Zscaler Blog

Get the latest Zscaler blog updates in your inbox

Security Research

Zscaler Analyst Scrapbook

image
THREATLABZ
June 10, 2011 - 1 min read
ImageIntroducing our sister blog: Zscaler Analyst Scrapbook

Very often while we're conducting log analysis across our cloud in order to add security protections (signatures, black listing, reputation scoring, etc.) we find interesting scraps of information. While this information may not be interesting to the masses - it may help those working in security operations centers (SOCs) or other roles to add similar protections for their users.

research.zscaler.com will remain our primary blog with polished posts focused on security research and "new" threats, while the scrapbook.zscaler.com blog will be reserved for quick mini-posts, focusing on things that we uncover during our daily data mining and analytics. The hope is that by sharing this additional information, others in the security community can use this information to better protect themselves and their users. We encourage feedback from our readers on work that they may be doing on similar topics so that we can publicly collaborate on emerging threats. Welcome!
 
form submtited
Thank you for reading

Was this post useful?

Disclaimer: This blog post has been created by Zscaler for informational purposes only and is provided "as is" without any guarantees of accuracy, completeness or reliability. Zscaler assumes no responsibility for any errors or omissions or for any actions taken based on the information provided. Any third-party websites or resources linked in this blog post are provided for convenience only, and Zscaler is not responsible for their content or practices. All content is subject to change without notice. By accessing this blog, you agree to these terms and acknowledge your sole responsibility to verify and use the information as appropriate for your needs.

Get the latest Zscaler blog updates in your inbox

By submitting the form, you are agreeing to our privacy policy.