What’s Next for ZTNA? New Insights from the Enterprise Strategy Group
Do you feel like you’ve squeezed a decade's worth of digital transformation into the last three years? I certainly do. As evidence, take a look at the before and after of my home office. It went from a...
View ArticleReflecting on Gender Equity as a Woman in Technology
International Women’s Day and Women’s History Month commemorate the progress women have made toward equality and raising awareness of the need for continued progress. We’ve achieved some fantastic...
View ArticleTechnical Analysis of CryptNet Ransomware
Key Points CryptNet is a new ransomware-as-a-service that has been advertised in underground forums since at least April 2023 The CryptNet threat group claims to perform double extortion attacks by...
View ArticleExpert Labs and Free Certification at Zenith Live ’23
Zenith Live ’23 is an unbeatable opportunity to sharpen your professional skills, build your expertise, and accelerate your career with focused in-person technical training and certification sessions....
View ArticleZscaler Recognized as Leader in 2023 GigaOm Radar for Deception Technology
Attacker tactics are ever-evolving, and unless detection methods evolve with them, your organization could be at risk. This conundrum is addressed head-on by deception technology (DT), which enables...
View ArticleThe C-Level Must Anticipate Change
The decade of the 20s will go down in history as the age in which organizations learned to position themselves as adaptable. Right at the beginning of the current decade, companies were confronted with...
View ArticleMake generative AI tools like ChatGPT safe and secure with Zscaler
In the last few weeks, I’ve interacted with over 50 CISOs and security practitioners during the RSA conference and elsewhere on the US East Coast. ChatGPT and other generative AI were top of the mind...
View ArticleWhat is an MSSP and how does it help SMBs?
Cybersecurity is an essential part of modern business operations. It doesn’t matter what industry you’re in, how many customers you serve, or what products or services you sell. Everyone needs to be...
View ArticleZscaler at Microsoft Build
Conference Overview Microsoft Build is an annual developer conference (hybrid format event with on-the-ground and digital presence) that provides excellent insight into various Microsoft cutting-edge...
View ArticleReinforce Your Security Strategy with Zscaler at AWS re:Inforce 2023
For the second year, Zscaler will be at AWS re:Inforce – AWS’s primary conference focused on cybersecurity. This year, the conference will be located in sunny Anaheim, California and will run from June...
View ArticleCoverage Advisory for 3CX Supply Chain Attack
Update [2023-03-31 05:00 PM PST] We have published a blog detailing our analysis on the 3CX Supply Chain Attack. Background: On 30th March 2023, 3CX released a security alert for 3CX Electron Windows...
View Article3CX Supply Chain Attack Campaign
On March 29th 2023, CrowdStrike published a blog outlining a supply chain attack leveraging the 3CXDesktopApp - a softphone application from 3CX. The ThreatLabz Team immediately started hunting for...
View ArticleTechnical Analysis of Pikabot
Key Points Pikabot is a new malware trojan that emerged in early 2023 that consists of two components: a loader and a core module. The core module implements the malicious functionality that includes...
View ArticleIDC study finds Zscaler Data Protection can save $2.1 million annually
With today’s economic backdrop, saving money is always an interesting topic of discussion. If you’re looking to be the hero and help your company save money, this blog is for you. A study led by IDC...
View ArticleThreading the needle on innovation and security with ChatGPT
By now, you are familiar with ChatGPT given how quickly the tool has grown. In fact, it became one of the fastest-growing consumer applications the world had seen just two months after its release. Due...
View ArticleZenith Live showcases how businesses can move forward
What drives innovation in organizations? When people ask me this question, my answer is always the same: business strategy. It's simple - to deliver innovation at scale, organizations must develop a...
View ArticleTechnical Analysis of Bandit Stealer
Key Points Bandit is a new information stealer that harvests stored credentials from web browsers, FTP clients, email clients, and targets cryptocurrency wallet applications. The malware sends stolen...
View ArticleJoin us at AWS re: Inforce
The next AWS re: Inforce 2023 is just around the corner, taking place June 13-14 at the Anaheim Convention Center in California. For the second consecutive year, Zscaler will sponsor this two-day...
View ArticleIn Their Own Words: Customers in the Spotlight at Zenith Live ’23
One of my favorite aspects of Zenith Live, Zscaler’s flagship conference, is customer keynotes. Without fail, they are surprising, illuminating, and frequently humorous. They’re often delivered by...
View ArticleWhat did you do over summer break? Security and compliance!
Well that’s a wrap! Can you believe it? The 2023 school year has come to a close! And with that, the Zscaler team has been busy traveling to various conferences and user-group seminars, having...
View Article