Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

SASE Vs. SSE: The Ever-Growing Bowl of Alphabet Soup in Cybersecurity

When it comes to the cybersecurity space, there is no shortage of acronyms. With DLP, CASB, SSL, IPS, ATP, CIEM, ZTNA, CSPM, ML, SWG, and a myriad of others, the alphabet soup can simply become too...

View Article


Zscaler Extends Inline, AI-Powered Protection to Online Student Safety

Today, we are excited to announce new innovations in the Zero Trust Exchange for K-12 schools to enhance student safety by preventing cyberbullying and online self-harm activity. The rapid acceleration...

View Article


The Zscaler Data Protection Tour: Alerting Users of DLP Policy Violations

In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...

View Article

Five Reasons to Leave Legacy Firewalls Behind and Adopt Zero Trust

Until recently, everything from data and applications to machines pretty much resided on-premises. Establishing a perimeter with firewalls and trusting everything inside that “zone of trust” met the...

View Article

Announcing Zscaler’s New XDR Partnership with SentinelOne

Register for our webinar discussion on Thursday, March 3rd to hear directly from customers and product leaders about the Zscaler + SentinelOne integration. Zscaler’s customers rely on us as the leader...

View Article


The Zscaler Data Protection Tour: How to Secure Unmanaged Devices

In this blog series, we are taking our readers on a tour of various challenges to enterprise data security. As we do so, we will detail the ins and outs of each subject, describe why they all matter...

View Article

FreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of...

Introduction In January 2022, the ThreatLabz research team identified a crypto scam, which we've dubbed "FreeCryptoScam." In this scam, the threat actor targets crypto users by luring them with an...

View Article

Zero Trust That Rogue Host

“What if a rogue host gets stood up in my public cloud environment, either by accident or by a malicious attacker? And then, what if that rogue host is used as a launchpad to inflict further damage on...

View Article


Malware delivered via Microsoft Teams

Background Recently, Avanan released a blog post mentioning the interest of adversaries in Microsoft Teams as a launchpad for their malicious attacks. Attackers have always targeted online...

View Article


Cloud Security Modernization - as Easy as 1-2-3

Most companies can't just "jump" into the cloud and successfully move off-prem cold turkey, so they need a plan to get there over time. Often, the starting point is a “lift and shift” for a specific...

View Article

Uncovering the Truth of Firewalls and Zero Trust

Join us for a webinar as Zscaler experts explore why zero trust is necessary, how firewalls and VPNs are failing, and what it takes to successfully implement zero trust. Businesses have changed...

View Article

Making a Difference in Africa with Agapé

Going through a significant loss or change often has the potential to make us drastically rethink our lives. This is exactly what happened to me when I lost my mother to cancer in 2011 and had to write...

View Article

HermeticWiper & resurgence of targeted attacks on Ukraine

Summary Since Jan 2022, ThreatLabz has observed a resurgence in targeted attack activity against Ukraine. We identified two attack-chains in the timeframe - Jan to Feb 2022, which we attribute to the...

View Article


WIZE Speaker Series Spotlight: Tami Booth

Our internal employee resource group Women in Zscaler Engage (WIZE) has had the privilege of inviting powerful women in technology to speak to our group about their personal career journeys while also...

View Article

ThreatLabz Security Advisory: Cyberattacks Stemming from the Russia-Ukraine...

ThreatLabz has observed a resurgence in targeted attack activity against Ukraine in the recent months. We’ve identified two targeted attack chains that were likely waged by the Gamaredon APT threat...

View Article


Are you prepared for Russian cyberwarfare attacks?

On Thursday February 24th, Russia began invading Ukraine with a combination of physical strikes and cyberattacks on banks, security services, and government websites in Ukraine. Government officials...

View Article

Technical Analysis of PartyTicket Ransomware

Key Points PartyTicket is an unsophisticated and poorly designed ransomware family that is likely intended to be a diversion from the Hermetic wiper attack The ransomware generates a single AES key...

View Article


How Modern Companies Secure a Hybrid Workforce

This blog is the first in a three-part series that details using security service edge (SSE) to modernize enterprise cybersecurity. In this blog, we will focus on how SSE can secure a hybrid workforce...

View Article

Zscaler SSE Insights Part 1: How Modern Companies Secure a Hybrid Workforce

This blog is the first in a three-part series that details using security service edge (SSE) to modernize enterprise cybersecurity. In this blog, we will focus on how SSE can secure a hybrid workforce...

View Article

The Seven Pitfalls to Avoid When Selecting an SSE Vendor

As seen in Gartner’s recent Magic Quadrant for Security Service Edge (SSE), all SSE vendors are not created equal. Undertaking a network and security transformation requires careful thought and...

View Article
Browsing all 1471 articles
Browse latest View live