Cal-Secure: How California is Charting a Course for Whole of State Cybersecurity
Zscaler recently hosted a webinar on Cal-Secure, the State of California’s first multi-year cybersecurity roadmap. The webinar featured several distinguished speakers including Vitaliy Panych, State...
View ArticleEnterprise Security Predictions for 2023
Across industries, the trend toward hyper-distribution of people, applications, and data is a phenomenon that holds both promise and peril. On one hand, we can connect talent, software, and information...
View ArticleGiving Data Protection a good (MIP) Label
Whether you’re a Microsoft shop or not, chances are you’ve heard of Microsoft Information Protection (MIP), or its former designation; Azure Information Protection (AIP). Designed to help identify and...
View ArticleA New and Critical Layer to Protect Data: SaaS Supply Chain Security
Today, Zscaler added another layer of security to protect customer data with the acquisition of Canonic Security, an innovative startup focusing on a critical new technology space: SaaS Supply Chain...
View ArticleHow to Cut IT Costs with Zscaler Part 2: Optimizing Technology Costs
Fiscal responsibility and cost-effective security have always been a priority for businesses. During times of economic uncertainty, the pressure IT leaders face to tighten budgets, reduce costs, and...
View ArticleHavoc Across the Cyberspace
Zscaler ThreatLabz research team observed a new campaign targeting a Government organization in which the threat actors utilized a new Command & Control (C2) framework named Havoc. While C2...
View ArticleZscaler Posture Control and Splunk Integration: Cloud Transformation in the SOC
Cloud technologies with new development practices have significantly increased the velocity of fixes, enhancements, and features. In some environments, developers are making changes and release code to...
View Article2022 Cloud (In)Security Report
The convenience and ease of public cloud technology have changed our world, enabling scalable business operations, work-from-anywhere, and increased productivity everywhere. As public cloud adoption...
View ArticlePrivate Equity and Cyber Resiliency - A Zero Trust Approach
After a record-breaking M&A year in 2021, 2022 saw many investors slowing the pace of deal activity and bringing transaction volumes back down to pre-pandemic levels. One area that has not seen a...
View ArticleThe Impact of Public Cloud Across Your Organization
In this second blog of our 6 part series on The Impact of Public Cloud Across Your Organization, we are going to look at Cloud Native Application Protection Platforms (CNAPP) through the lens of a...
View ArticleFrom Seller to Buyer: Rethinking the Process
As the year begins, I’m thinking about which sales approach for cloud or SECaaS offerings will be most successful in 2023. Considering the macroeconomic climate, I believe it is crucial for sales...
View ArticleTechnical Analysis of Rhadamanthys Obfuscation Techniques
Key Points Rhadamanthys is an information stealer that consists of two components, the loader and the main module (responsible for exfiltrating collected credentials). The malware implements complex...
View ArticleAchieve Dynamic Zero Trust Services Automation with Zscaler and...
Migrating to the cloud offers organizations greater scale and agility for deploying applications. But with that agility comes greater complexity and a higher volume of manual tasks. These challenges...
View ArticleMobile World Congress Will Show How to Deliver on the 5G promise
The hype around 5G has died off—at least that was the impression given by the reporting from the CES show earlier this year. One of the big complaints from the event was that 5G was not as present as...
View ArticleThe Top Data Protection Challenges for an Enterprise
As organizations navigate the digital landscape, protecting sensitive data from breaches and insider threats, while adhering to regulatory compliance, has become a paramount concern. As more and more...
View ArticleHow to Cut IT Costs with Zscaler Part 3: Increasing Operational Efficiency
In the current economic climate, it is not surprising that the majority of IT leaders are actively looking for ways to shore up their organizations to weather financial downturns, while also...
View ArticleHow to Balance Cloud App Productivity and Security with Zscaler
Your users access hundreds of sanctioned and unsanctioned cloud applications every day. They constantly upload and download data that needs protection. This presents challenges to IT and security teams...
View ArticleSnip3 Crypter Reveals New TTPs Over Time
Zscaler ThreatLabz researchers observed multiple threat campaigns utilizing the Snip3 crypter, a multi-stage remote access trojan (RAT) loader with new TTPs and available since 2021 as a...
View ArticleOneNote: A Growing Threat for Malware Distribution
Attackers are increasingly using OneNote documents to distribute malware, due to the heightened security measures against macro-based attacks and the widespread adoption and popularity of the platform....
View ArticleZero Trust Citizen Access
As government applications move to the cloud and more and more services are provided digitally, the number of citizens accessing services online has increased dramatically. With many organizations...
View Article