Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Zscaler Associates in India Return to Office

Zscaler reopened offices in India on May 2, 2022, across multiple locations including Bangalore, Pune, and Mohali. After almost two years of working from home, associates returned to the office with...

View Article


Best Practices for Reducing Public Cloud Security Risk with CNAPP

Cloud security is currently addressed by a wide variety of security solutions. This patchwork approach creates problems for security teams as these tools are siloed, with each offering its own narrow,...

View Article


Zero Trust Device Pillar: Ensuring the Device is More Trustworthy Than the User

This post is the fourth in a series examining how Zscaler supports the move to zero trust as defined by CISA. The Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency...

View Article

Rise in Qakbot attacks traced to evolving threat techniques

Active since 2008, Qakbot, also known as QBot, QuackBot and Pinkslipbot, is a common trojan malware designed to steal passwords. This pervasive threat spreads using an email-driven botnet that inserts...

View Article

Applying Knowledge Graphs to Public Cloud Security

Graph theory has an interesting history, dating back to the 1700s when Leonhard Euler, who you might remember from Differential Equations in college, solved the Konigsberg bridge problem. The bridge...

View Article


Join Zscaler at AWS re:Inforce 2022

The re:Inforce conference is one of AWS’s marquee events primarily focused on cybersecurity. At this annual event, you’ll be able to hear from experts in the field, learn best practices, and discover...

View Article

The Zscaler Data Protection Tour: Controlling the Use of Shadow IT

In this blog series, we are taking readers on a tour of the numerous challenges to enterprise data security. As we do so, we detail the ins and outs of each subject, explain why they all matter when it...

View Article

Joker, Facestealer and Coper banking malwares on Google Play store

Google Play Store is typically considered to be one of the safest sources for users to find and install android apps. However, threat actors continue to evolve their tactics and are able to...

View Article


Manage Your Zscaler Infrastructure as Code Using HashiCorp Terraform

Infrastructure as Code (IaC) The security world understands the value of automation. Eliminating manual tasks and automatically updating policies based on environmental changes reduces administrative...

View Article


Zero Trust Identity Pillar: Truly Looking at the Whole Person

This post is the fifth in a series examining how Zscaler supports the move to zero trust as defined by CISA. Identity is core to the implementation of zero trust. The Department of Homeland Security...

View Article

How AI is Useful — and Not Useful — for Cybersecurity

This article was originally posted on Dark Reading in June 2022. Artificial intelligence has advanced greatly in the past decade. On my phone, I'm reading Apple and Google news that is well-tailored to...

View Article

How We Rolled Out Zero Trust to Support Our Empowerment Culture

As a fast-moving global consumer goods company operating in 25 countries across Asia and Africa, the products in our brand portfolio touch the lives of one in three Indians. That’s why our technology...

View Article

M365 Outage Detected By Zscaler Digital Experience (ZDX) Averts Business...

Zscaler Digital Experience detects outage At 6:30 a.m. (GMT +530) on July 21, 2022, Zscaler’s Digital Experience (ZDX) monitoring solution saw a substantial unexpected drop in the ZDX score for M365...

View Article


IDC Analyst Brief: Securely Enabling Modern Business Requires a Zero Trust...

The majority of security architectures in use today were built to protect users who worked in a corporate office, and applications and data that resided in a centralized data center. But the world has...

View Article

Zero Trust Data Pillar: Understand and Protect

This post is the sixth in a series examining how Zscaler supports the move to zero trust as defined by CISA. The protection of data is the key driver behind the implementation of a Zero Trust...

View Article


AWS IAM Roles Anywhere ~ IAM Risks Anywhere?

AWS recently announced a new revolutionary Identity and Access Management (IAM) feature - IAM Roles Anywhere. This feature allows workloads (or any certificate holding entity, for that matter) outside...

View Article

How to Simplify and Accelerate Remote Access, M&A Onboarding, and the Zero...

Better security does more than stop threats. It also simplifies and accelerates business and IT processes, allowing your company to transform as needed to thrive and grow. For many of our customers,...

View Article


Raccoon Stealer v2: The Latest Generation of the Raccoon Family

Introduction Raccoon is a malware family that has been sold as malware-as-a-service on underground forums since early 2019. In early July 2022, a new variant of this malware was released. The new...

View Article

Analysis of Adobe Acrobat Reader Javascript Doc.print() Use-After-Free...

In July 2022, Adobe released a security update for vulnerabilities in Adobe Acrobat and Reader. The update fixed a vulnerability that is identified as CVE-2022-34233 discovered by Zscaler’s ThreatLabz....

View Article

ZIA Achieves Zero Trust Security-as-a-Service FedRAMP High Authorization

I am proud to share that the FedRAMP Joint Authorization Board (JAB) has announced that Zscaler Internet Access (ZIA) achieved High Authority to Operate. This federal government certification...

View Article
Browsing all 1471 articles
Browse latest View live