Zscaler Associates in India Return to Office
Zscaler reopened offices in India on May 2, 2022, across multiple locations including Bangalore, Pune, and Mohali. After almost two years of working from home, associates returned to the office with...
View ArticleBest Practices for Reducing Public Cloud Security Risk with CNAPP
Cloud security is currently addressed by a wide variety of security solutions. This patchwork approach creates problems for security teams as these tools are siloed, with each offering its own narrow,...
View ArticleZero Trust Device Pillar: Ensuring the Device is More Trustworthy Than the User
This post is the fourth in a series examining how Zscaler supports the move to zero trust as defined by CISA. The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency...
View ArticleRise in Qakbot attacks traced to evolving threat techniques
Active since 2008, Qakbot, also known as QBot, QuackBot and Pinkslipbot, is a common trojan malware designed to steal passwords. This pervasive threat spreads using an email-driven botnet that inserts...
View ArticleApplying Knowledge Graphs to Public Cloud Security
Graph theory has an interesting history, dating back to the 1700s when Leonhard Euler, who you might remember from Differential Equations in college, solved the Konigsberg bridge problem. The bridge...
View ArticleJoin Zscaler at AWS re:Inforce 2022
The re:Inforce conference is one of AWS’s marquee events primarily focused on cybersecurity. At this annual event, you’ll be able to hear from experts in the field, learn best practices, and discover...
View ArticleThe Zscaler Data Protection Tour: Controlling the Use of Shadow IT
In this blog series, we are taking readers on a tour of the numerous challenges to enterprise data security. As we do so, we detail the ins and outs of each subject, explain why they all matter when it...
View ArticleJoker, Facestealer and Coper banking malwares on Google Play store
Google Play Store is typically considered to be one of the safest sources for users to find and install android apps. However, threat actors continue to evolve their tactics and are able to...
View ArticleManage Your Zscaler Infrastructure as Code Using HashiCorp Terraform
Infrastructure as Code (IaC) The security world understands the value of automation. Eliminating manual tasks and automatically updating policies based on environmental changes reduces administrative...
View ArticleZero Trust Identity Pillar: Truly Looking at the Whole Person
This post is the fifth in a series examining how Zscaler supports the move to zero trust as defined by CISA. Identity is core to the implementation of zero trust. The Department of Homeland Security...
View ArticleHow AI is Useful — and Not Useful — for Cybersecurity
This article was originally posted on Dark Reading in June 2022. Artificial intelligence has advanced greatly in the past decade. On my phone, I'm reading Apple and Google news that is well-tailored to...
View ArticleHow We Rolled Out Zero Trust to Support Our Empowerment Culture
As a fast-moving global consumer goods company operating in 25 countries across Asia and Africa, the products in our brand portfolio touch the lives of one in three Indians. That’s why our technology...
View ArticleM365 Outage Detected By Zscaler Digital Experience (ZDX) Averts Business...
Zscaler Digital Experience detects outage At 6:30 a.m. (GMT +530) on July 21, 2022, Zscaler’s Digital Experience (ZDX) monitoring solution saw a substantial unexpected drop in the ZDX score for M365...
View ArticleIDC Analyst Brief: Securely Enabling Modern Business Requires a Zero Trust...
The majority of security architectures in use today were built to protect users who worked in a corporate office, and applications and data that resided in a centralized data center. But the world has...
View ArticleZero Trust Data Pillar: Understand and Protect
This post is the sixth in a series examining how Zscaler supports the move to zero trust as defined by CISA. The protection of data is the key driver behind the implementation of a Zero Trust...
View ArticleAWS IAM Roles Anywhere ~ IAM Risks Anywhere?
AWS recently announced a new revolutionary Identity and Access Management (IAM) feature - IAM Roles Anywhere. This feature allows workloads (or any certificate holding entity, for that matter) outside...
View ArticleHow to Simplify and Accelerate Remote Access, M&A Onboarding, and the Zero...
Better security does more than stop threats. It also simplifies and accelerates business and IT processes, allowing your company to transform as needed to thrive and grow. For many of our customers,...
View ArticleRaccoon Stealer v2: The Latest Generation of the Raccoon Family
Introduction Raccoon is a malware family that has been sold as malware-as-a-service on underground forums since early 2019. In early July 2022, a new variant of this malware was released. The new...
View ArticleAnalysis of Adobe Acrobat Reader Javascript Doc.print() Use-After-Free...
In July 2022, Adobe released a security update for vulnerabilities in Adobe Acrobat and Reader. The update fixed a vulnerability that is identified as CVE-2022-34233 discovered by Zscaler’s ThreatLabz....
View ArticleZIA Achieves Zero Trust Security-as-a-Service FedRAMP High Authorization
I am proud to share that the FedRAMP Joint Authorization Board (JAB) has announced that Zscaler Internet Access (ZIA) achieved High Authority to Operate. This federal government certification...
View Article