Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Zscaler Named a Top CRN Tech Innovator for Zero Trust SASE & SD-WAN

Each year, CRN's prestigious Tech Innovator Awards celebrate the forefront of technological advancement, honoring products and services that redefine possibilities for solution providers in the tech...

View Article


XPO’s Zero Trust Expansion Keeps Transport Service Centers Operating Optimally

XPO’s Zero Trust Expansion Keeps Transport Service Centers Operating OptimallyAt XPO, our job is to keep our trucks and their freight moving to their destinations safely and on schedule. To ensure...

View Article


The Librarian's Recommendation: Overcoming the Traps of Data in...

The evolution of artificial intelligence has led to significant advancements in natural language processing, particularly with the development of large language models (LLMs). These models have...

View Article

Immunizing Europe against cyber threats: NIS2 and the role of zero trust

It feels like only yesterday I was standing at my kids' end of school year ceremony, now the Euro Soccer Championship are done and the Olympics are in full swing. This summer is hurtling by. And with...

View Article

How to Manage Your Migration to Secure Web Gateway (SWG) 2.0

The internet has come a long way since January 1, 1983, its official birthday. Over the years, fueled by digital transformation, the internet has become the corporate network of organizations big and...

View Article


CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz

IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8,...

View Article

Zero Compromise with Content Disarm and Reconstruction (CDR), powered by...

Files are the core of business operations, whether your employees need to download/upload a file or transfer to/from partners, customers and suppliers. Zero-day threats could often hide within benign...

View Article

China Premium: Introducing Private App Access and Backup for Complete...

In my previous blog post, I explained how to solve the challenge of connectivity in China. In this post, I want to explore how customers can embrace the endpoint-centric model, coupled with our latest...

View Article


Automating Zscaler Platform with Red Hat Ansible Automation Platform

Automating Zscaler Platform with Red Hat Ansible Automation Platform In today's fast-paced digital world, organizations are under constant pressure to innovate and deliver solutions quickly and...

View Article


KPMG in India Forges Zero Trust Offering with Zscaler to Enhance Cloud...

This week, KPMG India announced the launch of their new strategic alliance with Zscaler. By combining KPMG in India’s business knowledge and Zscaler’s technological expertise, KPMG in India will offer...

View Article

ATT&CKING risk with zero trust

Here’s a burning question I proposed to an audience I was presenting to at the recent Zenith Live ‘24 conference: Why does everybody seem to support threat-centric security conceptually, but few...

View Article

Technical Analysis of Copybara

IntroductionZscaler ThreatLabz recently analyzed a new variant of Copybara, which is an Android malware family that emerged in November 2021. The malware is primarily spread through voice phishing...

View Article

Optimize Digital Experiences with Our Advanced Wi-Fi Dashboard

In the ever-evolving landscape of network engineering, visibility and control over network performance are paramount. The recent release of our new Wi-Fi dashboard marks a significant advancement in...

View Article


DSPM: Healthcare Data Security Amid Rising Breaches

In the healthcare industry, data is always the target. Healthcare organizations face an array of data security challenges as they collect, store, and access huge amounts of personal data and protected...

View Article

What's the Difference Between DSPM, CSPM, and SSPM?

In the rapidly evolving landscape of complex multicloud environments, securing cloud infrastructure, sensitive data, and applications has become a critical concern. Yet traditional security measures...

View Article


5 Key Takeaways: Ransomware Attacks on Healthcare, Education, and Public Sector

Ransomware has rapidly escalated from being a financial nuisance to a significant, multi-dimensional threat that jeopardizes the core of our most essential services. Sectors like healthcare, education,...

View Article

ServiceNow Outage Detected by Zscaler Digital Experience (ZDX)

On August 26, 2024, at 12:20 p.m. PDT, Zscaler Digital Experience (ZDX) detected a significant and sudden decline in the ZDX Score for ServiceNow services worldwide. Our analysis revealed elevated page...

View Article


The NIS2 directive as an opportunity to overcome legacy infrastructure

By now, all the CISO and C-Level executives in the EU should be aware of the upcoming NIS2 Directive deadline: 17 October 2024. Member states must adopt and publish the measures necessary to comply...

View Article

Understanding the Digital Operational Resilience Act (DORA)

I live in Sweden, where 10% or fewer of purchases are made with cash. Few carry cash regularly, and it can often be difficult to find places that accept it. This means that if I lose my phone or...

View Article

Introducing Zscaler’s Experience Center

We live in an era marked by a proliferation of cybersecurity point products. Just one lap around the event hall of the annual RSA Conference will leave your head spinning with options for products,...

View Article
Browsing all 1471 articles
Browse latest View live