Mentor, coach, sponsor: How women get into leading positions in the IT industry
In most industries, gender parity among employees is still far from equality. The Fortune Global 500 list, published in December 2022, shows that only 24 of the world's 500 largest brands (just 4.8%)...
View ArticleNew IPSec Traffic Forwarding Guidance for Zscaler Customers
Key points: Zscaler recommends using IKEv2 protocol wherever possible as it is faster, more secure, and more resilient than IKEv1 Zscaler recommends using AES-GCM encryption rather than NULL encryption...
View ArticleNevada Ransomware: Yet Another Nokayawa Variant
Key Points Nevada ransomware was advertised in criminal forums in December 2022 as part of a new ransomware-as-a-service affiliate program Nevada is written in the Rust programming language with...
View ArticleHow to Cut IT Costs with Zscaler Part 4: Improving User Productivity
Being responsible with financial resources has always been a concern for companies the world over. But with the economic uncertainty of the last few years, organizations have increased their focus on...
View ArticleInternational Women's Day 2023: Shaping the Future of Women in Tech
An organization’s success is forged by its people, and the more diverse a workforce, the better prepared a business is to tackle complex problems. From creative minds and skilled communicators to...
View ArticleWhat’s Next for ZTNA? New Insights from the Enterprise Strategy Group
Do you feel like you’ve squeezed a decade's worth of digital transformation into the last three years? I certainly do. As evidence, take a look at the before and after of my home office. It went from a...
View ArticleReflecting on Gender Equity as a Woman in Technology
International Women’s Day and Women’s History Month commemorate the progress women have made toward equality and raising awareness of the need for continued progress. We’ve achieved some fantastic...
View ArticleOne True Zero Live shows the way to holistic transformation
As this year’s One True Zero Live Roadshow travels across Europe, the community will once again come together to discuss the versatility of a zero trust-based IT infrastructure. As companies move to...
View ArticleThe Impact of Public Cloud Across Your Organization
Compliance – com·pli·ance /kəmˈplīəns/ – “The state or fact of according with or meeting rules or standards.” In today’s environment, it is hard to escape compliance. Regulated industries like...
View ArticleTake Cloud-Native Security to the Next Level with Integrated DLP and Threat...
Securing public cloud environments with tools like Cloud Native Application Protection Platforms (CNAPP) has become a top priority for InfoSec leaders. In fact, cloud security spending has increased...
View ArticleZscaler experiences no impact from SVB closure
As most of you have seen in the news, Silicon Valley Bank (SVB) was closed by regulators over concerns about its solvency. While this failure has affected SVB clients, many of whom are venture...
View ArticleCoverage Advisory for CVE-2023-23397: Microsoft Outlook Elevation of...
Background: On 14th March 2023, Microsoft released a security update guide for a critical severity vulnerability CVE-2023-23397. This vulnerability targets Microsoft Outlook and allows NTLM credentials...
View ArticleTake Cloud-Native Security to the Next Level with Integrated DLP and Threat...
Securing public cloud environments with tools like Cloud Native Application Protection Platforms (CNAPP) has become a top priority for InfoSec leaders. In fact, cloud security spending has increased...
View ArticlePositioning Zscaler Workload Communications for a Growing Business with AWS...
Zscaler Workload Communications helps businesses secure the connectivity of their cloud workloads. Whether connecting workloads to the internet, or to other cloud workloads, you can use Workload...
View ArticleThe Unintentional Leak: A glimpse into the attack vectors of APT37
Summary At Zscaler ThreatLabz, we have been closely monitoring the tools, techniques and procedures (TTPs) of APT37 (also known as ScarCruft or Temp.Reaper) - a North Korea-based advanced persistent...
View ArticleHow to Cut IT Costs with Zscaler Part 5: Streamlining M&A
This blog series discusses the various ways that organizations can save money by retiring their perimeter-based network and security architectures and embracing a zero trust architecture powered by...
View ArticleZscaler, NACD Partner to Advance Boards’ Cyber Understanding
The SEC’s intent to standardize cybersecurity reporting rules for public companies has caused business leaders to reevaluate their board communications. Board members are increasingly eager to better...
View ArticleLeading & Learning: How to Head a Corporate ERG
“Learn continually—there’s always “one more thing” to learn!” - Steve Jobs A journey of a thousand miles begins with a single step. My journey began in India, where I was born and raised in a...
View ArticleBeyond the Perimeter 2023: Context-driven Security for Enhanced Protection
The recent explosion of hybrid work and the massive shift of business assets and activities to the cloud have helped organizations quickly adopt a flexible way of working. IT and security teams have...
View ArticleThe Impact of Public Cloud Across Your Organization (Part Four)
I have a confession…I have never been able to successfully see an autostereogram clearly. An autostereogram is one of those images that look like a blurry mess, but if you stare at it and change your...
View Article