Security Advisory for FreeBSD Ping Stack-Based Overflow CVE-2022-23093
Background On Dec 01, 2022, a stack overflow vulnerability CVE-2022-23093 was found in the FreeBSD operating system (all supported versions) ping utility. The issue is a buffer overflow vulnerability...
View ArticleBreaking Barriers and Reflecting on Representation at AfroTech 2022
Diversity, inclusion, and belonging are all values we highlight and honor at Zscaler, but it’s no secret that there is still progress to be made. The annual AfroTech Conference – the largest Black tech...
View ArticleWhy Traditional IAM Security Tools Fall Short
Over the last few years, many organizations moved a huge number of IT assets to the public cloud. However, while the cloud provides many benefits, it also comes with a set of security challenges....
View ArticleSMS scams trick Indian banking customers into installing malicious apps
Zscaler ThreatLabz researchers recently observed the rise of a sophisticated phishing campaign spreading via fake banking sites targeting big Indian banks like HDFC, AXIS, and SBI. The team will...
View ArticleSpoiler: New ThreatLabz Report Reveals Over 85% of Attacks Are Encrypted
Once upon a time, encrypted traffic was considered the safe, secure option for browsing and doing business online. Going back nine years to December 2013, the Google Transparency Report shows just 48%...
View ArticleWhat Does ChatGPT Have to Say About CNAPP?
ChatGPT has become the chat (no pun intended) of the century. So of course we had to test the power of it and see for ourselves. We simply asked ChatGPT what are its thoughts on CNAPP and here is its...
View ArticleCloud Workload Predictions for 2023
In 2022, we saw explosive transitions in the cloud security market - every aspect of the ecosystem, including vendors, products, and infrastructure went through a sea change. It gave birth to new...
View ArticleThe Zscaler Zero Trust Exchange: The One True Zero Trust Platform
For the past three decades, organizations have been building and optimizing complex, wide-area, hub-and-spoke networks, connecting users and branches to the data center over private networks. To access...
View ArticleReimaging Public Service by Leveraging the Zscaler Zero Trust Exchange
Like many mergers, the 2016 formation of the Department for Business, Energy and Industrial Strategy (BEIS) from two previously separate UK federal government departments offered the chance to innovate...
View ArticleZscaler Joins JCDC to Enhance Collective Cybersecurity Posture of U.S.
Actionable intelligence is critical to effectively combat cyber threats. It also requires a proactive, real-time collaboration between both public and private sectors. As part of our ongoing commitment...
View ArticleData Protection Predictions for 2023
It’s that time of the year – predictions! With the close of every year, it makes sense to take stock of where we’ve been and where the industry may be headed. When we think about some of the most...
View ArticleWhat Does ChatGPT Have to Say About CNAPP?
ChatGPT has become the chat (no pun intended) of the century. So of course we had to test the power of it and see for ourselves. We simply asked ChatGPT what are its thoughts on CNAPP and here is its...
View ArticleReimagining Public Service by Leveraging the Zscaler Zero Trust Exchange
Like many mergers, the 2016 formation of the Department for Business, Energy and Industrial Strategy (BEIS) from two previously separate UK federal government departments offered the chance to innovate...
View ArticleYour Secret Weapon for Cloud Compliance? It’s CNAPP.
Proving cloud compliance is an ongoing burden that many in our industry must shoulder. It’s often a manual process that must be repeated on a regular basis. For many organizations, there is more than...
View ArticleAre You Missing a Critical Component in Your Zero Trust Approach?
Recently, at an event with a bunch of other CISOs, the topic of zero trust arose as it always does, but the primary questions I heard asked around the room focused on technology: “What do you use for...
View ArticleNokoyawa Ransomware: Rust or Bust
Key Points Nokoyawa is a 64-bit Windows-based ransomware family that emerged in February 2022 The threat group behind Nokoyawa performs double extortion ransomware attacks: exfiltrating sensitive...
View ArticleMultiple ZPA Tenant User Access
The push for work-from-anywhere and the increasing need for a zero trust architecture (ZTA) significantly accelerated the adoption of Zscaler Private Access (ZPA) as a leading solution for many...
View ArticleSecuring a World of Possibility
When I started Zscaler 15 years ago, it was founded on the vision to create a world where the exchange of information is completely seamless and secure. I set out to create an iconic company that would...
View ArticleFedRAMP Legislation: Certify Once, Use Many Times
Last week the FedRAMP program achieved a significant milestone: Legislation authorizing the program into law was incorporated into the FY23 National Defense Authorization Act (NDAA). The bill is...
View ArticleDigital Experience Monitoring Predictions for 2023
This year we have seen a significant increase in businesses adopting strategic hybrid work environments and migrating mission-critical applications to the cloud. Combining work-from-anywhere with...
View Article