Exploring the New Department of Defense (DoD) Zero Trust Strategy
In October 2022, the Department of Defense (DoD) released a DoD Zero Trust Strategy document in which four key goals were identified including Zero Trust Cultural Adoption, DoD Information Systems...
View Article2023 Phishing Report Reveals 47.2% Surge in Phishing Attacks Last Year
Phishing attacks continue to be one of the most significant threats facing organizations today. As businesses increasingly rely on digital communication channels, cybercriminals exploit vulnerabilities...
View ArticleZscaler Launches New Innovations to Improve Best-In-Class DNS Security
To learn more about the top DNS threats facing organizations today (and what to do about them), check out the paper “Decoding Modern DNS Threats” At Zscaler, our mission is to enable seamless, secure...
View ArticleCXOs and Zero Trust: Seven Considerations for Successful Digital Transformation
“The most dangerous phrase in the language is: ‘we’ve always done it this way.’” Grace Hopper, Computer Scientist Business has changed dramatically over the last several years. To remain agile and...
View ArticleThe Hummaid Orphanage in Burkina Faso is Ready for Kids - Thanks to Zscaler...
On February 26, it was finally showtime: Opening day for the orphanage in Burkina Faso, Africa. Our small team of eight traveled to the facility 30km outside of Ouagadougou and reflected on our journey...
View ArticleThe Impact of Public Cloud Across Your Organization (Part Five)
The history of the term “DevOps” is a bit murky at best. In truth, there really isn’t even a single agreed-upon definition. However, most agree that somewhere between late 2006 and 2009, the principles...
View ArticleSmash PostScript Interpreters Using A Syntax-Aware Fuzzer
In 2022, Zscaler’s ThreatLabz performed vulnerability hunting for some of the most popular PostScript interpreters using a custom-built syntax-aware fuzzer. The PostScript interpreters that were...
View ArticleMastering IT Operational Excellence: Strategies for Improving Productivity...
Many organizations today are in the midst of improving end user productivity and reducing costs, but the approach has been to look at IT solutions in silos. As budgets tighten and IT operations...
View ArticleBeyond the Perimeter 2023: Context-driven Security for Comprehensive Zero...
Last week, the brightest minds at Zscaler and CrowdStrike teamed up to host Beyond the Perimeter 2023, the third edition of our security transformation series. The two-hour event showcased how Zscaler...
View ArticleThe Impact of Public Cloud Across Your Organization (Part Six)
We’ve been writing this series using the common metaphor of a “Journey”. This is certainly not a groundbreaking metaphor in the IT space. It seems enterprises are always on a journey somewhere. Since...
View ArticleZscaler and Leidos Collaborate on 5G Applications
We are excited to announce today that Zscaler and Leidos will prototype and evaluate 5G-enabled solutions for government agencies, defense organizations, and critical national infrastructure within...
View ArticleBeyond the Perimeter 2023: Context-driven Security for Comprehensive Zero...
On Tuesday, April 11, Zscaler and CrowdStrike hosted Beyond the Perimeter 2023, the third edition of our security transformation series. The event showcased how joint customers of Zscaler and...
View ArticleThe Top 5 Reasons to Attend Zenith Live ’23
Join us at Zenith Live ’23 to experience the latest zero trust security innovations, hear firsthand from industry thought leaders, and take part in exclusive technical sessions. Register by May 31 to...
View ArticleWhat's New with Zscaler Digital Experience: Greater Insights, Deeper...
First, a quick recap Before we unpack what’s new with Zscaler Digital Experience (ZDX), let’s quickly review how we got here. Apps, data, and employees are distributed Did you know that organizations...
View ArticleDrive Faster MTTR with the Latest Innovations in Zscaler Digital Experience
As we discussed in our announcement blog, Zscaler is continuing efforts to empower IT Operations and Service Desk teams to deliver flawless digital experiences. Many organizations are still struggling...
View ArticleDivide and Conquer the Pyramid of Pain for Multi-Cloud SecDataOps with...
One of the biggest drivers for cloud migration has been how high volumes of data can be easily produced, analyzed, and stored in cloud environments. Starting from large data warehouse platforms,...
View ArticleExpert Labs and Free Certification at Zenith Live ’23
Zenith Live ’23 is an unbeatable opportunity to sharpen your professional skills, build your expertise, and accelerate your career with focused in-person technical training and certification sessions....
View ArticleTechnical Analysis of CryptNet Ransomware
Key Points CryptNet is a new ransomware-as-a-service that has been advertised in underground forums since at least April 2023 The CryptNet threat group claims to perform double extortion attacks by...
View ArticleZscaler Recognized as Leader in 2023 GigaOm Radar for Deception Technology
Attacker tactics are ever-evolving, and unless detection methods evolve with them, your organization could be at risk. This conundrum is addressed head-on by deception technology (DT), which enables...
View ArticleInternational Women's Day 2023: Shaping the Future of Women in Tech
An organization’s success is forged by its people, and the more diverse a workforce, the better prepared a business is to tackle complex problems. From creative minds and skilled communicators to...
View Article