The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
The Edge
DR Tech
Sections
Close
Back
Sections
Featured Sections
The Edge
Dark Reading Technology
Attacks / Breaches
Cloud
ICS/OT
Remote Workforce
Perimeter
Analytics
Security Monitoring
Security Monitoring
App Sec
Database Security
Database Security
Risk
Compliance
Compliance
Threat Intelligence
Endpoint
Authentication
Mobile Security
Privacy
Authentication
Mobile Security
Privacy
Vulnerabilities / Threats
Advanced Threats
Insider Threats
Vulnerability Management
Advanced Threats
Insider Threats
Vulnerability Management
Operations
Identity & Access Management
Careers & People
Identity & Access Management
Careers & People
Physical Security
IoT
Black Hat news
Omdia Research
Security Now
Events
Close
Back
Events
Events
Black Hat USA - August 5-10 - Learn More
Black Hat Asia - May 9-12 - Learn More
Webinars
ChatGPT: Defending Your Business Against AI-Supercharged Ransomware
Mar 29, 2023
Ten Emerging Vulnerabilities Every Enterprise Should Know
Mar 30, 2023
Resources
Close
Back
Resources
Dark Reading Library >
Webinars >
Reports >
Slideshows >
White Papers >
Partner Perspectives: Microsoft
Tech Library >
Newsletter
SEARCH
A minimum of 3 characters are required to be typed in the search bar in order to perform a search.
Announcements
Event
How to Launch a Threat Hunting Program | Webinar <REGISTER>
Event
How to Accelerate XDR Outcomes: Bridging the Gap Between Network and Endpoint | Webinar <REGISTER>
Report
Black Hat USA 2022 Attendee Report | Supply Chain & Cloud Security Risks Are Top of Mind | <READ IT NOW>
Previous
Next
Zscaler
Encrypted Traffic, Once Thought Safe, Now Responsible For Most Cyberthreats
It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
February 16, 2023
It's a classic attacker move: Use security protections against those who deploy them. But organizations can still defuse and prevent these encrypted attacks.
by Deepen Desai, CISO and VP, Security Research, Zscaler
February 16, 2023
4 MIN READ
Article
A Fool With a Tool Is Still a Fool: A Cyber Take
New tech often requires new thinking — but that's harder to install.
February 07, 2023
New tech often requires new thinking — but that's harder to install.
by Tony Fergusson, CISO EMEA, Zscaler
February 07, 2023
5 MIN READ
Article
Cybercrime Shows No Signs of Slowing Down
Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
February 06, 2023
Look for recent trends in attacks, strategies, and vulnerabilities to continue gaining steam throughout 2023.
by Emily Laufer, Senior Manager of Product Marketing, ThreatLabz, Zscaler
February 06, 2023
3 MIN READ
Article
Predictions For Securing Today's Hybrid Workforce
Since requirements differ for users who work both from home and in the office, policies — and underlying technology — must adapt.
January 31, 2023
Since requirements differ for users who work both from home and in the office, policies — and underlying technology — must adapt.
by Kanishka Pandit, Senior Product Marketing Manager, Zscaler
January 31, 2023
4 MIN READ
Article
Unleash the Full Potential of Zero-Trust Security
The demand is unmistakeable and the business case is readily justified — it's time to implement zero trust.
January 31, 2023
The demand is unmistakeable and the business case is readily justified — it's time to implement zero trust.
by Emily Laufer, Senior Manager of Product Marketing, ThreatLabz, Zscaler
January 31, 2023
4 MIN READ
Article
Multicloud Security Challenges Will Persist in 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
January 25, 2023
Some predictions about impending security challenges, with a few tips for proactively addressing them.
by Rich Campagna, Senior Vice President and General Manager, CNAPP, Zscaler
January 25, 2023
4 MIN READ
Article
As Social Engineering Tactics Change, So Must Your Security Training
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
January 19, 2023
Craft specific awareness training for high-exposure teams like finance, and reinforce other critical awareness training across the organization.
by Ben Corll, CISO Americas, Zscaler
January 19, 2023
5 MIN READ
Article
5 Ways Cybersecurity for Cloud Workloads Will Evolve in 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
January 11, 2023
Organizations are looking for new methods to safeguard the virtual machines, containers, and workload services they use in the cloud.
by Sakthi Chandra, Senior Director, Product Marketing, Zscaler
January 11, 2023
4 MIN READ
Article
Securing and Improving User Experience for the Future of Hybrid Work
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
December 28, 2022
Digital transformation initiatives are challenging because IT still has to make sure performance doesn't suffer by making applications available from anywhere.
by Rohit Goyal, director of product marketing, Zscaler
December 28, 2022
5 MIN READ
Article
Best Practices for Securing and Governing Your Multicloud Deployment
Organizations can start by integrating functions like detection, prioritization, and remediation on to a single platform.
December 21, 2022
Organizations can start by integrating functions like detection, prioritization, and remediation on to a single platform.
by Rich Campagna, senior vice-president and general manager, CNAPP, Zscaler
December 21, 2022
4 MIN READ
Article
Paying Ransom: Why Manufacturers Shell Out to Cybercriminals
Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.
December 20, 2022
Lower cybersecurity awareness coupled with vulnerable OT gear makes manufacturers tempting targets, but zero trust can blunt attackers’ advantages.
by Ben Corll, CISO Americas, Zscaler
December 20, 2022
5 MIN READ
Article
Of Exploits and Experts: The Professionalization of Cybercrime
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
December 01, 2022
No longer the realm of lone wolves, the world of cybercrime is increasingly strategic, commoditized, and collaborative.
by CXO REvolutionaries Staff, Zscaler
December 01, 2022
5 MIN READ
Article
Connect the Dots with Genetic Algorithms on CNAPP
Cloud-native application protection platforms can apply machine-learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
November 30, 2022
Cloud-native application protection platforms can apply machine-learning algorithms on cloud data to identify accounts with abnormal permissions and uncover potential threats.
by Rich Campagna, senior vice-president and general manager, CNAPP, Zscaler
November 30, 2022
3 MIN READ
Article
Charting the Path to Zero Trust: Where to Begin
Your journey to zero trust can be perilous if you are using legacy equipment that wasn’t designed for it. Begin the transformation where it makes the most sense for your organization.
November 18, 2022
Your journey to zero trust can be perilous if you are using legacy equipment that wasn’t designed for it. Begin the transformation where it makes the most sense for your organization.
by Jennifer Toscano, senior product marketing manager, Zscaler
November 18, 2022
5 MIN READ
Article
How AI Can Deliver the Next Phase of Scalability
AI will help enterprises scale cybersecurity defenses to handle the growing complexity of modern networks and increased number of cyber threats.
November 02, 2022
AI will help enterprises scale cybersecurity defenses to handle the growing complexity of modern networks and increased number of cyber threats.
by Howie Xu, Vice President of AI and Machine Learning, Zscaler
November 02, 2022
4 MIN READ
Article