Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Real-Time Risk Mitigation with ZPA Adaptive Access Policy

In today's rapidly evolving security landscape, organizations must adapt quickly to security events. Alongside implementing secure private access using Zscaler Private Access (ZPA), monitoring user and...

View Article


Mitigating the Rising Tide of Malware and Ransomware Attacks

Ransomware and malware attacks are among the most widespread and dangerous types of cyberthreats organizations face today. As cybercriminals continue to evolve their methods, ransomware and malware...

View Article


WIZE Woman of Impact - Emma Hall

Meet Emma Hall, Sr. Director, Global CXO ExperienceTell us a little about what your day-to-day looks like running the CXO Programs. One of my favorite aspects of my role is that no two days are alike....

View Article

Setting Up SSL Inspection in Developer Environments to Defend Against...

In today's digital landscape, SSL/TLS inspection is crucial for maintaining robust security. Having said that, implementing SSL inspection in developer environments can be a challenge. This is because...

View Article

Enhancing Zero Trust Security for Unmanaged Devices with Google Chrome and ZPA

The rapid adoption of web-based applications is transforming the way businesses operate. With the growing prevalence of remote work, contractors, gig workers, and bring your own device (BYOD) models,...

View Article


Introducing Zscaler Workload Communications Virtual Machine Scale Sets with...

Workload Communications, our product under the Zscaler Zero Trust Networking portfolio helps securely connect workloads in the public cloud. They are purpose built gateways deployed into Cloud Service...

View Article

Zscaler vs. VPN: A Classic Battle

I was woken up last night by some rap music. I will spare you the details of who it was, but it made me think of when I head into a prospect or customer meeting to discuss why Zscaler is better than...

View Article

Identifying Phishing Attacks: Common Types, Key Tactics, and Prevention Tips

Phishing is no longer just a common cyber nuisance—it’s a constantly evolving threat that’s wreaking havoc on individuals and organizations worldwide. In 2023, phishing was the most widespread form of...

View Article


Strengthen Your Compliance: Continuous Coaching for Effective Access Controls

Human error is a leading cause of security breaches. Whether it's phishing or hidden malicious payloads on suspicious sites, users will continue to make errors in judgment unless they receive...

View Article


7 Key Takeaways From IBM's Cost of a Data Breach Report 2024

Overview: IBM's Cost of a Data Breach Report 2024About the report IBM’s annual 2024 Cost of a Data Breach Report provides IT, risk management, and security leaders with timely, quantifiable evidence to...

View Article

Prevent Compromise of Private Applications with ZPA Threat Inspection

As part of a comprehensive zero trust solution, it is crucial not to blindly trust any users or systems. All interactions must be not only authenticated and authorized, but also inspected for...

View Article

Four Steps for a Successful Zero Trust Journey

Zero trust security is a perennial hot topic for a reason—organizations are constantly trying to fend off wave after wave of increasingly sophisticated cyberattacks. In this demanding reality, it is...

View Article

Zscaler Deception & ITDR: The Network Security Standoff

You’ve seen the meme. Three identical characters pointing at each other, confused about which is the real one while some supervillain watches in frustration. Now, imagine those characters are your...

View Article


7 Key Takeaways From IBM's Cost of a Data Breach Report 2024

Overview: IBM's Cost of a Data Breach Report 2024About the report IBM’s annual 2024 Cost of a Data Breach Report provides IT, risk management, and security leaders with timely, quantifiable evidence to...

View Article

Strengthening Cyber Defense: Key Insights from the 15th Billington...

Recently, the 15th annual Billington Cybersecurity Summit once again convened senior leaders from across the U.S. and international governments, along with the private sector. Zscaler had the...

View Article


The Productivity and Protection of Cloud Sandbox

In today's cybersecurity landscape, the challenge of new threats from unknown files is ever-growing, especially with targeted phishing, sophisticated malware, and attackers targeting newly published...

View Article

Content Sovereignty: Geolocalization

The evolution of the internet over the past three decades has been nothing short of magical. Starting from the snail-paced DSL connections using modem and telephone lines, we’ve now come to an era...

View Article


TEST BLOG WILL BE REMOVED SOON NEUTRAL

The evolution of the internet over the past three decades has been nothing short of magical. Starting from the snail-paced DSL connections using modem and telephone lines, we’ve now come to an era...

View Article

Clone of TEST BLOG WILL BE REMOVED SOON LOCALISED

The evolution of the internet over the past three decades has been nothing short of magical. Starting from the snail-paced DSL connections using modem and telephone lines, we’ve now come to an era...

View Article

CVE-2024-38856: Pre-Auth RCE Vulnerability in Apache OFBiz

IntroductionOn August 5, 2024, researchers at SonicWall discovered a zero-day security flaw in Apache OFBiz tracked as CVE-2024-38856. The vulnerability, which has been assigned a CVSS score of 9.8,...

View Article
Browsing all 1471 articles
Browse latest View live