Realizing The Federal Zero Trust Maturity Model
The Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) recently released a maturity model that defines distinct pillars and capabilities that agencies...
View ArticleWhat You Need to Know to Secure BYOD and Overcome Reverse Proxy Headaches
Bring your own device (BYOD) is here to stay. Modern organizations are acutely aware that allowing employees to use personal devices for work delivers flexibility and productivity benefits—benefits...
View ArticleResurgence of Voicemail-themed Phishing Attacks Targeting Key Industry...
Summary Since May 2022, ThreatLabz has been closely monitoring the activities of a threat actor which targets users in various US-based organizations with malicious voicemail-notification-themed emails...
View ArticleHow AI is Powering ZTNA to be the Most Reliable Way to Segment Applications
At Zscaler, we believe artificial intelligence is more important than ever in combating rapidly-escalating cyberthreats and taming the complexity of enterprises’ digital footprints. We have been using...
View ArticleReduce Time to Resolution with ZDX AI Capabilities for Service Desk Teams
As the global pandemic continues, service desk teams are constantly under pressure to solve end user challenges as they move between the corporate network (managed) and home network (unmanaged)....
View ArticleAccelerating Mean Time to Resolution with AI-Powered Root Cause Analysis
Today’s IT environments are complex and scale globally to support distributed teams that rely on SaaS services hosted in public clouds or data centers. With employees now working from home, the office,...
View ArticleIntroducing AI-powered Innovations for Zscaler for Users
Today’s Innovations Keynote at Zenith Live will unveil new AI-powered innovations for Zscaler for Users. We’re proud to deliver these capabilities to our customers to help them stop advanced...
View ArticleIntroducing Posture Control by Zscaler, our Cloud Native Application...
One of our cultural values at Zscaler is customer obsession, where every employee is expected to not only go beyond customer expectations but deeply understand customer challenges to better help solve...
View ArticleUncovering and Remediating Cloud Risks with Posture Control
Introduction Cloud environments are becoming increasingly complex and challenging to manage from a security standpoint. In a cloud-native application infrastructure, “workloads” are built by developers...
View ArticleReturn of the Evilnum APT with updated TTPs and new targets
Summary Since the beginning of 2022, ThreatLabz has been closely monitoring the activities of the Evilnum APT group. We identified several instances of their low-volume targeted attack campaigns...
View ArticleZero Trust Network Pillar: Evolving How We Use the Network
This post is the second in a series examining how Zscaler supports the move to zero trust as defined by CISA. The federal zero trust strategy is making agencies rethink how networks are accessed and...
View ArticleWeed Out the Challenges of Network Security by Cultivating Zero Trust
Summer has just begun, the flowers are blooming, and wildlife has all but forgotten the cold and shadows of winter. For many of us, summer represents an opportunity to get out into the sun and take...
View ArticleThe Role of Security in DevOps Architecture
With the increase of digital business powered by cloud, DevOps has become an infinite backbone behind the software delivery ecosystem. DevOps empowers development teams to deliver applications faster...
View ArticlePrioritizing and Remediating Cloud Risk with CNAPP
In my discussions with customers regarding public cloud security, two important problems come up more than any others. Both are people- and process-related challenges that form the basis for why we...
View ArticleCelebrating Pride@Z
As Pride Month comes to a close, we want to celebrate the LGBTQ+ community and our internal resource group (ERG) Pride@Z and take a look back on all the important (and fun!) moments we had throughout...
View Article6 Lessons Learned for Businesses Looking to Modernize Security and Business
Our business has come a long way since its humble beginnings in a tent and bingo hall in 1985. Today, Cache Creek Casino Resort is a premier Northern California casino-resort destination with...
View ArticleZero Trust Application & Workloads Pillar: An App-by-App Approach to Security
This blog is the third in a series examining how Zscaler supports the move to zero trust as defined by CISA. In a zero trust model, the application is the focus of all security efforts. If you can...
View ArticleSSL Inspection Comes With Great Responsibility
Introduction The SSL/TLS protocol was designed to secure the communication between only two parties - a TLS client and a TLS server. However, the continuous abuse of the same standards that were used...
View ArticleThe Top Three Elements to Look for in a Cybersecurity Partner
As a recognized brand leader of valves, fittings, and flow-control products, NIBCO’s bread and butter is in manufacturing. We have over a century of experience in a family-run business and have...
View ArticleWhy Network Monitoring Tools Fail Within Secure Environments
There is a fundamental shift happening through digital transformation, which includes application transformation (data center to SaaS, IaaS, PaaS), network transformation (hub-and-spoke to direct...
View Article