Corporate Blog

News and views from the leading voice in cloud security.


By: Michael Sutton

Yahoo breach affects half a billion users...world shrugs

While the press and rumor mill turn full tilt in the wake of the announcement from Yahoo last week that it had been the victim of perhaps the largest known data breach ever (more records were breached than there are…
By: Anthony Gil

Top 7 Cybersecurity Stories This Week

Too busy working to keep up with cybersecurity news this week? Here’s a round-up of the top stories from the cyberscape.

Largest DDoS attack EVER hits KrebsOnSecurity Blog The biggest DDoS attacks ever seen has been aimed at security blogger, Brian Krebs, after he exposed hackers who carry out such attacks for cash. At its peak, the attack aimed 620 gigabits…
By: Rene Paap

Hybrid buyer beware

Some solutions are being driven by marketing, not engineering.

When I hear the term hybrid, what often comes to mind is best of both worlds or merging the old with the new. I credit Toyota with this word association, as its Prius was the first mass-produced hybrid car dating…
By: Yogi Chandiramani

Creating insight out of a mountain of network data

The foundation of a solid security model is visibility, deep insight into what is going on in a corporate network. Without visibility into applications, users, and network traffic, an IT team cannot make appropriate decisions about security controls. Gaining visibility…
By: Robert Schlossman

Law firm security is keeping chief legal officers up at night

One of the things that I most enjoy about being a Chief Legal Officer is meeting other CLOs and in-house attorneys. I always ask them some version of the following question What is keeping you up at night More and…
By: Ben Ross

The Internet is the new corporate network

As businesses follow a path of transformation that draws from the cloud and the Internet, security can take advantage of the same benefits to maintain agility and effectiveness

The enterprise network was once a castle, broadly insulated from the outside world by a LAN perimeter moat, with a WAN drawbridge defended from within the castle walls. One way in, one way out, with few reasons for data and…
By: Matt Piercy

Why the cyber security skills gap is a boardroom issue

The shortage of IT professionals in the UK has been well documented. Several years ago, a study  commissioned by the Royal Academy of Engineering predicted that the shortage would be felt for years, as the UK was simply not producing…
By: Michelle Radlowski

Survey shows that Black Hat attendees are feeling vulnerable on the inside

Attendees cite social engineering and targeted attacks as the greatest threats, compounded by concerns over user behavior.

Some of the world s most experienced InfoSec professionals attended Black Hat last week in Las Vegas. And yet, with all their expertise, the Black Hat Attendee Survey showed that the majority believe their organizations remain vulnerable to security attacks.…

Learn more about Zscaler.
Join one of our webcasts.

How secure are you?

Check your security with our instant risk assessment, Security Preview. It’s free, confidential and safe. 85% of companies who run this test find vulnerabilities that require immediate attention.

Average risk level results from people like you: VERY HIGH