Quantcast
Channel: Blogs Feed
Browsing all 1471 articles
Browse latest View live

Protect Your Healthcare Facility By Understanding the Anatomy of a Ransomware...

There used to be some honor among thieves. Threat actors, once upon a time, left healthcare providers alone to avoid the potential of killing a patient. Unfortunately, those times are behind us. Today,...

View Article


How Multifactor Authentication Strengthens Remote Access Security

Understanding Multifactor AuthenticationMultifactor authentication (MFA) is a critical layer of defense in remote access security, requiring users to verify their identity through multiple methods in...

View Article


Top 10 Data Protection Best Practices for Your Data Program

Data is the lifeblood of productivity, and protecting sensitive data is more critical than ever. With cyberthreats evolving rapidly and data privacy regulations tightening, organizations must stay...

View Article

NodeLoader Exposed: The Node.js Malware Evading Detection

IntroductionZscaler ThreatLabz discovered a malware campaign leveraging Node.js applications for Windows to distribute cryptocurrency miners and information stealers. We have named this malware family...

View Article

Technical Analysis of RiseLoader

IntroductionIn October 2024, Zscaler ThreatLabz came across malware samples that use a network communication protocol that is similar to RisePro. However, unlike RisePro which has primarily been used...

View Article


Defending Against Encrypted Threats: A Guide to SSL Traffic Inspection with...

Full traffic inspection at scale over all ports and protocols is fundamental to the protection Zscaler provides customers: without inline inspection of encrypted traffic, customers cannot leverage the...

View Article

Modernizing Cloud Workload Policies: Using Tags and Attributes with Zscaler...

Intro and Some HistoryIf you’re reading this, you’re probably familiar with Zscaler Private Access (ZPA) and the Zero Trust model. When we introduced ZPA around 2016, it was a key step in helping...

View Article

Unified SaaS Security: Best Practices to Protect SaaS Applications with Zscaler

IntroductionThe rapid adoption of software-as-a-service (SaaS) apps has transformed how businesses operate, offering flexibility and scale. However, it has also expanded the attack surface, increased...

View Article


VPN vs. ZTNA: Which is Better for Secure Remote Access?

With this blog, we’re going on a journey that presents twists and turns as we compare two means of securing hybrid workforces and their access to applications, data, and other internet-based services:...

View Article


Experience Center Update: Your Unified SASE Experience is Here

The Most Comprehensive Zero Trust SASE Platform is Now Even BetterWe’re redefining secure access service edge (SASE) with the latest update to Zscaler's Experience Center—providing a unified, intuitive...

View Article

Guarding the Holiday Spirit: Staying Cybersecure in a Season of Distraction

Twinkling lights, inboxes overflowing with holiday deals, office chatter about Secret Santa, and last-minute vacation plans—the sweet chaos of the holiday season. But while you’re weighing Die Hard...

View Article
Browsing all 1471 articles
Browse latest View live