The NIS 2 Directive and its Impact on M&A/D
In response to growing cybersecurity challenges, the European Union (EU) is in the process of revitalizing its current cybersecurity directive, NIS (Network and Information Security), which was the...
View ArticleTLS, SWG, and the New Encrypted World Order: Part 1
As the volume of encrypted traffic surpasses the volume of unencrypted traffic globally— businesses are faced with a dual-edged dilemma. On one hand, encryption protocols such as TLS act as the valiant...
View ArticleMoonWalk: A deep dive into the updated arsenal of APT41 | Part 2
IntroductionThis is Part 2 of our two-part technical deep dive into APT41’s new tooling, DodgeBox and MoonWalk. For details of DodgeBox, go to Part 1.In Part 2 of this blog series, we examine the...
View ArticleWIZE Woman of Impact - Barbara Sagrillo
Meet Barbara Sagrillo Field Marketing Manager, Italy Q: How did you choose to go into Marketing? A: I entered the marketing field out of courage, despite not having studied it formally. The dynamic...
View ArticleIntroducing Zscaler Terraformer Tool
Introducing Zscaler-Terraformer ToolTerraform is designed to save a considerable amount of time once configuration files are created and deployed. However, it is challenging if you already have...
View ArticleHow Is Zscaler Growing its Investment in the SEA Region?
While most economies globally have been grappling with macroeconomic headwinds, markets in Southeast Asia (SEA) have shown great resilience and demonstrated a strong growth momentum despite them.1 And...
View ArticleZscaler Delivers New ChatGPT Enterprise Compliance API Integration to Drive...
Generative AI (GenAI) has tremendous potential to transform how users and organizations work. Far and away the most popular approach to this is through OpenAI ChatGPT Enterprise, which is quickly...
View ArticleWIZE Woman of Impact - Alice Emerson
Meet Alice Emerson Zscaler Regional Sales Director 1. What's the one experience that helped you grow the most? Becoming a mom (Ella, 4 yrs, Carter, 2 yrs, Brooke, 5 mos) helped me grow both...
View ArticleHijackLoader Updates
IntroductionHijackLoader (a.k.a. IDAT Loader) is a malware loader initially spotted in 2023 that is capable of using a variety of modules for code injection and execution. It uses a modular...
View ArticleThe Present and Future of Zero Trust Segmentation at Gray Television
Gray Television has embarked on a transformative digital journey to modernize and secure its network infrastructure, and I'm excited to share our experiences and insights from this process. Our story...
View ArticleRevving Up the Future: What the Festival of Speed and 5G have in Common
The Goodwood Festival of Speed is the world’s largest automotive garden party set against the spectacular backdrop of Goodwood House in West Sussex. Over the course of the three days, over 600 cars and...
View ArticleAlphabet Soup: What Is DSPM?
Overview In the rapidly evolving landscape of complex multicloud environments, safeguarding cloud infrastructure, sensitive data, and applications has become a paramount concern for organizations. With...
View ArticleTLS, SWG, and the New Encrypted World Order: Part 2
In Part 1 of this series, we delved into the meteoric rise of encrypted traffic, musing on how the widespread adoption of TLS brings both heightened security and a fair share of challenges. We also...
View ArticleWhy and How You Should Secure Third-Party Access to Apps
In response to today’s sophisticated threat landscape, organizations around the world are prioritizing cybersecurity more and more. However, these organizations often overlook a critical part of the...
View ArticleDSPM: Five Key Takeaways
In our Zenith Live ’24 DSPM session titled ‘Secure Cloud Data with a Fully Integrated Platform’, Srikanth Nellore, Sr. Director of Product Management at Zscaler, Kalie Radsmikham, Sr. Director, Product...
View ArticleThreatLabz Ransomware Report: Unveiling a $75M Ransom Payout Amid Rising Attacks
Ransomware has been a daunting threat to organizations worldwide for decades. Recent trends show that ransomware attacks continue to grow more advanced and persistent. It’s become increasingly clear...
View ArticleMSSP: The easy way to get started with Zero Trust
Mid-sized companies in particular struggle with IT security due to a lack of skilled workers. They often lack the knowledge and time for modern, zero-trust cybersecurity. A managed security service can...
View ArticleMicrosoft Outage Detected by Zscaler Digital Experience (ZDX)
At 11:00 UTC on July 30, 2024, Zscaler Digital Experience (ZDX) saw a substantial, unexpected drop in the ZDX score for Microsoft services around the globe. Upon analysis, we noticed HTTP 503 errors...
View ArticleThe Newest Capabilities of Risk360: Powerful Risk Alerting and Asset-level Risk
Managing risk effectively is paramount for organizations, given rising scrutiny from executives and regulatory bodies, along with staying ahead of long-standing risks like internet-exposed...
View ArticleOpenSSH Vulnerabilities CVE-2024-6387 & CVE-2024-6409 Pose A Significant...
IntroductionOn July 1, 2024, researchers identified a critical security vulnerability in OpenSSH's server (sshd) running on glibc-based Linux systems. This vulnerability, assigned the CVE identifier...
View Article