Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Automate ITSM Workflows and Accelerate IT Resolutions Using AI

At Zenith Live, I had the pleasure of talking to our customers about how AI can revolutionize IT service management (ITSM) by detecting issues early and initiating automated root cause analysis,...

View Article


Revolutionizing Cybersecurity for Federal Agencies: Innovations in Zscaler...

Government agencies handle a vast amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. The nature of their work often involves dealing...

View Article


Three Ways Zero Trust Architecture Made Our Organization Better Beyond Security

The best approach for secure digital transformation At the Department for Levelling Up, Housing and Communities, our most critical work happens on-location in local communities across the UK, not in a...

View Article

Lessons Learned, Four Zscaler Deployments Later

When I joined Capitec in April 2022 as CTO, the first thing I wanted to find out was whether there was a zero trust strategy in place. Capitec is the second largest bank in South Africa, and like...

View Article

Secure and leverage your data with Zscaler at the Gartner Security & Risk...

Data is very much the competitive advantage of every commercial organisation. It's not just an asset; it's arguably the only truly strategic, irreplaceable asset you have. Everything else? Tactical at...

View Article


Zero Trust + AI: A Match Made in the Clouds

Have any terms in the cybersecurity space generated more buzz than “zero trust” and “AI”? At risk of sounding like a Magic 8 Ball, my reply is no. Over the last several years, countless security...

View Article

Top 5 Real-World DSPM Use Cases

In this cloud-driven era, sensitive information is constantly being created, transmitted, and stored. Organizations worldwide thrive on that data and, at the same time, face unprecedented challenges in...

View Article

BlindEagle Targets Colombian Insurance Sector with BlotchyQuasar

IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle...

View Article


The NIS2 directive as an opportunity to overcome legacy infrastructure: A...

In our hyperconnected, dynamic, and distributed world, the traditional security perimeter is vanishing. Applications are moving into the cloud, and users are connecting from everywhere, on all kinds of...

View Article


Zscaler Business Continuity in the Wake of Major IT and Security Outages

It has been a busy few weeks for IT and security professionals, executives, and boards in the wake of both the July 18 Microsoft Azure Central US outage that impacted dozens of Azure services, and the...

View Article

Zscaler Selects Red Hat Enterprise Linux 9 (RHEL 9) as Next-Gen Private...

Latest NewsOn June 30, 2024, CentOS 7 reached end of life, requiring migrations in thousands of software stacks and server environments. In anticipation of this, Zscaler selected Red Hat Enterprise...

View Article

Phishing Via Typosquatting and Brand Impersonation: Trends and Tactics

Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and brand impersonation - common techniques used by threat...

View Article

What Are the 6 Principles of Cloud Security Posture?

As a child, everyone is taught to “work on your posture.” Why is that? Having great posture can improve your health, mood, and confidence. The same applies to clouds and workloads. Focusing on proper...

View Article


Zscaler Privileged Remote Access: Checking Your Vendor’s Badge Before They Go...

Imagine, if you will, a digital hospital floor representing your healthcare organization's IT infrastructure: doctors diagnosing, data flowing, and applications working in harmony. Now, think of your...

View Article

Smarter and Faster Lateral Threat Mitigation with AI-powered App Segmentation

Zero trust prioritizes application protection over network segments, as networks are no longer central to application security(NIST publication). Exposed applications allow bad actors to move...

View Article


Celebrating Pioneers of Change During Hispanic Heritage Month: My Story

As a proud Latino born and raised in Brazil, I’m passionate about supporting and empowering the Latino and Hispanic communities at Zscaler. I joined Zscaler in October 2023 as Chief AI Officer, and...

View Article

Moving to More Preemptive Detection and Response with Breach Predictor

The response status quoOver the past decade, enterprises have been grappling with increasingly sophisticated threats like ransomware and phishing. We have responded with strong security tools such as...

View Article


Microsoft 365 Outage Detected by Zscaler Digital Experience (ZDX)

On September 12, 2024, at 4:45 a.m. PDT, Zscaler Digital Experience (ZDX) detected a significant and sudden decline in the ZDX Score for Microsoft 365 services. Our analysis revealed elevated network...

View Article

Why Is Zero Trust Cybersecurity So Essential Today?

Coined in 2010 by Forrester Research, the term "zero trust" has long been hijacked by security vendors eager to take advantage of the hype that surrounds the concept. Today, it's so overused and...

View Article

The public sector needs more disruptors

According to Zscaler’s most recent ‘State of Encrypted Attacks Report’, the public sector experienced a sharp rise in encrypted attacks, with a 185% year-over-year increase globally. Government...

View Article
Browsing all 1471 articles
Browse latest View live