Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Cal-Secure: How California is Charting a Course for Whole of State Cybersecurity

Zscaler recently hosted a webinar on Cal-Secure, the State of California’s first multi-year cybersecurity roadmap. The webinar featured several distinguished speakers including Vitaliy Panych, State...

View Article


Enterprise Security Predictions for 2023

Across industries, the trend toward hyper-distribution of people, applications, and data is a phenomenon that holds both promise and peril. On one hand, we can connect talent, software, and information...

View Article


Giving Data Protection a good (MIP) Label

Whether you’re a Microsoft shop or not, chances are you’ve heard of Microsoft Information Protection (MIP), or its former designation; Azure Information Protection (AIP). Designed to help identify and...

View Article

A New and Critical Layer to Protect Data: SaaS Supply Chain Security

Today, Zscaler added another layer of security to protect customer data with the acquisition of Canonic Security, an innovative startup focusing on a critical new technology space: SaaS Supply Chain...

View Article

How to Cut IT Costs with Zscaler Part 2: Optimizing Technology Costs

Fiscal responsibility and cost-effective security have always been a priority for businesses. During times of economic uncertainty, the pressure IT leaders face to tighten budgets, reduce costs, and...

View Article


Havoc Across the Cyberspace

Zscaler ThreatLabz research team observed a new campaign targeting a Government organization in which the threat actors utilized a new Command & Control (C2) framework named Havoc. While C2...

View Article

Zscaler Posture Control and Splunk Integration: Cloud Transformation in the SOC

Cloud technologies with new development practices have significantly increased the velocity of fixes, enhancements, and features. In some environments, developers are making changes and release code to...

View Article

2022 Cloud (In)Security Report

The convenience and ease of public cloud technology have changed our world, enabling scalable business operations, work-from-anywhere, and increased productivity everywhere. As public cloud adoption...

View Article


Private Equity and Cyber Resiliency - A Zero Trust Approach

After a record-breaking M&A year in 2021, 2022 saw many investors slowing the pace of deal activity and bringing transaction volumes back down to pre-pandemic levels. One area that has not seen a...

View Article


The Impact of Public Cloud Across Your Organization

In this second blog of our 6 part series on The Impact of Public Cloud Across Your Organization, we are going to look at Cloud Native Application Protection Platforms (CNAPP) through the lens of a...

View Article

From Seller to Buyer: Rethinking the Process

As the year begins, I’m thinking about which sales approach for cloud or SECaaS offerings will be most successful in 2023. Considering the macroeconomic climate, I believe it is crucial for sales...

View Article

Technical Analysis of Rhadamanthys Obfuscation Techniques

Key Points Rhadamanthys is an information stealer that consists of two components, the loader and the main module (responsible for exfiltrating collected credentials). The malware implements complex...

View Article

Achieve Dynamic Zero Trust Services Automation with Zscaler and...

Migrating to the cloud offers organizations greater scale and agility for deploying applications. But with that agility comes greater complexity and a higher volume of manual tasks. These challenges...

View Article


Mobile World Congress Will Show How to Deliver on the 5G promise

The hype around 5G has died off—at least that was the impression given by the reporting from the CES show earlier this year. One of the big complaints from the event was that 5G was not as present as...

View Article

The Top Data Protection Challenges for an Enterprise

As organizations navigate the digital landscape, protecting sensitive data from breaches and insider threats, while adhering to regulatory compliance, has become a paramount concern. As more and more...

View Article


How to Cut IT Costs with Zscaler Part 3: Increasing Operational Efficiency

In the current economic climate, it is not surprising that the majority of IT leaders are actively looking for ways to shore up their organizations to weather financial downturns, while also...

View Article

How to Balance Cloud App Productivity and Security with Zscaler

Your users access hundreds of sanctioned and unsanctioned cloud applications every day. They constantly upload and download data that needs protection. This presents challenges to IT and security teams...

View Article


Snip3 Crypter Reveals New TTPs Over Time

Zscaler ThreatLabz researchers observed multiple threat campaigns utilizing the Snip3 crypter, a multi-stage remote access trojan (RAT) loader with new TTPs and available since 2021 as a...

View Article

OneNote: A Growing Threat for Malware Distribution

Attackers are increasingly using OneNote documents to distribute malware, due to the heightened security measures against macro-based attacks and the widespread adoption and popularity of the platform....

View Article

Zero Trust Citizen Access

As government applications move to the cloud and more and more services are provided digitally, the number of citizens accessing services online has increased dramatically. With many organizations...

View Article
Browsing all 1471 articles
Browse latest View live