Why Zero Trust is Good for Business, Not Just Security
Humans don’t often like the idea of change. So, when the business asks IT leaders to adopt cloud quickly, and reduce business risk while doing so, a natural fear arises. How do I adapt? Am I relevant...
View ArticleThanks to Gartner, We're on Cloud 9
My team received some exciting news this week and I am thrilled to share it: Gartner released its annual Secure Web Gateways Magic Quadrant (MQ) report, and Zscaler was named a Leader for the ninth...
View ArticleNetSupport RAT installed via fake update notices
Recently, the Zscaler ThreatLabZ team came across two campaigns designed to trick users into downloading a Remote Access Trojan (RAT) via a fake Flash Player update and a font update. These campaigns...
View ArticleGiving Back to our Community
Silicon Valley may seem like it is enjoying unprecedented prosperity, but a record number of kids, families, and seniors rely on food banks and public services for food every month, and the number is...
View ArticleA Tour of the Data Privacy Regulation Universe
Data privacy regulations are here to stay, and the way companies comply with these regulations will become a point of competitive differentiation. To become and stay compliant, companies must keep...
View ArticleScamming and Smishing while Shopping
A few weeks ago, the witches and skeletons that decorated shop windows for Halloween were swept aside and replaced with reindeer and jolly elves. Fir trees supplanted the pumpkins and “Jingle Bells”...
View ArticleDigital Experience Monitoring in the Age of Cloud and Mobility
Cloud and mobility are leading catalysts for digital transformation in today's modern enterprise. But a fast user experience is key to the success of such initiatives and, if your cloud strategy is...
View ArticleA New Wave of Stalkerware Apps
Recently, the U.S. Department of Homeland Security (DHS) released an article warning mobile users about the increasing use of spyware apps. The US-CERT (Computer Emergency Response Team) issued the...
View ArticleChief Data Privacy Officer: A Canonical Job Description
In the years ahead, complying with data privacy regulations is going to be an extreme challenge for companies as they attempt to balance profits, reckon with existing and soon-to-emerge regulations...
View ArticleHow much traffic is being generated by things (IoT)?
More than you think. You've probably heard this quote repeatedly in the past few years: “Gartner predicts that the number of IoT devices used worldwide will reach 20.4 billion by 2020.” Indeed,...
View ArticleA Big Day for Phishing
We hope you enjoyed your own Black Friday and found everything you wanted as you were shopping the sales. The threat actors certainly attempted to take advantage of the zeal of holiday shoppers. As a...
View ArticleAI and ML in cybersecurity: Too much hype or not enough?
It seems that every vendor in the cybersecurity universe is touting how their products have been enhanced with artificial intelligence (AI) and machine learning (ML) capabilities. While some of these...
View ArticleA look at the recent BuleHero botnet payload
Ever since the 2017 outbreak of WannaCry, NotPetya, and BadRabbit ransomware, as well as the WannaMine cryptocurrency campaign, there has been a steep increase in malware that uses the now infamous...
View ArticleA True SASE Solution Requires a Cloud-First Architecture
Traditional network architectures are rapidly becoming outmoded. They were built for bygone days when applications and other corporate resources were housed in the data center—the go-to point of access...
View ArticleDigital transformation and WAN: What does the future hold?
It has been around for years and has done an admirable job of helping businesses communicate. But, does a long-standing piece of legacy technology still have a place in today’s ever-changing business...
View Article