Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Realizing The Federal Zero Trust Maturity Model

The Department of Homeland Security (DHS) and Cybersecurity and Infrastructure Security Agency (CISA) recently released a maturity model that defines distinct pillars and capabilities that agencies...

View Article


What You Need to Know to Secure BYOD and Overcome Reverse Proxy Headaches

Bring your own device (BYOD) is here to stay. Modern organizations are acutely aware that allowing employees to use personal devices for work delivers flexibility and productivity benefits—benefits...

View Article


Resurgence of Voicemail-themed Phishing Attacks Targeting Key Industry...

Summary Since May 2022, ThreatLabz has been closely monitoring the activities of a threat actor which targets users in various US-based organizations with malicious voicemail-notification-themed emails...

View Article

How AI is Powering ZTNA to be the Most Reliable Way to Segment Applications

At Zscaler, we believe artificial intelligence is more important than ever in combating rapidly-escalating cyberthreats and taming the complexity of enterprises’ digital footprints. We have been using...

View Article

Reduce Time to Resolution with ZDX AI Capabilities for Service Desk Teams

As the global pandemic continues, service desk teams are constantly under pressure to solve end user challenges as they move between the corporate network (managed) and home network (unmanaged)....

View Article


Accelerating Mean Time to Resolution with AI-Powered Root Cause Analysis

Today’s IT environments are complex and scale globally to support distributed teams that rely on SaaS services hosted in public clouds or data centers. With employees now working from home, the office,...

View Article

Introducing AI-powered Innovations for Zscaler for Users

Today’s Innovations Keynote at Zenith Live will unveil new AI-powered innovations for Zscaler for Users. We’re proud to deliver these capabilities to our customers to help them stop advanced...

View Article

Introducing Posture Control by Zscaler, our Cloud Native Application...

One of our cultural values at Zscaler is customer obsession, where every employee is expected to not only go beyond customer expectations but deeply understand customer challenges to better help solve...

View Article


Uncovering and Remediating Cloud Risks with Posture Control

Introduction Cloud environments are becoming increasingly complex and challenging to manage from a security standpoint. In a cloud-native application infrastructure, “workloads” are built by developers...

View Article


Return of the Evilnum APT with updated TTPs and new targets

Summary Since the beginning of 2022, ThreatLabz has been closely monitoring the activities of the Evilnum APT group. We identified several instances of their low-volume targeted attack campaigns...

View Article

Zero Trust Network Pillar: Evolving How We Use the Network

This post is the second in a series examining how Zscaler supports the move to zero trust as defined by CISA. The federal zero trust strategy is making agencies rethink how networks are accessed and...

View Article

Weed Out the Challenges of Network Security by Cultivating Zero Trust

Summer has just begun, the flowers are blooming, and wildlife has all but forgotten the cold and shadows of winter. For many of us, summer represents an opportunity to get out into the sun and take...

View Article

The Role of Security in DevOps Architecture

With the increase of digital business powered by cloud, DevOps has become an infinite backbone behind the software delivery ecosystem. DevOps empowers development teams to deliver applications faster...

View Article


Prioritizing and Remediating Cloud Risk with CNAPP

In my discussions with customers regarding public cloud security, two important problems come up more than any others. Both are people- and process-related challenges that form the basis for why we...

View Article

Celebrating Pride@Z

As Pride Month comes to a close, we want to celebrate the LGBTQ+ community and our internal resource group (ERG) Pride@Z and take a look back on all the important (and fun!) moments we had throughout...

View Article


6 Lessons Learned for Businesses Looking to Modernize Security and Business

Our business has come a long way since its humble beginnings in a tent and bingo hall in 1985. Today, Cache Creek Casino Resort is a premier Northern California casino-resort destination with...

View Article

Zero Trust Application & Workloads Pillar: An App-by-App Approach to Security

This blog is the third in a series examining how Zscaler supports the move to zero trust as defined by CISA. In a zero trust model, the application is the focus of all security efforts. If you can...

View Article


SSL Inspection Comes With Great Responsibility

Introduction The SSL/TLS protocol was designed to secure the communication between only two parties - a TLS client and a TLS server. However, the continuous abuse of the same standards that were used...

View Article

The Top Three Elements to Look for in a Cybersecurity Partner

As a recognized brand leader of valves, fittings, and flow-control products, NIBCO’s bread and butter is in manufacturing. We have over a century of experience in a family-run business and have...

View Article

Why Network Monitoring Tools Fail Within Secure Environments

There is a fundamental shift happening through digital transformation, which includes application transformation (data center to SaaS, IaaS, PaaS), network transformation (hub-and-spoke to direct...

View Article
Browsing all 1471 articles
Browse latest View live