Zero Compromise with Content Disarm and Reconstruction (CDR), powered by...
Files are the core of business operations, whether your employees need to download/upload a file or transfer to/from partners, customers and suppliers. Zero-day threats could often hide within benign...
View ArticleRacing to the Supermarket
What my Shopping Trips have in Common with TOYOTA GAZOO Racing World Rally Team This year I had the opportunity to visit the incredible Finnish round of the World Rally Championship at the beginning of...
View ArticleShining Light on the Dark Angels Ransomware Group
The Dark Angels ransomware threat group launched attacks beginning in April 2022, and has since been quietly executing highly targeted attacks. Dark Angels operate with more stealthy and sophisticated...
View ArticleQUIC: The Secure Communication Protocol Shaping the Internet’s Future
As the internet has evolved dramatically in the last few decades, so too has the underlying technology that powers it. QUIC is one of those exciting innovations: it’s a new transport protocol developed...
View ArticleAnother Milestone: Zscaler’s Daily Transactions Pass Half a Trillion!
The Largest and Most Trusted Security CloudIn support of our vision for a future built around zero trust, Zscaler’s security technology is served through the world’s largest inline security cloud. What...
View ArticleDisable XFF Header insertion
Zscaler, working as an inline proxy, inserts the XFF header in the HTTP/ HTTPS packets that egress from the service. This is true for all traffic that is SSL decrypted and encrypted through the Zscaler...
View ArticleAre You Enabling a Resilient Workplace?
For most organisations, a remote/hybrid workforce is here to stayAberdeen’s 2024 Future of the Workplace study found that today’s IT professionals are challenged to provide a larger number of remote /...
View ArticleBuilding a Resilient Hybrid Workforce: Future-Proofing IT for Remote Work
Cybersecurity- and compliance-related risks are all too real, and reflect the realities of a complex and dynamic computing environment Aberdeen’s 2024 Future of the Workplace study found that today’s...
View ArticleTechnical Analysis of DarkVision RAT
IntroductionDarkVision RAT is a highly customizable remote access trojan (RAT) that first surfaced in 2020, offered on Hack Forums and their website for as little as $60. Written in C/C++, and...
View ArticleThe FCC’s Cyber Program: Strengthening America’s Cybersecurity Through K-12...
The Federal Communications Commission’s (FCC) Cybersecurity Pilot Program is leveling the playing field for K-12 education institutions to press on the gas toward zero trust and make the paradigm shift...
View ArticleSASE vs. Zero Trust: What's the Difference?
The world of cybersecurity, as with seemingly every area of tech, is rife with jargon and acronyms. Knowing the meaning of each is part of the battle, but then comes understanding how they fit...
View ArticleHTTP/2: Better, Faster, Stronger
The evolution of web communication protocols is a testament to the continuous pursuit of faster, more efficient and secure data transfer methods. Most of us have experienced days where web pages have...
View ArticleNew ThreatLabz Report: Mobile remains a top threat vector with 111% spyware...
The role of the CISO continues to expand, driven by the rising number of breaches and cyberattacks like ransomware, as well as SEC requirements for public organizations to disclose material breaches....
View ArticleIntroducing New Business Continuity Solutions
Zscaler, trusted for resilience As we recently announced, Zscaler continues to grow, adding more and more customers seeking a trusted security cloud that provides protection and a great user...
View ArticleUnderstanding the Digital Personal Data Protection (DPDP) Act: A...
If you’re a business with Indian customers, or your mobile app or website is accessible to them, it’s crucial to familiarize yourself with India's new data protection legislation: The Digital Personal...
View ArticleZscaler Introduces Geolocalization
In the previous post on this topic, I introduced the problem that security admins face in ensuring uniform security policies for their users in countries not serviced by a local Zscaler PoP. When you...
View ArticleEffective DSPM Strategies for Data Security in the Retail Industry
The retail sector continues to grow rapidly, particularly following the COVID-19 pandemic, as more and more people shop online. Currently, more than 26.6 million online retailers operate globally. Many...
View ArticleSimplify Secure Connectivity to Business Partners’ Private Apps
In today's fast-paced business environment, organizations collaborate with an ecosystem of business partners. Therefore, the need for seamless, secure connectivity to applications and resources hosted...
View ArticleUnderstanding the CyberRatings SSE Report and Why Zscaler is Named A Top...
CyberRatings, the leading non-profit security testing organization, recently tested several vendors’ security service edge (SSE) offerings with the goal of deriving empirical data that would answer the...
View ArticleMobile, IoT, and OT Threats: 5 Key Takeaways for Healthcare, Government, and...
The rapid integration of mobile, internet of things (IoT), and operational technology (OT) devices into enterprise networks is playing a large part in reshaping the cyber threat landscape, especially...
View Article