Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Okta Source Code Breach: How to Evaluate the Impact & Protect your Organization

What happened in the Okta source code breach? Okta, a leading provider of authentication services and Identity and Access Management (IAM) solutions, confirmed that its private GitHub repositories were...

View Article


CMMC Compliance Made Easy: How We created an Enclave for Secure Research That...

The University of South Carolina is in the process of strategically positioning itself as a research-oriented hub of innovation that is ready, willing, and able to accept new government grant projects,...

View Article


Trade with caution - bad guys are stealing

Threats continue to evolve in their complexity and scale as cyber criminals regularly come up with new ideas and find ways to target their victims. Modern information stealer families such as RedLine,...

View Article

A 2022 Year-end Recap on Cloud Threats

As the year is coming to an end, I can’t help but take a walk down memory lane to reminisce and reflect on the journey of the cloud threat landscape. Here’s my take on this 2022 recap of cloud threats....

View Article

In Our Modern Workplace, Security and Sustainability Go Hand in Hand

As an Enterprise Architect, I’m always thinking about cyber resiliency, reducing risk, and protecting profitability. These concerns were our main motivations when we set out to modernize our workplace...

View Article


How Zscaler Improves Remote Radiology

Many healthcare organizations operate in a regional or semi-regional model with a large percentage of workers within a 100-mile radius. Mission critical healthcare applications and services are...

View Article

13 Reasons Why Cybercrime Isn’t Slowing Down Any Time Soon

2022 was characterized by global risks from population pressures and climate change to political conflicts and industrial supply chain challenges. Cybercriminals used this turmoil to exploit these...

View Article

13 Reasons Why Cybercrime Isn’t Slowing Down Any Time Soon

2022 was characterized by global risks from population pressures and climate change to political conflicts and industrial supply chain challenges. Cybercriminals used this turmoil to exploit these...

View Article


Zero Trust Success Stories from Small and Medium-Sized Organizations

The cloud and hybrid work world is here to stay. Long gone are the days of castle-and-moat security architectures. Perimeter-based security worked when users, apps, and data were all on premises, but...

View Article


2023 Hybrid Workforce Predictions

The demand for remote work has only grown since the serious transition began almost three years ago. Organizations have seen the benefits of working remotely, but have also been transitioning into a...

View Article

Here Comes the Hybrid Office. And It’s Going To Be a Nightmare for IT Leaders.

As we move into a new phase of the pandemic, many companies are grappling with how to bring their employees back after more than two years of being untethered from the office. Survey after survey shows...

View Article

Zero Trust is Here to Stay. Is Your Organization Ready?

Zero trust is a concept whose time has come. Organizations are turning to zero trust to secure their organizations and enable the hybrid workplace. Yet, if you listen to all the marketing hype, you’re...

View Article

Leveraging Zscaler for your next IT M&A integration

2022 has seen a significant global economic downturn that’s been fueled by a variety of factors including: Russia-Ukraine war, rising levels of inflation, volatility / instability in the financial...

View Article


Zero Trust Predictions for 2023

2022 was the most challenging year for everyone involved in the cybersecurity industry. Throughout the year, ransomware attacks continued to be one of the biggest threats worldwide. From nation-states...

View Article

Album Stealer Targets Facebook Adult-Only Content Seekers

Information stealing malware is commonly observed in the landscape of cyber attacks today. Zscaler ThreatLabz team has discovered many new types of stealer malware families across different attack...

View Article


2023 Top Cloud Security Predictions

Cloud transformation has become a strategic advantage for many organizations, providing convenience, cost savings, and near-permanent uptimes as compared to on-premises infrastructure. At the same...

View Article

Zero Trust with Zero Hassle - Part 2

In part 1 of this blog series on deployment best practices, we reviewed the three key success factors to streamline the transformation to zero trust architecture: a solution that’s menu-driven,...

View Article


The role of security service edge in MOL Group’s IoT-enabled smart building...

When MOL Group commissioned renowned architectural firm Foster + Partners to build the most modern office building in the Central and Eastern European (CEE) region, we had a bold vision in mind. Our...

View Article

Debunking 5 Myths About Zero Trust

Zero trust has largely evolved from concept to reality since it was first introduced to become a widely accepted and effective approach to cybersecurity. While companies have started to adopt zero...

View Article

Zero Trust with Zero Hassle - Part 2

In part 1 of this blog series on deployment best practices, we reviewed the three key success factors to streamline the transformation to zero trust architecture: a solution that’s menu-driven,...

View Article
Browsing all 1471 articles
Browse latest View live