Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

The Top Challenges Faced by Organizations Implementing DevSecOps

DevSecOps stands for development, security, and operations. DevSecOps emerged in response to observations that many DevOps processes failed to integrate security properly. The idea is to identify and...

View Article


Celebrating Asian American & Pacific Islander Heritage Month at Zscaler

Our people are the core of everything we do at Zscaler. Each individual brings passion, heart, and brilliance to work every day. Without diverse backgrounds, experiences, and input, our company would...

View Article


Vidar distributed through backdoored Windows 11 downloads and abusing Telegram

Summary In April 2022, ThreatLabz discovered several newly registered domains, which were created by a threat actor to spoof the official Microsoft Windows 11 OS download portal. We discovered these...

View Article

My Journey as Sales Engineer is a Journey of Transformation

"The only constant in life is change." This saying doesn't just cover the professional career of Cedric Blöchlinger; it's also a great way of describing his current role. As a Sales Engineer at...

View Article

Introducing Integrated Deception as Part of the World’s First and Only...

Whether it’s the rise in encrypted attacks, hands-on-keyboard threats, human-operated ransomware, or, for that matter, successful breaches, we don’t need to throw more doom and gloom statistics to tell...

View Article


The Top 5 Reasons Zscaler Partners Won’t Want to Miss Zenith Live 2022

The countdown is on! Zenith Live is back and better than ever - both in-person and virtual! Join technology, channel, and alliance visionaries and industry innovators as we bring together the very best...

View Article

5 Things to Consider When Selecting a Traffic Forwarding Solution

You have made the decision to implement zero trust security for your organization. You have done your research, looked at your options, and zeroed in on the Security Service Edge (SSE) provider who...

View Article

A Brief(er) History of Zero Trust: Major Milestones in Rethinking Enterprise...

Why tell the story of zero trust? Many in IT security believe zero trust is a game-changer, a fundamental rethink about enterprise security and protection of the networks and resources that house our...

View Article


Zscaler for IOT/OT Now Sold by Siemens for Industrial Security

I am very excited to join forces with Siemens to extend zero trust into OT and disrupt the traditional OT security mindset. Now, Zscaler and Siemens product and sales teams together are taking OT...

View Article


OT-IT Convergence Brought to Reality by Siemens and Zscaler

Four years ago when I was working at another security company, my team and I brought to executive product management the idea to add OT network security features to our SOC platform. Why did I care?...

View Article

CNAPP - A Swiss Army Knife for Cloud-Native Developers and Security teams

A cloud-native application protection platform (CNAPP), is a suite of security tools that enable developers and security teams in any enterprise to identify, prioritize, and remediate security, legal,...

View Article

A New Kind of Sandbox: Findings Mapped to MITRE ATT&CK

For security teams, there seems to always be room in the budget for a sandbox technology. Yet, how can a legacy technology tool continue to benefit today’s security operations centers? Information and...

View Article

Browser-in-the Browser sextortion scam makes victims pay by imitating Indian Gov

Phishing has been a prominent cyber threat for decades, stealing the spotlight as the most prevalent attack vector for years, but the latest breed of attacks is more sophisticated and complicated to...

View Article


The 2022 ThreatLabz State of Ransomware Report

Ransomware attacks increased by yet another 80% between February 2021 and March 2022, based on an analysis of ransomware payloads seen across the Zscaler cloud. Double-extortion attacks, which include...

View Article

Coverage Advisory for CVE-2022-30190: Microsoft Windows Support Diagnostic...

Background On May 27, 2022, nao_sec found a malicious Word document submitted to Virustotal from a Belarus IP address. The document was abusing MS-MSDT URI scheme to execute PowerShell within the...

View Article


Why Enterprise Data Is at Risk and How You Can Protect It

The world has changed significantly since the days of the on-premises-only enterprise of 30 years ago. While a defensive network perimeter composed of legacy appliances like firewalls was once...

View Article

How Zero Trust Takes Complexity Out of Mergers & Acquisitions

In a merger and/or acquisition (M&A) situation, IT must quickly respond to the needs of the business and securely integrate two disparate companies in just a few quarters to meet change of...

View Article


Lyceum .NET DNS Backdoor

Active since 2017, Lyceum group is a state-sponsored Iranian APT group that is known for targeting Middle Eastern organizations in the energy and telecommunication sectors and mostly relying on .NET...

View Article

Technical Analysis of PureCrypter: A Fully-Functional Loader Distributing...

Key points PureCrypter is a fully-featured loader being sold since at least March 2021 The malware has been observed distributing a variety of remote access trojans and information stealers The loader...

View Article

Rising Above Network Noise: Industrial Transformation at HANNOVER MESSE

Trade show HANNOVER MESSE provides an international platform for the latest in industrial transformation to be showcased, debated, and experienced. Multi-industry participants across research and...

View Article
Browsing all 1471 articles
Browse latest View live