Automate ITSM Workflows and Accelerate IT Resolutions Using AI
At Zenith Live, I had the pleasure of talking to our customers about how AI can revolutionize IT service management (ITSM) by detecting issues early and initiating automated root cause analysis,...
View ArticleRevolutionizing Cybersecurity for Federal Agencies: Innovations in Zscaler...
Government agencies handle a vast amount of sensitive data and Controlled Unclassified Information (CUI) that must be diligently managed and protected. The nature of their work often involves dealing...
View ArticleThree Ways Zero Trust Architecture Made Our Organization Better Beyond Security
The best approach for secure digital transformation At the Department for Levelling Up, Housing and Communities, our most critical work happens on-location in local communities across the UK, not in a...
View ArticleLessons Learned, Four Zscaler Deployments Later
When I joined Capitec in April 2022 as CTO, the first thing I wanted to find out was whether there was a zero trust strategy in place. Capitec is the second largest bank in South Africa, and like...
View ArticleSecure and leverage your data with Zscaler at the Gartner Security & Risk...
Data is very much the competitive advantage of every commercial organisation. It's not just an asset; it's arguably the only truly strategic, irreplaceable asset you have. Everything else? Tactical at...
View ArticleZero Trust + AI: A Match Made in the Clouds
Have any terms in the cybersecurity space generated more buzz than “zero trust” and “AI”? At risk of sounding like a Magic 8 Ball, my reply is no. Over the last several years, countless security...
View ArticleTop 5 Real-World DSPM Use Cases
In this cloud-driven era, sensitive information is constantly being created, transmitted, and stored. Organizations worldwide thrive on that data and, at the same time, face unprecedented challenges in...
View ArticleBlindEagle Targets Colombian Insurance Sector with BlotchyQuasar
IntroductionIn June 2024, Zscaler ThreatLabz detected fresh activity from BlindEagle, an advanced persistent threat (APT) actor also identified as AguilaCiega, APT-C-36, and APT-Q-98. BlindEagle...
View ArticleThe NIS2 directive as an opportunity to overcome legacy infrastructure: A...
In our hyperconnected, dynamic, and distributed world, the traditional security perimeter is vanishing. Applications are moving into the cloud, and users are connecting from everywhere, on all kinds of...
View ArticleZscaler Business Continuity in the Wake of Major IT and Security Outages
It has been a busy few weeks for IT and security professionals, executives, and boards in the wake of both the July 18 Microsoft Azure Central US outage that impacted dozens of Azure services, and the...
View ArticleZscaler Selects Red Hat Enterprise Linux 9 (RHEL 9) as Next-Gen Private...
Latest NewsOn June 30, 2024, CentOS 7 reached end of life, requiring migrations in thousands of software stacks and server environments. In anticipation of this, Zscaler selected Red Hat Enterprise...
View ArticlePhishing Via Typosquatting and Brand Impersonation: Trends and Tactics
Introduction Following the 2024 ThreatLabz Phishing Report, Zscaler ThreatLabz has been closely tracking domains associated with typosquatting and brand impersonation - common techniques used by threat...
View ArticleWhat Are the 6 Principles of Cloud Security Posture?
As a child, everyone is taught to “work on your posture.” Why is that? Having great posture can improve your health, mood, and confidence. The same applies to clouds and workloads. Focusing on proper...
View ArticleZscaler Privileged Remote Access: Checking Your Vendor’s Badge Before They Go...
Imagine, if you will, a digital hospital floor representing your healthcare organization's IT infrastructure: doctors diagnosing, data flowing, and applications working in harmony. Now, think of your...
View ArticleSmarter and Faster Lateral Threat Mitigation with AI-powered App Segmentation
Zero trust prioritizes application protection over network segments, as networks are no longer central to application security(NIST publication). Exposed applications allow bad actors to move...
View ArticleCelebrating Pioneers of Change During Hispanic Heritage Month: My Story
As a proud Latino born and raised in Brazil, I’m passionate about supporting and empowering the Latino and Hispanic communities at Zscaler. I joined Zscaler in October 2023 as Chief AI Officer, and...
View ArticleMoving to More Preemptive Detection and Response with Breach Predictor
The response status quoOver the past decade, enterprises have been grappling with increasingly sophisticated threats like ransomware and phishing. We have responded with strong security tools such as...
View ArticleMicrosoft 365 Outage Detected by Zscaler Digital Experience (ZDX)
On September 12, 2024, at 4:45 a.m. PDT, Zscaler Digital Experience (ZDX) detected a significant and sudden decline in the ZDX Score for Microsoft 365 services. Our analysis revealed elevated network...
View ArticleWhy Is Zero Trust Cybersecurity So Essential Today?
Coined in 2010 by Forrester Research, the term "zero trust" has long been hijacked by security vendors eager to take advantage of the hype that surrounds the concept. Today, it's so overused and...
View ArticleThe public sector needs more disruptors
According to Zscaler’s most recent ‘State of Encrypted Attacks Report’, the public sector experienced a sharp rise in encrypted attacks, with a 185% year-over-year increase globally. Government...
View Article