Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware...
There used to be some honor among thieves. Threat actors, once upon a time, left healthcare providers alone to avoid the potential of killing a patient. Unfortunately, those times are behind us. Today,...
View ArticleHow Multifactor Authentication Strengthens Remote Access Security
Understanding Multifactor AuthenticationMultifactor authentication (MFA) is a critical layer of defense in remote access security, requiring users to verify their identity through multiple methods in...
View ArticleTop 10 Data Protection Best Practices for Your Data Program
Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyberthreats evolving rapidly and data privacy regulations tightening, organizations must stay...
View ArticleNodeLoader Exposed: The Node.js Malware Evading Detection
IntroductionZscaler ThreatLabz discovered a malware campaign leveraging Node.js applications for Windows to distribute cryptocurrency miners and information stealers. We have named this malware family...
View ArticleTechnical Analysis of RiseLoader
IntroductionIn October 2024, Zscaler ThreatLabz came across malware samples that use a network communication protocol that is similar to RisePro. However, unlike RisePro which has primarily been used...
View ArticleDefending Against Encrypted Threats: A Guide to SSL Traffic Inspection with...
Full traffic inspection at scale over all ports and protocols is fundamental to the protection Zscaler provides customers: without inline inspection of encrypted traffic, customers cannot leverage the...
View ArticleModernizing Cloud Workload Policies: Using Tags and Attributes with Zscaler...
Intro and Some HistoryIf you’re reading this, you’re probably familiar with Zscaler Private Access (ZPA) and the Zero Trust model. When we introduced ZPA around 2016, it was a key step in helping...
View ArticleUnified SaaS Security: Best Practices to Protect SaaS Applications with Zscaler
IntroductionThe rapid adoption of software-as-a-service (SaaS) apps has transformed how businesses operate, offering flexibility and scale. However, it has also expanded the attack surface, increased...
View ArticleVPN vs. ZTNA: Which is Better for Secure Remote Access?
With this blog, we’re going on a journey that presents twists and turns as we compare two means of securing hybrid workforces and their access to applications, data, and other internet-based services:...
View ArticleExperience Center Update: Your Unified SASE Experience is Here
The Most Comprehensive Zero Trust SASE Platform is Now Even BetterWe’re redefining secure access service edge (SASE) with the latest update to Zscaler's Experience Center—providing a unified, intuitive...
View ArticleGuarding the Holiday Spirit: Staying Cybersecure in a Season of Distraction
Twinkling lights, inboxes overflowing with holiday deals, office chatter about Secret Santa, and last-minute vacation plans—the sweet chaos of the holiday season. But while you’re weighing Die Hard...
View ArticleStrengthen your enterprise security posture with MITRE ATT&CK mapping to...
Defending an enterprise against modern-day attacks remains an increasingly difficult challenge that requires, among other things, advanced technologies and innovative approaches for thwarting an...
View ArticleRethinking IoT Identity
The proliferation of IoT devices in the enterprise environment has been improving the business operation dramatically in the last couple of decades, but at the same time, they also pose tremendous...
View ArticleTop 5 Business Continuity Challenges in Cybersecurity
The Importance of Cybersecurity in Business Continuity In today’s hyper-connected world, business continuity is essential for maintaining operational resilience amidst growing cybersecurity risks. With...
View ArticleThe Secrets to a Successful DSPM Deployment: Overcoming Challenges and...
With 90% of the world's data created in the past two years, and a projected total of 181 zettabytes by 2025, securing valuable data is the number one priority among organizations today. Yet many...
View ArticleLondon’s Calling: Zenith Live Encore Kicks Off Its EMEA Tour
It was an absolute honor to host the Zenith Live Encore event in London alongside our Software Engineering leader, Lee Langley. With over 200 guests joining us, the day was packed with inspiring...
View Article8 Cyber Predictions for 2025: A CSO’s Perspective
As we step into 2025, the cyberthreat landscape is once again more dynamic and challenging than the year before. In 2024, we witnessed a remarkable acceleration in cyberattacks of all types, many...
View ArticleIsolating Encrypted Threats to Cloud Browser when SSL/TLS inspection is not...
SSL/TLS inspection With the increasing popularity of cloud SaaS applications more and more sensitive data is exchanged over the internet, as a result of this it is imperative to ensure that the data is...
View ArticleReady for Microsoft Copilot? Chances Are Your Data Isn’t.
This blog examines how Microsoft Copilot interacts with your Microsoft 365 data. While Copilot can enhance productivity, its access to all tenant data introduces new risks of data exposure. For more...
View ArticleEnable Secure Access to VoIP and other Server to Client Applications with ZPA
Accelerate the transformation towards Zero Trust access by bringing VoIP, Server to client and other legacy applications over to Zscaler Private Access (ZPA). Customer Challenges The traditional...
View Article