All Blogs

News and views from the leading voice in cloud security.

By: Deepen Desai

The three reasons I go to Black Hat, year after year.

Most people who go to Las Vegas arrive with a singularity of purpose. For many, it s the betting. For some, it s Cirque de Soleil and other shows. For the InfoSec community around the world, Vegas in early August…
By: Viral Gandhi

Pokémon GO : Pikachu thunder shocks user’s wallet and personal life.

Mobile Malware

The recent release of Pok mon GO has led the game to become one of most popular apps for Android and iOS - having been downloaded by more than 5 million users. The game is currently available in multiple countries…
By: Abhinav Bansal

Apple Patches Persistent Cookie Vulnerability Discovered by Zscaler


  Cookies are a fundamental part of our everyday web access.  We take them for granted and freely give websites access to relevant cookies in our browsers because they dramatically enhance our user experience. Cookies are considered persistent if they…
By: Chris Mannon

Zika isn't the Only Thing You Need to Worry About During the Rio Olympics

Abuse | Compromise | Exploit | Exploit Kit | Malware | Scam

In just a few weeks, thousands of athletes and fans from around the world will gather in Rio de Janeiro for one of the world's most widely anticipated international sporting events, the Olympics. However, as one of the most popular…
By: Kevin Peterson

Is the role of IT changing? My sources say yes.

For many years now, technology visionaries have told of a not-too-distant future in which IT job descriptions would look quite different, primarily due to a shift from commodity IT to a services model. Some laughed this off while others embraced…
By: Gerry Festa

Feeling safe is good. Being safe is better.

Why it’s time to rethink perimeter security and break from the old guard.

Building a wall, a ginormous wall, around your network may make you feel safe, but the reality is quite different. Organizations are distributed and their users are mobile. And, applications are moving to the cloud SaaS and AWS are just…
By: Matt Piercy

The shadow IT challenge: closing the security gap

BYOD, once a rarity, quickly became a trend, and is now commonplace. Following the dramatic rise in BYOD, IT has seen the growing popularity of BYOA (applications), BYOC (cloud), and BYOS (storage). The possibilities are endless, challenging IT to keep…
By: Ed Miles

Sundown Chronicles - Observations of an Exploit Kit's Evolution

Since the apparent deaths of the Angler and Nuclear exploit kits, we have seen elevated activity from other groups. While RIG and Neutrino have been the primary actors in the void left by Angler and Nuclear, Sundown has also been…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.

Average risk level results from people like you: VERY HIGH