Zscaler expands Digital Experience with AI-powered insights to support workforce productivity

Zscaler has expanded Zscaler Digital Experience (ZDX), an integrated solution that provides end-to-end visibility and IT troubleshooting capabilities accessed through the Zscaler security cloud. The modern workforce is geographically dispersed, resulti… Continue reading Zscaler expands Digital Experience with AI-powered insights to support workforce productivity

Generative AI and security: Balancing performance and risk

Are we moving too fast with AI? This is a central question both inside and outside the tech industry, given the recent tsunami of attention paid to ChatGPT and other generative AI tools. Nearly all tech companies are moving to incorporate AI into their… Continue reading Generative AI and security: Balancing performance and risk

Photos: RSA Conference 2023, part 2

RSA Conference 2023 is taking place at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Part 1 of the photos is available here. Here are a few photos from the event, featured vendors inclu… Continue reading Photos: RSA Conference 2023, part 2

AI tools help attackers develop sophisticated phishing campaigns

Phishing scams are a growing threat, and cybercriminals’ methods are becoming increasingly sophisticated, making them harder to detect and block, according to Zscaler report. The report found that a majority of modern phishing attacks rely on stolen cr… Continue reading AI tools help attackers develop sophisticated phishing campaigns

LogRhythm and Zscaler integration streamlines website access control

LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the modern SOC. LogRhythm SIEM and the Zscaler Zero Trust Exchange platform provide v… Continue reading LogRhythm and Zscaler integration streamlines website access control

3CX supply chain attack: What do we know?

Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the software’s manufacturer is yet to confirm how the Windows and macOS desktop apps (based on the Electron software framework) have be… Continue reading 3CX supply chain attack: What do we know?

Known unknowns: Refining your approach to uncategorized web traffic

Cybersecurity is such a complex field that even the best-trained, best-equipped, and most experienced security managers will sometimes struggle to decide which of several paths to take. Let’s consider uncategorized web traffic, for instance. I define t… Continue reading Known unknowns: Refining your approach to uncategorized web traffic

Enhance security while lowering IT overhead in times of recession

“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and severity looms and many organizations are tightening their belts. While resea… Continue reading Enhance security while lowering IT overhead in times of recession

Zscaler acquires Canonic Security to accelerate how enterprises address SaaS-native threats

Zscaler acquires Canonic Security to prevent organizations’ growing risks of SaaS supply chain attacks. With the massive migration to the cloud, as organizations are adopting hundreds of SaaS platforms, their users are connecting thousands of thi… Continue reading Zscaler acquires Canonic Security to accelerate how enterprises address SaaS-native threats