Corporate Blog

News and views from the leading voice in cloud security.


By: Ben Ross

The Internet is the new corporate network

As businesses follow a path of transformation that draws from the cloud and the Internet, security can take advantage of the same benefits to maintain agility and effectiveness

The enterprise network was once a castle, broadly insulated from the outside world by a LAN perimeter moat, with a WAN drawbridge defended from within the castle walls. One way in, one way out, with few reasons for data and…
By: Matt Piercy

Why the cyber security skills gap is a boardroom issue

The shortage of IT professionals in the UK has been well documented. Several years ago, a study  commissioned by the Royal Academy of Engineering predicted that the shortage would be felt for years, as the UK was simply not producing…
By: Michelle Radlowski

Survey shows that Black Hat attendees are feeling vulnerable on the inside

Attendees cite social engineering and targeted attacks as the greatest threats, compounded by concerns over user behavior.

Some of the world s most experienced InfoSec professionals attended Black Hat last week in Las Vegas. And yet, with all their expertise, the Black Hat Attendee Survey showed that the majority believe their organizations remain vulnerable to security attacks.…
By: Deepen Desai

The three reasons I go to Black Hat, year after year.

Most people who go to Las Vegas arrive with a singularity of purpose. For many, it s the betting. For some, it s Cirque de Soleil and other shows. For the InfoSec community around the world, Vegas in early August…
By: Kevin Peterson

Is the role of IT changing? My sources say yes.

For many years now, technology visionaries have told of a not-too-distant future in which IT job descriptions would look quite different, primarily due to a shift from commodity IT to a services model. Some laughed this off while others embraced…
By: Gerry Festa

Feeling safe is good. Being safe is better.

Why it’s time to rethink perimeter security and break from the old guard.

Building a wall, a ginormous wall, around your network may make you feel safe, but the reality is quite different. Organizations are distributed and their users are mobile. And, applications are moving to the cloud SaaS and AWS are just…
By: Matt Piercy

The shadow IT challenge: closing the security gap

BYOD, once a rarity, quickly became a trend, and is now commonplace. Following the dramatic rise in BYOD, IT has seen the growing popularity of BYOA (applications), BYOC (cloud), and BYOS (storage). The possibilities are endless, challenging IT to keep…
By: Gerry Festa

Enterprises searching for answers following the Brexit vote surges 13x

Following the UK decision to break free from the EU, Zscaler s cloud platform, which processes over 25 billion requests a day, saw an increase in businesses searching for answers a 13x spike over the week before. Shortly after the…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.

Average risk level results from people like you: VERY HIGH