Category

Security
Third Party Risks There is a growing number of security threats linked to third party supplier and contractor access and over the last few years the media spotlight has shone on high-profile companies, such as Equifax, Yahoo, Target, Goodwill, Home Depot and Uber. The latest high-profile company to make media headlines is PayPal for a...
Read More
Cloud Security Companies are increasingly aware of the need for digital transformation and many organizations are rapidly adopting cloud computing. However, some companies are missing out on realizing the many benefits of cloud computing due to commonly held misunderstandings and misconceptions around deploying and running applications in the cloud, including cloud security. Cloud computing, which...
Read More
devices
The Growing Network Of IoT Connected Devices From a network of connected computers to a network with billions of connected endpoint devices, the internet is enabling inter-connectivity for a rapidly expanding array of things across all industries. It is not only just our desktop computers, laptops, smart phones and tablets that are connected to the...
Read More
ransomware key
BAD RABBIT, EXPETR MAKE YOU WANNACRY Two large-scale global ransomware attacks this year were the infamous global WannaCry and ExPetr (also known as Petya and NotPetya). The WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries. And now a third attack, dubbed “Bad Rabbit”, is on the rise. So what exactly...
Read More
A new Petya Ransomware variant hits Russia and Ukraine Please join our webcast for additional details regarding this attack.  Thursday, October 26th, 2017 | Americas – 8:30 AM PDT (4:30 PM UK, 5:30 PM CET) Introduction Almost four months after the last major outbreak, we are seeing a new variant of Petya ransomware dubbed “Bad Rabbit,” impacting multiple...
Read More
Hurricane Irma Making Landfall With Hurricane Irma impacting Florida this weekend we want to ensure all of our clients, friends & family are prepared. This storm is projected to be a Category 4 or 5, and we anticipate a severe impact all across the state.   Please carefully read through the county’s Hurricane Preparedness Guide...
Read More
Why AutoNation Chose Zscaler Cloud Security See how AutoNation, the largest auto retailer in the United States, puts an end to the idea of deploying costly stacks of iron (appliances) by adopting Zscaler Cloud Security platform. Ken Athanasiou, CISO and Vice President AutoNation talks about their cloud-first approach and how Cloud Security is essential to...
Read More
Zscaler Cloud Strategy Your IT environment has evolved significantly over the past decade, expanding from a centralized data center approach to a more cloud and mobile-centric model. Attackers have adjusted their tactics along the way, shifting their focus from servers in your data center to your users and web browsers, and developing cyber-attacks that elude...
Read More
How to Use Bandwidth Control To Prioritize Business-Critical Applications Webcast – Thursday, August 17, 2017|Americas – 8:30 am PDT (16:30UK, 17:30 CET) What does your bandwidth traffic look like? What apps and services do you have accessing the Internet? How do you ensure that your network is optimized for business productivity? With more traffic bound...
Read More
FruitFly Surveillance Malware Hits American Macs Law enforcement agents are investigating what appears to be a slice of malicious code, dubbed FruitFly, that’s been hitting Mac users in recent weeks. According to Forbes, Patrick Wardle, an ex-NSA analyst who now does research for cybersecurity firm Synack, says he saw around 400 infections, but there’s likely...
Read More
1 2 3 4 5