The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Emerging Cybersecurity Technologies - A Dark Reading Mar 23 Event
Black Hat USA - August 5-10 - Learn More
Webinars
Rethinking Authentication: MFA, Passwordless, Certificates, and More
Feb 09, 2023
Deciphering the Hype Around XDR
Feb 16, 2023
Resources
Close
Back
Resources
Reports >
Slideshows >
Tech Library >
Webinars >
White Papers >
Partner Perspectives: Microsoft
Partner Perspectives: Zscaler
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
Emerging Cybersecurity Technologies: What You Need to Know - A Dark Reading March 23 Virtual Event | <GET YOUR PASS>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Zscaler
Multicloud Security Challenges Will Persist in 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
January 25, 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
by Rich Campagna, Senior Vice President and General Manager, CNAPP, Zscaler
January 25, 2023
4 MIN READ
Article
As Social Engineering Tactics Change, So Must Your Security Training
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
January 19, 2023
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
by Ben Corll, CISO Americas, Zscaler
January 19, 2023
5 MIN READ
Article
5 Ways Cybersecurity for Cloud Workloads Will Evolve in 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
January 11, 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
by Sakthi Chandra, Senior Director, Product Marketing, Zscaler
January 11, 2023
4 MIN READ
Article
Securing and Improving User Experience for the Future of Hybrid Work
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
December 28, 2022
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
by Rohit Goyal, director of product marketing, Zscaler
December 28, 2022
5 MIN READ
Article
Best Practices for Securing and Governing Your Multicloud Deployment
Organizations can start by integrating functions like detection, prioritization, and remediation on to a single platform.
December 21, 2022
Organizations can start by integrating functions like detection, prioritization, and remediation on to a single platform.
by Rich Campagna, senior vice-president and general manager, CNAPP, Zscaler
December 21, 2022
4 MIN READ
Article
Paying Ransom: Why Manufacturers Shell Out to Cybercriminals
Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.
December 20, 2022
Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.
by Ben Corll, CISO Americas, Zscaler
December 20, 2022
5 MIN READ
Article
Of Exploits and Experts: The Professionalization of Cybercrime
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
December 01, 2022
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
by CXO REvolutionaries Staff, Zscaler
December 01, 2022
5 MIN READ
Article
Connect the Dots with Genetic Algorithms on CNAPP
Cloud-native application protection platforms can apply machine-learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
November 30, 2022
Cloud-native application protection platforms can apply machine-learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
by Rich Campagna, senior vice-president and general manager, CNAPP, Zscaler
November 30, 2022
3 MIN READ
Article
Charting the Path to Zero Trust: Where to Begin
Your journey to zero trust can be perilous if you are using legacy equipment that wasn’t designed for it. Begin the transformation where it makes the most sense for your organization.
November 18, 2022
Your journey to zero trust can be perilous if you are using legacy equipment that wasn’t designed for it. Begin the transformation where it makes the most sense for your organization.
by Jennifer Toscano, senior product marketing manager, Zscaler
November 18, 2022
5 MIN READ
Article
How AI Can Deliver the Next Phase of Scalability
AI will help enterprises scale cybersecurity defenses to handle the growing complexity of modern networks and increased number of cyber threats.
November 02, 2022
AI will help enterprises scale cybersecurity defenses to handle the growing complexity of modern networks and increased number of cyber threats.
by Howie Xu, Vice President of AI and Machine Learning, Zscaler
November 02, 2022
4 MIN READ
Article