Okta Source Code Breach: How to Evaluate the Impact & Protect your Organization
What happened in the Okta source code breach? Okta, a leading provider of authentication services and Identity and Access Management (IAM) solutions, confirmed that its private GitHub repositories were...
View ArticleCMMC Compliance Made Easy: How We created an Enclave for Secure Research That...
The University of South Carolina is in the process of strategically positioning itself as a research-oriented hub of innovation that is ready, willing, and able to accept new government grant projects,...
View ArticleTrade with caution - bad guys are stealing
Threats continue to evolve in their complexity and scale as cyber criminals regularly come up with new ideas and find ways to target their victims. Modern information stealer families such as RedLine,...
View ArticleA 2022 Year-end Recap on Cloud Threats
As the year is coming to an end, I can’t help but take a walk down memory lane to reminisce and reflect on the journey of the cloud threat landscape. Here’s my take on this 2022 recap of cloud threats....
View ArticleIn Our Modern Workplace, Security and Sustainability Go Hand in Hand
As an Enterprise Architect, I’m always thinking about cyber resiliency, reducing risk, and protecting profitability. These concerns were our main motivations when we set out to modernize our workplace...
View ArticleHow Zscaler Improves Remote Radiology
Many healthcare organizations operate in a regional or semi-regional model with a large percentage of workers within a 100-mile radius. Mission critical healthcare applications and services are...
View Article13 Reasons Why Cybercrime Isn’t Slowing Down Any Time Soon
2022 was characterized by global risks from population pressures and climate change to political conflicts and industrial supply chain challenges. Cybercriminals used this turmoil to exploit these...
View Article13 Reasons Why Cybercrime Isn’t Slowing Down Any Time Soon
2022 was characterized by global risks from population pressures and climate change to political conflicts and industrial supply chain challenges. Cybercriminals used this turmoil to exploit these...
View ArticleZero Trust Success Stories from Small and Medium-Sized Organizations
The cloud and hybrid work world is here to stay. Long gone are the days of castle-and-moat security architectures. Perimeter-based security worked when users, apps, and data were all on premises, but...
View Article2023 Hybrid Workforce Predictions
The demand for remote work has only grown since the serious transition began almost three years ago. Organizations have seen the benefits of working remotely, but have also been transitioning into a...
View ArticleHere Comes the Hybrid Office. And It’s Going To Be a Nightmare for IT Leaders.
As we move into a new phase of the pandemic, many companies are grappling with how to bring their employees back after more than two years of being untethered from the office. Survey after survey shows...
View ArticleZero Trust is Here to Stay. Is Your Organization Ready?
Zero trust is a concept whose time has come. Organizations are turning to zero trust to secure their organizations and enable the hybrid workplace. Yet, if you listen to all the marketing hype, you’re...
View ArticleLeveraging Zscaler for your next IT M&A integration
2022 has seen a significant global economic downturn that’s been fueled by a variety of factors including: Russia-Ukraine war, rising levels of inflation, volatility / instability in the financial...
View ArticleZero Trust Predictions for 2023
2022 was the most challenging year for everyone involved in the cybersecurity industry. Throughout the year, ransomware attacks continued to be one of the biggest threats worldwide. From nation-states...
View ArticleAlbum Stealer Targets Facebook Adult-Only Content Seekers
Information stealing malware is commonly observed in the landscape of cyber attacks today. Zscaler ThreatLabz team has discovered many new types of stealer malware families across different attack...
View Article2023 Top Cloud Security Predictions
Cloud transformation has become a strategic advantage for many organizations, providing convenience, cost savings, and near-permanent uptimes as compared to on-premises infrastructure. At the same...
View ArticleZero Trust with Zero Hassle - Part 2
In part 1 of this blog series on deployment best practices, we reviewed the three key success factors to streamline the transformation to zero trust architecture: a solution that’s menu-driven,...
View ArticleThe role of security service edge in MOL Group’s IoT-enabled smart building...
When MOL Group commissioned renowned architectural firm Foster + Partners to build the most modern office building in the Central and Eastern European (CEE) region, we had a bold vision in mind. Our...
View ArticleDebunking 5 Myths About Zero Trust
Zero trust has largely evolved from concept to reality since it was first introduced to become a widely accepted and effective approach to cybersecurity. While companies have started to adopt zero...
View ArticleZero Trust with Zero Hassle - Part 2
In part 1 of this blog series on deployment best practices, we reviewed the three key success factors to streamline the transformation to zero trust architecture: a solution that’s menu-driven,...
View Article