Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

The NIS 2 Directive and its Impact on M&A/D

In response to growing cybersecurity challenges, the European Union (EU) is in the process of revitalizing its current cybersecurity directive, NIS (Network and Information Security), which was the...

View Article


TLS, SWG, and the New Encrypted World Order: Part 1

As the volume of encrypted traffic surpasses the volume of unencrypted traffic globally— businesses are faced with a dual-edged dilemma. On one hand, encryption protocols such as TLS act as the valiant...

View Article


MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2

IntroductionThis is Part 2 of our two-part technical deep dive into APT41’s new tooling, DodgeBox and MoonWalk. For details of DodgeBox, go to Part 1.In Part 2 of this blog series, we examine the...

View Article

WIZE Woman of Impact - Barbara Sagrillo

Meet Barbara Sagrillo Field Marketing Manager, Italy Q: How did you choose to go into Marketing? A: I entered the marketing field out of courage, despite not having studied it formally. The dynamic...

View Article

Introducing Zscaler Terraformer Tool

Introducing Zscaler-Terraformer ToolTerraform is designed to save a considerable amount of time once configuration files are created and deployed. However, it is challenging if you already have...

View Article


How Is Zscaler Growing its Investment in the SEA Region?

While most economies globally have been grappling with macroeconomic headwinds, markets in Southeast Asia (SEA) have shown great resilience and demonstrated a strong growth momentum despite them.1 And...

View Article

Zscaler Delivers New ChatGPT Enterprise Compliance API Integration to Drive...

Generative AI (GenAI) has tremendous potential to transform how users and organizations work. Far and away the most popular approach to this is through OpenAI ChatGPT Enterprise, which is quickly...

View Article

WIZE Woman of Impact - Alice Emerson

Meet Alice Emerson Zscaler Regional Sales Director 1. What's the one experience that helped you grow the most? Becoming a mom (Ella, 4 yrs, Carter, 2 yrs, Brooke, 5 mos) helped me grow both...

View Article


HijackLoader Updates

IntroductionHijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution. It uses a modular...

View Article


The Present and Future of Zero Trust Segmentation at Gray Television

Gray Television has embarked on a transformative digital journey to modernize and secure its network infrastructure, and I'm excited to share our experiences and insights from this process. Our story...

View Article

Revving Up the Future: What the Festival of Speed and 5G have in Common

The Goodwood Festival of Speed is the world’s largest automotive garden party set against the spectacular backdrop of Goodwood House in West Sussex. Over the course of the three days, over 600 cars and...

View Article

Alphabet Soup: What Is DSPM?

Overview In the rapidly evolving landscape of complex multicloud environments, safeguarding cloud infrastructure, sensitive data, and applications has become a paramount concern for organizations. With...

View Article

TLS, SWG, and the New Encrypted World Order: Part 2

In Part 1 of this series, we delved into the meteoric rise of encrypted traffic, musing on how the widespread adoption of TLS brings both heightened security and a fair share of challenges. We also...

View Article


Why and How You Should Secure Third-Party Access to Apps

In response to today’s sophisticated threat landscape, organizations around the world are prioritizing cybersecurity more and more. However, these organizations often overlook a critical part of the...

View Article

DSPM: Five Key Takeaways

In our Zenith Live ’24 DSPM session titled ‘Secure Cloud Data with a Fully Integrated Platform’, Srikanth Nellore, Sr. Director of Product Management at Zscaler, Kalie Radsmikham, Sr. Director, Product...

View Article


ThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks

Ransomware has been a daunting threat to organizations worldwide for decades. Recent trends show that ransomware attacks continue to grow more advanced and persistent. It’s become increasingly clear...

View Article

MSSP: The easy way to get started with Zero Trust

Mid-sized companies in particular struggle with IT security due to a lack of skilled workers. They often lack the knowledge and time for modern, zero-trust cybersecurity. A managed security service can...

View Article


Microsoft Outage Detected by Zscaler Digital Experience (ZDX)

At 11:00 UTC on July 30, 2024, Zscaler Digital Experience (ZDX) saw a substantial, unexpected drop in the ZDX score for Microsoft services around the globe. Upon analysis, we noticed HTTP 503 errors...

View Article

The Newest Capabilities of Risk360: Powerful Risk Alerting and Asset-level Risk

Managing risk effectively is paramount for organizations, given rising scrutiny from executives and regulatory bodies, along with staying ahead of long-standing risks like internet-exposed...

View Article

OpenSSH Vulnerabilities CVE-2024-6387 & CVE-2024-6409 Pose A Significant...

IntroductionOn July 1, 2024, researchers identified a critical security vulnerability in OpenSSH's server (sshd) running on glibc-based Linux systems. This vulnerability, assigned the CVE identifier...

View Article
Browsing all 1471 articles
Browse latest View live