Quantcast
Channel: Blog
Browsing all 1616 articles
Browse latest View live

I StealC You: Tracking the Rapid Changes To StealC

IntroductionStealC is a popular information stealer and malware downloader that has been sold since January 2023. In March 2025, StealC version 2 (V2) was introduced with key updates, including a...

View Article


From Tangled Wires to Seamless Security: A Healthcare Leader’s Path to Zero...

On April 8, 2025, I had the privilege of joining an incredible webinar titled Keys to Charting an Optimal Zero Trust Journey. Alongside Erik Decker, VP/CISO of Intermountain Healthcare, and Greg...

View Article


Achieving ROI in CMMC

The journey to achieving compliance with the Cybersecurity Maturity Model Certification (CMMC) isn’t meant to become a checklist exercise; CMMC is a cybersecurity catalyst driving significant...

View Article

A New Chapter with Zscaler: Securing the Agentic-Ready Enterprise

Throughout my career advising Fortune 100 companies and leading large-scale transformations at EY, I’ve seen firsthand how organizations evolve in waves. First comes the adopting of new technologies,...

View Article

Celebrating our 2025 CRN Women of the Channel Honorees

Each year, CRN’s Women of the Channel list honors female executives whose strategic vision, dedication and leadership are transforming the technology channel. At Zscaler, we are so proud to see so many...

View Article


Taking Control: Exploring HTTP Header Control

In a world where every click, scroll, and stream leaves a trail, web security isn’t just a checkbox – it’s survival. And for many enterprises navigating this digital sprawl, Zscaler Internet Access...

View Article

Technical Analysis of TransferLoader

IntroductionZscaler ThreatLabz has identified a new malware loader that we have named TransferLoader, which has been active since at least February 2025. ThreatLabz has identified three different...

View Article

Securing Connected Assets in Government and Education with Zscaler and Armis

In an era where digital transformation is redefining the way government and educational institutions operate, the need for robust cybersecurity solutions has never been more pressing. From smart city...

View Article


Beyond the Perimeter 2025 Unifying Security to Enhance Cyber Resilience in...

"Beyond the Perimeter 2025", an annual virtual event co-hosted by Zscaler, Okta, and CrowdStrike, was an insightful event that brought together the brightest minds in cybersecurity to discuss emerging...

View Article


It's Not Too Late To Ditch Your VPN: Why ZPA Is The Superior Secure Access...

In the previous blog, we examined the weaknesses and limitations VPNs and how Zscaler's purpose-built architecture for private access addresses them. In this post, we will dive deeper into how Zscaler...

View Article

Implementing CMMC with a Zero Trust Roadmap

In this third and final post, Zscaler and C3 Integrated Solutions not only re-examine the workflow between CMMC and Zero Trust, but the real-world perspective. We focus here on the operational cyber...

View Article

Enhancing Zscaler Management with Claude Desktop Integrations

IntroductionIn today's complex cybersecurity landscape, security professionals are constantly seeking ways to simplify management and increase efficiency. Managing security often requires navigating...

View Article

Why Uptime is the New Cybersecurity KPI in Manufacturing

Complexity is the enemy of uptimeA technician arrives at your factory floor to service a critical machine, a routine task crucial for maintaining production flow. Instead of seamlessly connecting and...

View Article


Why Manufacturing CIOs Are Extending Zero Trust Inside the Factory

Why Manufacturing CIOs Are Extending Zero Trust Inside the Factory Perimeter-based security models are unraveling in industrial environments where network boundaries have grown complex. Traditional...

View Article

How Zscaler Ensures Data Control %26 Supports Digital Sovereignty Across Europe

In today’s increasingly digital and complex geopolitical landscape, one technology trend is coming to the forefront: Knowing where your data is stored and processed is no longer a luxury—it’s a...

View Article


States, Cybersecurity, and Strategic Tech: Key Insights from NASCIO's...

For states, grit and partnerships have become the modern equivalent of MacGyver's shoestrings and bubble gum when tackling technology challenges. With operational demands increasing and funding...

View Article

Playing buzzword bingo with “Data Fabric for Security”

Like in a lot of areas of life, cyber marketing moves through fads. And we’re clearly seeing a fad these days around the term “Data Fabric for Security.” I’m in marketing, and have been for decades,...

View Article


Operation Endgame 2.0: DanaBusted

IntroductionOn May 22, 2025, international law enforcement agencies released information about additional actions that were taken in conjunction with Operation Endgame, an ongoing, coordinated effort...

View Article

267% ROI – The Business Impact of Zscaler Internet Access

If you’re like most IT and security pros, your to-do list looks like a game of whack-a-mole—troubleshooting slow internet here, wrestling with clunky security policies there, and spending way too much...

View Article

Zscaler Named a Leader in the 2025 Gartner® Magic Quadrant™ for Security...

IntroductionAt Zscaler, our mission is to secure, simplify, and accelerate business transformation, empowering your organization to be more competitive. For more than 15 years, we have been pioneering...

View Article
Browsing all 1616 articles
Browse latest View live