Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Zero Compromise with Content Disarm and Reconstruction (CDR), powered by...

Files are the core of business operations, whether your employees need to download/upload a file or transfer to/from partners, customers and suppliers. Zero-day threats could often hide within benign...

View Article


Racing to the Supermarket

What my Shopping Trips have in Common with TOYOTA GAZOO Racing World Rally Team This year I had the opportunity to visit the incredible Finnish round of the World Rally Championship at the beginning of...

View Article


Shining Light on the Dark Angels Ransomware Group

The Dark Angels ransomware threat group launched attacks beginning in April 2022, and has since been quietly executing highly targeted attacks. Dark Angels operate with more stealthy and sophisticated...

View Article

QUIC: The Secure Communication Protocol Shaping the Internet’s Future

As the internet has evolved dramatically in the last few decades, so too has the underlying technology that powers it. QUIC is one of those exciting innovations: it’s a new transport protocol developed...

View Article

Another Milestone: Zscaler’s Daily Transactions Pass Half a Trillion!

The Largest and Most Trusted Security CloudIn support of our vision for a future built around zero trust, Zscaler’s security technology is served through the world’s largest inline security cloud. What...

View Article


Disable XFF Header insertion

Zscaler, working as an inline proxy, inserts the XFF header in the HTTP/ HTTPS packets that egress from the service. This is true for all traffic that is SSL decrypted and encrypted through the Zscaler...

View Article

Are You Enabling a Resilient Workplace?

For most organisations, a remote/hybrid workforce is here to stayAberdeen’s 2024 Future of the Workplace study found that today’s IT professionals are challenged to provide a larger number of remote /...

View Article

Building a Resilient Hybrid Workforce: Future-Proofing IT for Remote Work

Cybersecurity- and compliance-related risks are all too real, and reflect the realities of a complex and dynamic computing environment Aberdeen’s 2024 Future of the Workplace study found that today’s...

View Article


Technical Analysis of DarkVision RAT

IntroductionDarkVision RAT is a highly customizable remote access trojan (RAT) that first surfaced in 2020, offered on Hack Forums and their website for as little as $60. Written in C/C++, and...

View Article


The FCC’s Cyber Program: Strengthening America’s Cybersecurity Through K-12...

The Federal Communications Commission’s (FCC) Cybersecurity Pilot Program is leveling the playing field for K-12 education institutions to press on the gas toward zero trust and make the paradigm shift...

View Article

SASE vs. Zero Trust: What's the Difference?

The world of cybersecurity, as with seemingly every area of tech, is rife with jargon and acronyms. Knowing the meaning of each is part of the battle, but then comes understanding how they fit...

View Article

HTTP/2: Better, Faster, Stronger

The evolution of web communication protocols is a testament to the continuous pursuit of faster, more efficient and secure data transfer methods. Most of us have experienced days where web pages have...

View Article

New ThreatLabz Report: Mobile remains a top threat vector with 111% spyware...

The role of the CISO continues to expand, driven by the rising number of breaches and cyberattacks like ransomware, as well as SEC requirements for public organizations to disclose material breaches....

View Article


Introducing New Business Continuity Solutions

Zscaler, trusted for resilience As we recently announced, Zscaler continues to grow, adding more and more customers seeking a trusted security cloud that provides protection and a great user...

View Article

Understanding the Digital Personal Data Protection (DPDP) Act: A...

If you’re a business with Indian customers, or your mobile app or website is accessible to them, it’s crucial to familiarize yourself with India's new data protection legislation: The Digital Personal...

View Article


Zscaler Introduces Geolocalization

In the previous post on this topic, I introduced the problem that security admins face in ensuring uniform security policies for their users in countries not serviced by a local Zscaler PoP. When you...

View Article

Effective DSPM Strategies for Data Security in the Retail Industry

The retail sector continues to grow rapidly, particularly following the COVID-19 pandemic, as more and more people shop online. Currently, more than 26.6 million online retailers operate globally. Many...

View Article


Simplify Secure Connectivity to Business Partners’ Private Apps

In today's fast-paced business environment, organizations collaborate with an ecosystem of business partners. Therefore, the need for seamless, secure connectivity to applications and resources hosted...

View Article

Understanding the CyberRatings SSE Report and Why Zscaler is Named A Top...

CyberRatings, the leading non-profit security testing organization, recently tested several vendors’ security service edge (SSE) offerings with the goal of deriving empirical data that would answer the...

View Article

Mobile, IoT, and OT Threats: 5 Key Takeaways for Healthcare, Government, and...

The rapid integration of mobile, internet of things (IoT), and operational technology (OT) devices into enterprise networks is playing a large part in reshaping the cyber threat landscape, especially...

View Article
Browsing all 1471 articles
Browse latest View live