Quantcast
Browsing all 1553 articles
Browse latest View live

Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware...

There used to be some honor among thieves. Threat actors, once upon a time, left healthcare providers alone to avoid the potential of killing a patient. Unfortunately, those times are behind us. Today,...

View Article


How Multifactor Authentication Strengthens Remote Access Security

Understanding Multifactor AuthenticationMultifactor authentication (MFA) is a critical layer of defense in remote access security, requiring users to verify their identity through multiple methods in...

View Article


Top 10 Data Protection Best Practices for Your Data Program

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyberthreats evolving rapidly and data privacy regulations tightening, organizations must stay...

View Article

NodeLoader Exposed: The Node.js Malware Evading Detection

IntroductionZscaler ThreatLabz discovered a malware campaign leveraging Node.js applications for Windows to distribute cryptocurrency miners and information stealers. We have named this malware family...

View Article

Technical Analysis of RiseLoader

IntroductionIn October 2024, Zscaler ThreatLabz came across malware samples that use a network communication protocol that is similar to RisePro. However, unlike RisePro which has primarily been used...

View Article


Defending Against Encrypted Threats: A Guide to SSL Traffic Inspection with...

Full traffic inspection at scale over all ports and protocols is fundamental to the protection Zscaler provides customers: without inline inspection of encrypted traffic, customers cannot leverage the...

View Article

Modernizing Cloud Workload Policies: Using Tags and Attributes with Zscaler...

Intro and Some HistoryIf you’re reading this, you’re probably familiar with Zscaler Private Access (ZPA) and the Zero Trust model. When we introduced ZPA around 2016, it was a key step in helping...

View Article

Unified SaaS Security: Best Practices to Protect SaaS Applications with Zscaler

IntroductionThe rapid adoption of software-as-a-service (SaaS) apps has transformed how businesses operate, offering flexibility and scale. However, it has also expanded the attack surface, increased...

View Article


VPN vs. ZTNA: Which is Better for Secure Remote Access?

With this blog, we’re going on a journey that presents twists and turns as we compare two means of securing hybrid workforces and their access to applications, data, and other internet-based services:...

View Article


Experience Center Update: Your Unified SASE Experience is Here

The Most Comprehensive Zero Trust SASE Platform is Now Even BetterWe’re redefining secure access service edge (SASE) with the latest update to Zscaler's Experience Center—providing a unified, intuitive...

View Article

Guarding the Holiday Spirit: Staying Cybersecure in a Season of Distraction

Twinkling lights, inboxes overflowing with holiday deals, office chatter about Secret Santa, and last-minute vacation plans—the sweet chaos of the holiday season. But while you’re weighing Die Hard...

View Article

Strengthen your enterprise security posture with MITRE ATT&CK mapping to...

Defending an enterprise against modern-day attacks remains an increasingly difficult challenge that requires, among other things, advanced technologies and innovative approaches for thwarting an...

View Article

Rethinking IoT Identity

The proliferation of IoT devices in the enterprise environment has been improving the business operation dramatically in the last couple of decades, but at the same time, they also pose tremendous...

View Article


Top 5 Business Continuity Challenges in Cybersecurity

The Importance of Cybersecurity in Business Continuity In today’s hyper-connected world, business continuity is essential for maintaining operational resilience amidst growing cybersecurity risks. With...

View Article

The Secrets to a Successful DSPM Deployment: Overcoming Challenges and...

With 90% of the world's data created in the past two years, and a projected total of 181 zettabytes by 2025, securing valuable data is the number one priority among organizations today. Yet many...

View Article


London’s Calling: Zenith Live Encore Kicks Off Its EMEA Tour

It was an absolute honor to host the Zenith Live Encore event in London alongside our Software Engineering leader, Lee Langley. With over 200 guests joining us, the day was packed with inspiring...

View Article

8 Cyber Predictions for 2025: A CSO’s Perspective

As we step into 2025, the cyberthreat landscape is once again more dynamic and challenging than the year before. In 2024, we witnessed a remarkable acceleration in cyberattacks of all types, many...

View Article


Isolating Encrypted Threats to Cloud Browser when SSL/TLS inspection is not...

SSL/TLS inspection With the increasing popularity of cloud SaaS applications more and more sensitive data is exchanged over the internet, as a result of this it is imperative to ensure that the data is...

View Article

Ready for Microsoft Copilot? Chances Are Your Data Isn’t.

This blog examines how Microsoft Copilot interacts with your Microsoft 365 data. While Copilot can enhance productivity, its access to all tenant data introduces new risks of data exposure. For more...

View Article

Enable Secure Access to VoIP and other Server to Client Applications with ZPA

Accelerate the transformation towards Zero Trust access by bringing VoIP, Server to client and other legacy applications over to Zscaler Private Access (ZPA). Customer Challenges The traditional...

View Article
Browsing all 1553 articles
Browse latest View live