Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Zscaler Private Access Now Provides Robust Business Continuity Without...

Organizations need uninterrupted access to applications, without compromising zero trust security during disasters or network outages. Downtime can be devastating, leading to lost productivity and...

View Article


WebSockets Unveiled: Powering Immersive and Interactive Web Experiences

WebSockets have transformed real-time communication on the web, breaking down the barriers of traditional one-way HTTP connections. WebSockets transform websites into dynamic, interactive experiences...

View Article


3 Lessons Learned about the Indispensable Chemistry Between Zero Trust and...

Securing innovation with indispensable chemistryIn a world where organizations are fueled by innovation, security is often seen as the gatekeeper that hampers creativity and productivity in order to...

View Article

Enhancing Law Enforcement Connectivity and Security with Zscaler Private Access

For law enforcement, seamless and secure connectivity is non-negotiable. For more than two decades, NetMotion Wireless has been a cornerstone technology, providing always-on VPN connectivity to patrol...

View Article

Mitigating Unauthorized Access in the Workplace

If you owned a high-performance sports car—something sleek, powerful, and built to perform—you wouldn’t hand the keys to just anyone. Allowing unauthorized access in the workplace is much the same:...

View Article


Taming the CVE Chaos: Making Unified Vulnerability Management a Reality for...

As a former customer in the trenches of vulnerability management, I’ve had my share of hair-pulling moments. I’ve stared down CVE (Common Vulnerabilities and Exposures) lists so long they could double...

View Article

SmokeBuster: Keeping Systems SmokeLoader Free

IntroductionIn May 2024, international law enforcement agencies, in collaboration with private industry partners (including Zscaler ThreatLabz), conducted Operation Endgame, disrupting many prominent...

View Article

Productivity and Security On Any Device - now in Turbo Mode

Productivity and security must be complementary, but as we know, all too often, one contradicts the other. Security can slow productivity, while productivity without security opens up enterprises to...

View Article


Cloud Browser Isolation Attains FedRAMP For More Secure Web Browsing and...

In an age where cyber threats evolve at an alarming pace, government agencies are under constant pressure to safeguard their data and infrastructure. The importance of robust cybersecurity measures...

View Article


From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in...

IntroductionIn November 2023, a security vendor discovered that North Korean threat actors were using the Contagious Interview and WageMole campaigns to procure remote employment opportunities in...

View Article

Revolutionizing Monitoring: Beyond Users, Into Applications and Services

Digital services are at the heart of every enterprise, whether it’s employee productivity or driving higher customer engagement. The key to success is reducing the mean time to resolution and...

View Article

SASE vs. SSE: What’s the Difference?

Cybersecurity has no shortage of acronyms. With DLP, SSL, IPS ATP, DSPM, DNS, ML, and many others, “alphabet soup” comes to mind. Most of these correspond to technologies or frameworks that address...

View Article

Why DSPM Matters: Strengthen Data Security Posture Management to Prevent...

Data breaches more than tripled in volume between 2013 and 2022, highlighting the urgent need for comprehensive data security posture management (DSPM) to safeguard sensitive data from modern security...

View Article


DoD’s CUI Compliance Tree Is Set to Bear Fruit in 2025... Just In Time to be...

(Not So) Fun Fact: American Apple trees take between 2-5 years to bear fruit. Similarly, the Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) has taken the same timeline...

View Article

The Ultimate Guide to IT Help Desk Troubleshooting: Device, Network, and SaaS...

In the rapidly evolving landscape of corporate IT, where time is of the essence and optimal performance is of utmost importance, the position of an IT help desk agent is both demanding and vital. Let's...

View Article


Zero Trust Meets Multicloud: A Guide to Secure Workload Segmentation

As businesses migrate applications from traditional data centers to the cloud, they face new challenges in securing them effectively. The attack surface and potential blast radius have expanded,...

View Article

Zero Trust Branch: Say Goodbye to Lateral Threat Movement

The growing network & security sprawlLegacy network architectures were designed for a world where your employees were all in offices, and your applications were in data centers. We built and...

View Article


Zero Trust Inside: Device Segmentation for Branch, Factory, and Campus

Legacy Network and Security ArchitecturesIn today’s complex digital landscape, lateral threat movement inside the branch, factory, and campus —where malware or attackers pivot across a network—remains...

View Article

Introducing Zero Trust Segmentation: Zero Lateral Threat Movement With Zero...

We're thrilled to unveil Zscaler's Zero Trust Segmentation solution, offering a simpler, more secure, and cost-effective way for users, devices, and workloads to communicate—across and within branch,...

View Article

Zscaler Platform Automation: Introducing OneAPI

Zscaler was founded in 2007 as a true cloud-native zero trust platform, and every Zscaler service is built and delivered with an API first approach. For the longest time, Zscaler deployment,...

View Article
Browsing all 1471 articles
Browse latest View live