecurity. In this blog, we will focus on how SSE can secure a hybrid workforce...
View ArticleZscaler SSE Insights Part 1: How Modern Companies Secure a Hybrid Workforce
This blog is the first in a three-part series that details using security service edge (SSE) to modernize enterprise cybersecurity. In this blog, we will focus on how SSE can secure a hybrid workforce...
View ArticleThe Seven Pitfalls to Avoid When Selecting an SSE Vendor
As seen in Gartner’s recent Magic Quadrant for Security Service Edge (SSE), all SSE vendors are not created equal. Undertaking a network and security transformation requires careful thought and...
View Article