Optimize SaaS and Workspace Efficiency with New Features in Zscaler Business...
Last December, we released Zscaler Business Insights to empower organizations to reduce SaaS application spend and optimize office space real estate. Since then, customers have seen tremendous results....
View ArticleFive Must-Haves for Data Security Posture Management (DSPM)
With widespread adoption of multicloud infrastructures, organizations are migrating vast volumes of data to the cloud. As per the statistics, more than 175 zettabytes of data is expected to move to...
View ArticleAccelerating CXO Business Agility: Wipro launches Cyber X-Ray, powered by...
In today's age of continuous disruption, enterprise CXOs face the challenge of accessing comprehensive cybersecurity risk visibility across their various projects. This lack of visibility makes it...
View ArticleZscaler Achieves AAA Rating in CyberRatings 2024 SSE Test
When it comes to researching a potential investment, no source of information is more valuable than independent product testing. Every vendor will tell you that they are better than the other guys, but...
View ArticleA Brief History of SmokeLoader, Part 1
IntroductionThis is Part 1 in our series on the history of SmokeLoader. Stay tuned for Part 2.In May 2024, Zscaler ThreatLabz technical analysis of SmokeLoader supported an international law...
View ArticleThe Hybrid Hustle: Optimizing Traffic Forwarding for Managed Devices
Remember the Hollywood spy thrillers where a stereotypical hacker working from a dimly lit basement bypasses the mighty FIREWALL to hack into Evil Corp Inc. using a Nokia 6600 and a VPN? Behind the...
View ArticleDSPM: The Essential Component for a Comprehensive Data Protection Strategy
In the ever-evolving landscape of data security, organizations face an increasing number of risks and threats to their sensitive data. To effectively protect their crown jewels, organizations must...
View ArticleManaging SASE Momentum with NTT DATA and Zscaler
(Pictured: Steve Williams, CISO, NTT DATA and Jay Chaudhry, CEO, Zscaler) The momentum around SASE and its critical role in an organization's future has shown no signs of slowing down. Over the next...
View ArticleWhy Spending Millions on Firewalls and VPNs Doesn't Stop Breaches
For decades now, organizations have spent massive amounts of money purchasing security appliances. They’ve acquired dozens upon dozens of solutions, racked and stacked an endless amount of hardware,...
View ArticleThe Intertwined Journey of Regulatory Compliance and Cloud Data Security
In the ever-evolving world of digital transformation, regulatory compliance and cloud data security have become intricately intertwined, presenting organizations with a unique set of challenges and...
View ArticleKimsuky deploys TRANSLATEXT to target South Korean academia
IntroductionIn March 2024, Zscaler ThreatLabz observed new activity from Kimsuky (aka APT43, Emerald Sleet, and Velvet Chollima), an advanced persistent threat actor backed by the North Korean...
View ArticleRecovering Safely and Swiftly: The Path to Enterprise Network Recovery with...
In today's digital landscape, enterprises face the constant threat of cyberattacks that can compromise their networks and disrupt business operations. When a major breach occurs, the challenge becomes...
View ArticleHow Zscaler Is Helping Veterans Write Their Next Chapter Through SkillBridge
Through the U.S. Department of Defense SkillBridge Program, Zscaler will provide additional job training to active military members with cybersecurity and IT experience in roles like cyber analyst,...
View ArticleA Brief History of SmokeLoader, Part 2
IntroductionIn this two-part blog series, we explore the evolution of SmokeLoader, a malware downloader that has been active since 2011. In Part 1, we explored early versions of SmokeLoader, from its...
View ArticleCybersecurity Regulatory Harmonization
With the increased prevalence of cybersecurity in the public sector, cybersecurity programs have been designed and implemented to cover requirements of federal, state, and local governments. As well,...
View ArticleMaximize IT Efficiency with Zscaler Digital Experience Copilot
In today’s digital-first environment, businesses depend heavily on their IT infrastructure to provide seamless operations and superior user experiences. However, managing the complex ecosystem of...
View ArticleDodgeBox: A deep dive into the updated arsenal of APT41 | Part 1
IntroductionThis is Part 1 of our two-part technical deep dive into APT41’s new tooling, which includes DodgeBox and MoonWalk. In April 2024, Zscaler ThreatLabz uncovered a previously unknown loader...
View ArticleNew AI Innovations that supercharge Data Protection
As we soak up the summer sun and get some much needed outdoor time, what could be better than another AI blog? While AI has been overanalyzed and dissected 10 ways from Sunday, it still doesn’t negate...
View ArticleSix Ways Sanmina Maximized Its Zscaler Zero Trust Exchange Investment
Six Ways Sanmina Maximized Its Zscaler Zero Trust Exchange Investment Several years back, my security team and I noticed that the four walls of legacy perimeter-based security were eroding. As a...
View ArticleEliminate Lateral Movement Attacks with AI-Powered App Segmentation and...
Overview Intelligent policy recommendation is an advanced capability of Zscaler AI-Powered App Segmentation that streamlines your zero trust journey. It delivers precise user-to-app segmentation and...
View Article