Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Phishing attacks abusing appspot.com and web.app domains on Google Cloud

View Article


Magecart hits again, leveraging compromised sites and newly registered domains

View Article


Fileless malware campaign roundup

View Article

2019 Zero Trust Adoption Report: What Your Peers are Doing Around Zero Trust

View Article

Why You Still Need a Firewall When Deploying Office 365

View Article


Why Zero Trust is Good for Business, Not Just Security

Humans don’t often like the idea of change. So, when the business asks IT leaders to adopt cloud quickly, and reduce business risk while doing so, a natural fear arises. How do I adapt? Am I relevant...

View Article

Thanks to Gartner, We're on Cloud 9

My team received some exciting news this week and I am thrilled to share it: Gartner released its annual Secure Web Gateways Magic Quadrant (MQ) report, and Zscaler was named a Leader for the ninth...

View Article

NetSupport RAT installed via fake update notices

Recently, the Zscaler ThreatLabZ team came across two campaigns designed to trick users into downloading a Remote Access Trojan (RAT) via a fake Flash Player update and a font update. These campaigns...

View Article


Giving Back to our Community

Silicon Valley may seem like it is enjoying unprecedented prosperity, but a record number of kids, families, and seniors rely on food banks and public services for food every month, and the number is...

View Article


A Tour of the Data Privacy Regulation Universe

Data privacy regulations are here to stay, and the way companies comply with these regulations will become a point of competitive differentiation. To become and stay compliant, companies must keep...

View Article

Scamming and Smishing while Shopping

A few weeks ago, the witches and skeletons that decorated shop windows for Halloween were swept aside and replaced with reindeer and jolly elves. Fir trees supplanted the pumpkins and “Jingle Bells”...

View Article

Digital Experience Monitoring in the Age of Cloud and Mobility

Cloud and mobility are leading catalysts for digital transformation in today's modern enterprise. But a fast user experience is key to the success of such initiatives and, if your cloud strategy is...

View Article

A New Wave of Stalkerware Apps

Recently, the U.S. Department of Homeland Security (DHS) released an article warning mobile users about the increasing use of spyware apps.  The US-CERT (Computer Emergency Response Team) issued the...

View Article


Chief Data Privacy Officer: A Canonical Job Description

In the years ahead, complying with data privacy regulations is going to be an extreme challenge for companies as they attempt to balance profits, reckon with existing and soon-to-emerge regulations...

View Article

How much traffic is being generated by things (IoT)?

More than you think. You've probably heard this quote repeatedly in the past few years: “Gartner predicts that the number of IoT devices used worldwide will reach 20.4 billion by 2020.” Indeed,...

View Article


A Big Day for Phishing

We hope you enjoyed your own Black Friday and found everything you wanted as you were shopping the sales. The threat actors certainly attempted to take advantage of the zeal of holiday shoppers. As a...

View Article

AI and ML in cybersecurity: Too much hype or not enough?

It seems that every vendor in the cybersecurity universe is touting how their products have been enhanced with artificial intelligence (AI) and machine learning (ML) capabilities. While some of these...

View Article


A look at the recent BuleHero botnet payload

Ever since the 2017 outbreak of WannaCry, NotPetya, and BadRabbit ransomware, as well as the WannaMine cryptocurrency campaign, there has been a steep increase in malware that uses the now infamous...

View Article

A True SASE Solution Requires a Cloud-First Architecture

Traditional network architectures are rapidly becoming outmoded. They were built for bygone days when applications and other corporate resources were housed in the data center—the go-to point of access...

View Article

Digital transformation and WAN: What does the future hold?

It has been around for years and has done an admirable job of helping businesses communicate. But, does a long-standing piece of legacy technology still have a place in today’s ever-changing business...

View Article
Browsing all 1471 articles
Browse latest View live