Introducing ZIdentity: Migrating Admins to a Centralized Identity Experience
We are excited to announce upcoming customer migration for admins from the existing login experience across ZIA, ZPA, and ZDX portals to a centralized identity experience called ZIdentity. This...
View ArticleLevel Up Your Digital Experience at Zenith Live '24 With Top Experts and...
In today's hybrid workforce, ensuring seamless productivity for users regardless of their location is crucial. However, troubleshooting can become challenging when users are not consistently in the...
View ArticleCloud Native Secure Web Gateway: Adaptive Protection Legacy SWGs Can’t Match
Rapid adoption of cloud-based apps and services has transformed business, enabling greater agility, scalability, and cost savings. But it has also introduced security challenges: countless new attack...
View ArticleCongratulations to our 2024 Zscaler Partners of the Year
Last week at the Zscaler Americas Executive Partner Summit we announced our 2024 Americas Partners of the Year. The Zscaler Partner Ecosystem is a key differentiator and force multiplier for us in the...
View ArticleZscaler Digital Experience Just Got Smarter and Wiser
Businesses rely on technology to keep employees productive - organizations with 250+ employees use more than 100 SaaS apps, and todays’ end users expect flawless digital experiences when interacting...
View ArticleAmericas Executive Partner Summit Recap
After hosting more than 100 partner executives at our Zscaler Executive Partner Summit, we are going into this week feeling both immensely grateful and highly energized. Time is our most valuable...
View ArticleHow Zscaler is taking our partner marketing commitment to the next level
Introducing the All-New Partner Demand Center, your launchpad for marketing with ZscalerFor the past 12 months, Zscaler has transformed our partner program, empowering our partners to thrive in the...
View ArticleAI/ML-Powered URL Classification: Categorize and Conquer
If you ever try wrapping your head around the sheer enormity of the internet, your brain might start to hurt. The indexed internet teems with roughly 4.5 billion unique web pages at any moment, with...
View ArticleSimplify Healthcare Boardroom Meetings and Compliance with Risk360
When I was a customer, I was tasked with implementing new compliance controls and decreasing risk. The challenge was that vendors would tell me, “...we can provide you Y to be compliant with your...
View ArticleWhy VPNs and Firewalls Can’t Build a Zero Trust Architecture
In today's rapidly evolving threat landscape, it’s clear that traditional perimeter security measures can’t protect organizations from sophisticated cyberattacks. The rise of remote work, cloud...
View ArticleTrailblazing innovations that revolutionize Data Protection
This blog is a summary of Zscaler's new Innovation Launch around Data Protection. To watch the virtual event and see all the new innovations in action, see the Launch Event Page A Unifed Approach to...
View Article10 Zscaler Leaders Recognized as CRN 2024 Women of the Channel
10 Zscaler Leaders Recognized as CRN 2024 Women of the Channel Each year, CRN publishes its Women of the Channel project, recognizing female executives for their accomplishments over the past year and...
View ArticleExtend Complete Data Security to the Public Cloud with DSPM
Recently, attacks directly targeting the cloud have increased by 288%.¹ With organizations now pushing zettabytes of data to the cloud, this is a recipe for disaster. Moreover, with sensitive data such...
View ArticleNYC Department of Education Builds the Pipeline for Future Cybersecurity...
NYC Department of Education Builds the Pipeline for Future Cybersecurity ProfessionalsThere’s been a lot of talk over the past few years about a shortage of skilled cybersecurity talent, but from where...
View ArticleData Protection Best Practices for Healthcare
The healthcare industry is struggling to protect against increasingly sophisticated cyberattacks. According to the HIPAA Journal, healthcare data breaches of 500+ records reached a new high in 2023 at...
View ArticleTechnical Analysis of Anatsa Campaigns: An Android Banking Malware Active in...
IntroductionAt Zscaler ThreatLabz, we regularly monitor the Google Play store for malicious applications. Over the past few months, we identified and analyzed more than 90 malicious applications...
View ArticleTransforming the Partnership Landscape: Welcoming Nitin Gulati and Craig...
In today's rapidly evolving business landscape, transformation is key to staying ahead of the curve. At Zscaler, our commitment to transformation extends beyond our technology solutions; it encompasses...
View ArticleOperation Endgame: Up In Smoke
IntroductionSmoke (a.k.a. SmokeLoader or Dofoil) is a malware loader that has been operational since 2011. Smoke is primarily used to deliver second-stage malware payloads including various trojans,...
View ArticleOverconfidence may be preventing European businesses from acting now to...
Traditionally, organizations tend to be reactive in their attempt to combat evolving cybersecurity attacks, relying on the chances of themselves being the target as low and then evolving with the wider...
View ArticleTechnical Analysis of the Latest Variant of ValleyRAT
IntroductionValleyRAT is a remote access trojan (RAT) that was initially documented in early 2023. Its main objective is to infiltrate and compromise systems, providing remote attackers with...
View Article