<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>News &amp; Announcements | Blog</title>
        <link>https://www.zscaler.com/de/blogs/feeds/company-news</link>
        <description>Latest news and views from the leading voices in cloud security and secure digital transformation.</description>
        <lastBuildDate>Fri, 01 May 2026 22:04:53 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>de</language>
        <item>
            <title><![CDATA[Introducing the Next Phase of the Zero Trust Browser]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/introducing-next-phase-zero-trust-browser</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/introducing-next-phase-zero-trust-browser</guid>
            <pubDate>Wed, 29 Apr 2026 18:49:58 GMT</pubDate>
            <description><![CDATA[For years, Zscaler has been a leader in enabling secure and seamless browsing and application access for organizations worldwide. We have partnered with thousands of organizations and our Zero Trust Cloud Browser to secure access not only to the internet but also to SaaS and private web apps.&nbsp;As many have realized, securing both browsing and app access from the browser is more critical than ever, as data loss risk rises, risk of non-compliant devices accessing data, and browser-borne threats continue to grow. Attackers increasingly target the browser to steal sensitive data, including:Malicious extensions that execute unauthorized actions or exfiltrate sensitive information.Phishing and identity attacks in the browser aimed at capturing credentials or OAuth tokens.Keystroke loggers and screenshots that silently steal critical corporate data and credentials.GenAI risks, particularly, accidental exposure of sensitive data. What is more, unmanaged devices used by contractors to access apps also present a challenge. By accessing corporate resources without the safeguards of managed endpoints, they increase the risk of data breaches and compliance failures. Without visibility into device posture, such as whether EDR is in place or if the OS is out of date, organizations struggle to determine whether the devices accessing their apps meet security and compliance standards, increasing security risk.To make matters worse, many organizations still rely on risky or expensive tools for app access like VPNs and VDI. These legacy solutions add cost, complexity, and latency, but do little to resolve browser-specific risks be it stopping threats or protecting data. While enterprise browsers are sometimes a viable option, they do require browser migrations that can disrupt work, rendering them unsuitable in certain environments.Ultimately, this means security teams need consistent protections—protections that isolate web threats and stop browser threats, secure app access, and data protection—but delivered through the right form factor for each scenario. Contractors on unmanaged devices may need protection without a migration; sensitive workflows may require stricter in-session controls; and some teams prefer a dedicated managed browser for standardization.Zero Trust Browser uniquely solves for this reality, letting organizations choose the right deployment approach for each scenario. The New Zero Trust BrowserZscaler is excited to announce the Zero Trust Browser is moving into its next phase by expanding into a unique set of form factors that let organizations match security to each use case while also delivering browser-centric security no other enterprise browser can match.This evolution begins with the Zscaler Zero Trust Browser Extension—a new solution for securing modern browsing and application access. Designed to work seamlessly with users’ existing browsers, this lightweight extension delivers Browser Detection and Response (BDR), to stop browser-borne threats like malicious extensions, malicious script, identity and OAuth credential theft or reassembly attacks.&nbsp; It also applies in-browser data protection controls (for example, inline DLP policies and data controls to restrict copy/paste, upload/download, printing, and other risky actions). It also adds real-time device posture signals to app access decisions—so access to SaaS and web apps can be allowed, blocked, or revoked at any time, based on whether the device meets device security requirements such as OS version, EDR, or if disk encryption enabled.&nbsp;All of this helps protect web browsing and enable secure access without relying on VPNs, VDI, or forcing a browser migration when it doesn’t make sense.Zscaler is also bringing the same security and access found in the Extension to a purpose-built Chromium Enterprise Browser. Our dedicated browser brings the same security, access and data protection as our extension, but allows a form factor that lends itself to standardization and a managed browser experience for workers.&nbsp;These two new form factors complement our existing clientless Zero Trust Cloud Browser that offers key protections that isolate web threats in the cloud, and extends secure app access from any browser, while keeping data secure with cloud-deliver data controls and inline Zscaler data security. Our Cloud Browser is excellent for high-security use cases because execution happens in the cloud, keeping data off endpoints. It is also a practical option when installing an extension or new browser on an unmanaged device is not possible.Together, these three form factors—browser extension, enterprise browser, and cloud browser—extend protection across mixed environments and managed or unmanaged devices without fragmenting policy. Zscaler’s Zero Trust Browser pairs advanced security with flexible deployment, so teams can choose the right option for each user, device, and risk level. User ExperienceUser experience is also critical given the browser is a key productivity tool for workers.&nbsp; Zscaler delivers a frictionless “work profile” in the browser that makes secure access simple on their device.&nbsp; Workers are greeted by a customizable home page that makes accessing the app they need for work easy–and it clearly demarcates work from personal use on their device. Cloud users will encounter a similar cloud-delivered portal to app access. The Zero Trust Browser delivers key capabilities in our diverse form factors:Adaptive App Access: Zscaler provides app access with integrated device posture controls, ensuring secure, real-time access to applications only for trusted users and devices from their browser of choice. App access is revocable should device posture deteriorate.Browser-Based Threat Protection: Only Zscaler protects against browser-borne threats with Browser Detection and Response, such as malicious extensions, OAuth and browser identity attacks, malicious scripts, and more.&nbsp; This complements our isolation of web threats.In-Browser and cloud-delivered data security: Granular data security, enforced in the browser or from the cloud, blocks risky actions such as unauthorized screenshots, keystroke logging, printing, and copy/paste, upload and downloads and more.&nbsp; Inline DLP controls, whether browser or cloud, detect and stop sensitive data from exfiltration.Polished User Experience: Users gain a distinct browser profile (on their device or in the cloud) for work activities, separate from personal browsing, for a seamless and polished user experience.&nbsp;&nbsp;Streamlined Security Architecture: By eliminating the need for legacy tools like VDIs or complex infrastructure, the Zero Trust Browser dramatically simplifies secure access and browsing by leveraging existing Zscaler ZIA, ZPA, and data security footprints. It works with any browser, making it scalable and lightweight for enterprise deployment.&nbsp;&nbsp; Only the Zero Trust Browser delivers unmatched deployment flexibility with consistent protections, including browser detection and response, for organizations navigating today’s complex security landscape.Ultimate Form Factor Flexibility: Only Zscaler provides the ability to secure every use case with a choice of form factors—cloud browser, browser extension, or enterprise browser—ensuring seamless protection and access for any user on any browser or device.Unified Cloud and Browser Protection: Leverage world-class cloud threat isolation combined with in-browser threat detection to create the industry’s strongest security posture for modern browsing.Total "Last-Mile" Browser Control: Instantly block browser-layer attacks and data exfiltration by neutralizing threats like malicious extensions, identity theft, unauthorized screenshots, printing, and ensuring data exfiltration never occurs.Browser Freedom, Zero Friction: Secure users in the browsers they already use, eliminating costly migrations to proprietary browsers and reducing change management complexity for organizations.With Zscaler, organizations can seamlessly protect their users while enabling productivity and embracing a modern, secure, and user-friendly approach to browser security.To learn more, sign up for a demo here or contact your account team for a deeper dive.]]></description>
            <dc:creator>Vishal Gupta (Senior Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Is Proud to be Part of Project Glasswing: AI Can’t Breach What It Can’t Find]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscaler-anthropic-project-glasswing</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscaler-anthropic-project-glasswing</guid>
            <pubDate>Tue, 21 Apr 2026 22:00:32 GMT</pubDate>
            <description><![CDATA[OverviewAnthropic has been at the forefront of AI innovations. Dario Amodei, Anthropic CEO, has always been mindful of the dangers of very powerful AI models and has advocated for their responsible use. Recognizing the power of their Mythos model to uncover long-hidden software vulnerabilities, Anthropic took a responsible approach. Through Project Glasswing, they made the model available only to a select group of organizations that either operate or protect our country's critical infrastructure. Zscaler is proud to collaborate with Anthropic on Project Glasswing, which has provided us with access to Claude Mythos Preview.&nbsp;The premise is simple, frontier AI models have reached a point where they can find software vulnerabilities faster than humans can. Mythos Preview understands code the way a skilled human researcher does, reading logic, chaining multiple weaknesses together, and producing working exploits in hours, at machine speed, instead of weeks. It has already uncovered thousands of high-severity flaws across major operating systems and browsers. The ability of AI to rapidly uncover vulnerabilities and produce working exploits is going to accelerate, and when it does, defenders need to be ahead.Reactive patching is no longer a viable defense strategy. You cannot outpace AI-driven vulnerability discovery, and you cannot out-hire the efficiency of an automated adversary. The only durable answer is founded on architecture. This means simply adding another tool on top of your security stack won’t cut it. You cannot patch, detect, or respond your way out of a problem created by exposing applications to the internet in the first place; you have to stop exposing them. The Old Game Is LostFor thirty years the industry has played the same game. Put a firewall at the edge. Put a VPN in front of your applications. Scan for known vulnerabilities. Patch what you find. Hope you find them before the adversary does.That game assumed a human-speed attacker. Mythos Preview ends that assumption. If your application is exposed to the internet behind a firewall or a VPN, a frontier model can already see it. It can scan every internet-facing surface parallel, test for weaknesses no human team has the bandwidth to check and do it continuously. Once that capability is in the hands of a nation-state or a ransomware group, your patch cycle is irrelevant.Legacy security was built on the hope that we could outrun the attacker. In an era of AI-driven exploits, that race is over. We now have to assume the attacker is already inside. A Fundamentally Different ArchitectureZscaler was built for exactly this moment, and we have been saying it for more than 18 years. If you are reachable, you are breachable.Zero Trust is not a feature. It is not a firewall with a new label. It is a fundamentally different architecture, built on a different principle. Users never connect to the network and applications are never exposed to the internet. Endpoint context is understood, and devices are verified before they connect. Data is protected the moment it is accessed. Every connection, whether human or AI agent, is brokered one to one with a verified identity in real time, with no lateral path to anything else.When an application is hidden behind the Zscaler Zero Trust Exchange, it has no public IP, open port, or discoverable surface. An attacker scanning the internet cannot find what is not there. The vulnerability may exist in the code. It may even be cataloged in a CVE (Common Vulnerabilities and Exposures) database. But the adversary has no way to reach it.This is the difference between detecting attacks and taking your applications off the public internet entirely, so there is nothing for attackers to target. Both matter. Only one scales against machine-speed offense. What Zscaler Brings to Project GlasswingZscaler is the platform that 40% of the Global 2000 trust to run their businesses. Our contribution is grounded in how the Zero Trust Exchange platform already operates at the core of the enterprise.&nbsp;The largest security cloud in the world:&nbsp;Zscaler processes over 500 billion transactions every day and hundreds of trillions of signals. That scale is what lets our AI distinguish a benign request from a reconnaissance probe. We do this inline, before a connection is ever established.Attack surface elimination:&nbsp;The Zscaler Zero Trust Exchange makes internal applications invisible to the internet. Whether those applications are running in your data center, or in the public cloud, Zscaler hides them from attack. No firewalls or VPNs to exploit, and nothing for a frontier model to find.Data protection at the point of use:&nbsp;The new risk is not someone breaking in. It is your own AI tools quietly taking sensitive data out. Zscaler’s AI guardrails see every request as it happens, across SaaS, private apps, email, and encrypted traffic, and stops the data before it leaves.Zero trust for AI agents:&nbsp;Agents are now acting autonomously on behalf of users. They are authorized to access data, they take action and connect to other systems. They must be governed with the same architecture we apply to human users. Every agent gets a verified identity, access to one specific application, and a full record of what it did.&nbsp; How Zscaler Will Use Mythos PreviewWe are integrating Mythos Preview into our secure software development lifecycle. It will enable us to rapidly find vulnerabilities in our software stack and Zero Trust Exchange, further hardening our environment and reducing risk for our customers. As a proud member of the Project Glasswing coalition, we will share our findings back to the community, helping everyone improve security outcomes for the world. Additionally, we will integrate Anthropic’s Opus 4.7 model into our AI Red Teaming and Agentic SecOps offerings, to help fight AI threats with advanced AI security capabilities. A Familiar PatternWhen the cloud arrived, the industry said the old perimeter would hold. It did not. When mobile and SaaS arrived, the industry said VPNs would adapt. They did not. Every twenty to thirty years the architecture has to change, and the companies that adapt win the next decade.AI is that inflection, and it is moving faster than any shift before it. The adversary already has the model. So do we. The question is whether the enterprise will keep defending a perimeter that no longer exists, or take its applications off the public internet entirely.There is no such thing as a Zero Trust firewall or an AI-proof VPN. There is only the architecture you choose before the next breach.Zscaler is that choice. Project Glasswing is how we accelerate it across the industry. The time to act is now. Where to Learn MoreWatch the webinar recording form Wednesday, April 22 or Thursday, April 23, where we discussed how to protect your organization against vulnerabilities found by frontier AI models like Claude Mythos.]]></description>
            <dc:creator>Jay Chaudhry (CEO and Founder of Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and OpenAI Partner to Advance the Next Era of Cybersecurity]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscaler-and-openai-join-forces-advance-next-era-cybersecurity</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscaler-and-openai-join-forces-advance-next-era-cybersecurity</guid>
            <pubDate>Thu, 16 Apr 2026 04:27:12 GMT</pubDate>
            <description><![CDATA[OverviewZscaler is proud to partner with OpenAI as part of their&nbsp;Trusted Access for Cyber (TAC) program, which expands trusted, verified access to advanced AI capabilities for defenders. As part of this program, we plan to use GPT 5.4-Cyber, a TAC-enabled variant of GPT‑5.4, to further improve cybersecurity for our Zero Trust Exchange platform and for our customers. GPT 5.4-Cyber will be integrated into our secure Software Development Lifecycle (SDLC) workflows, empowering our teams to instantly detect, triage, and mitigate vulnerabilities earlier and patch security vulnerabilities faster. In addition to safeguarding software, Zscaler has a long history of harnessing OpenAI technology to fight AI-based attacks, including within our&nbsp;AI Red Teaming and&nbsp;Agentic SecOps solutions. Safeguarding the Zscaler PlatformSecure software development is a business imperative at Zscaler. Participating in Open AI’s TAC program enables us to integrate GPT 5.4-Cyber and&nbsp;Codex Security into Zscaler’s internal multi‑agent security architecture for cyber defenses and product hardening. GPT 5.4-Cyber is a key enabler to offer Security-as-a-Service to our developers throughout the SDLC process, from validating threat models in designs, to assisting with secure code reviews, finding vulnerabilities, and executing black-box testing on built artifacts.We are approaching TAC with both a defensive and offensive mindset. In addition to improving security through the SDLC, we are leveraging the model to improve cyber readiness by turning large volumes of security signals into actionable intelligence, prioritizing true risk, and accelerating remediations. Moreover, we are relying on the model for offensive-informed posture hardening by modeling adversarial attack paths and highlighting weak controls, which enables us to neutralize exposures at unprecedented speeds.&nbsp;&nbsp;Combining the frontier OpenAI models with Zscaler’s industry‑leading Zero Trust architecture leads to better security outcomes for our customers. In addition to leveraging AI to identify and remediate any software vulnerabilities, Zscaler’s Zero Trust architecture adds another layer of protection by making critical apps and software invisible to the Internet. This combination provides Zscaler customers superior protection compared to obsolete VPNs and firewalls, maximizing software resiliency while systematically eliminating the internet-facing attack surface.&nbsp; Harnessing OpenAI for AI Red Teaming&nbsp;Zscaler has been using OpenAI’s 4.x and 5.x models for building advanced capabilities in our AI Red Teaming suite of products to help customers safely build and deploy AI systems, including:Continuous Red Teaming Prompt hardening AI Asset AnalysisAgentic Radar open source programZscaler’s&nbsp;AI Red Teaming platform (formerly SPLX) has relied on OpenAI models across the stack since early 2024. Multiple versions of OpenAI models have been central to dynamically generating attack sequences to harden AI systems. With multimodal red teaming (spanning voice and images), OpenAI’s image generation, text-to-speech, and speech-to-text capabilities deliver a decisive tactical advantage. Together, these capabilities provide an industry leading solution to strengthen the security of their AI initiatives.&nbsp;&nbsp;Beyond merely exposing vulnerabilities during red teaming exercises, Zscaler’s solution dictates instant remediation in true closed loop fashion by generating optimized system prompts. This serves as the definitive first step AI engineers take to help improve security and safety posture.&nbsp;Zscaler is also using OpenAI models as part of its AI Asset Analysis solution, which analyzes MCP tools and risks, and provides overall risk analysis for complex AI agents based on source-code scanning. This is an enterprise version of the&nbsp;Agentic Radar open source program, which powered the largest&nbsp;OpenAI hackathon last year in Warsaw, Poland. Leveraging OpenAI for Agentic SecOpsZscaler's&nbsp;Red Canary Managed Detection and Response (MDR) service combines AI-powered threat detection with expert security operations in partnership with OpenAI. OpenAI-powered agents work alongside Zscaler experts to handle the tedious context-gathering that traditionally overwhelms SecOps analysts. Elite human analysts dictate workflows, enforce rigid guardrails, and rigorously validate all outputs, maintaining the 99.6% true-positive rate our customers depend on. By pairing OpenAI's adaptive capabilities with Zscaler’s data pipelines, expert procedures, and rigorous validation, we deliver faster, more consistent investigations without sacrificing the accuracy that defines the Zscaler Red Canary MDR service. Building the Right FoundationAI is fundamentally rewriting the rules of cybersecurity. By partnering with leading vendors like OpenAI, Zscaler is ensuring AI can be used to help improve the overall resilience of our security infrastructure, and mitigate risks from AI-based attacks. We look forward to working with OpenAI as part of their TAC program to improve outcomes for our customers. Enterprise organizations will benefit immensely by using state of the art OpenAI models for better defenses combined with Zscaler’s industry leading Zero Trust architecture to minimize the attack surface and assets exposed on the Internet with traditional VPNs and Firewalls.&nbsp;]]></description>
            <dc:creator>Dhawal Sharma (Executive Vice President, AI Security and Strategic Initiatives)</dc:creator>
        </item>
        <item>
            <title><![CDATA[AI Machine Speed is Breaking VPN Security]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/ai-machine-speed-breaking-vpn-security</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/ai-machine-speed-breaking-vpn-security</guid>
            <pubDate>Mon, 23 Mar 2026 22:27:12 GMT</pubDate>
            <description><![CDATA[Key Findings from the Threatlabz 2026 VPN Risk Report&nbsp;Remote access isn’t a new problem. VPN risk isn’t a new conversation. What’s new, and what the Zscaler ThreatLabz 2026 VPN Risk Report makes unmistakably clear, is the speed at which the threat landscape is changing.Why this matters now:&nbsp;The #1 fear among defenders is AI speed, and it’s already showing up in the field. 79% fear AI exploitation speed. The same VPN controls that felt “good enough” even a year ago can become dangerously slow when attackers can iterate and adapt at machine speed.AI machine speed compresses the time from weakness to exploit, while VPN visibility and patch cycles often can’t keep up. Meanwhile, many organizations are still defending VPN-centric access with realities that move far slower: limited inspection coverage, and access models that can expand blast radius once a user is connected.This report is a snapshot of where the industry is right now, and a wake-up call that “good enough” remote access controls can become “not even close” when adversaries scale faster than defenders can respond.Below are the key findings from our survey of 822 IT and cybersecurity professionals. It is a real-world view of what teams are seeing and what they mean for CISOs, network/security ops, and IT leadership, followed by practical actions you can take to shrink the breach window. What the report reveals: AI is already here, and VPN visibility is laggingThe report shows AI-enabled attacks are no longer hypothetical:61% of organizations report encountering AI-enabled attacks in the last 12 months.But the bigger issue is what comes next: visibility and control. The report found:70% say they have limited or no visibility into AI-enabled threats moving over VPN. And there’s an additional layer to that visibility problem:One in five organizations cannot distinguish an AI-assisted intrusion from a conventional attack.Only one in four has managed to deploy AI-powered monitoring (24%).That combination is the perfect recipe for faster compromise. AI helps attackers iterate quickly on social engineering, reconnaissance, and targeting, while many teams still struggle to see enough of what’s happening inside VPN connections to catch abuse early. The breach window is widening because patch timelines don’t match exploit timelinesWhen critical VPN vulnerabilities emerge, the risk isn’t just the CVE. It’s the time it takes to remediate across upgrade cycles, change windows, and validation.&nbsp;The report highlights a difficult operational reality:54% of organizations say it takes a week or more to patch critical VPN vulnerabilities. It’s not just a technical problem. It’s an operational one.56% rank patching as their top operational challenge.A week may be a perfectly reasonable timeframe in traditional IT operations. In an AI-accelerated threat environment, it can be a lifetime. Attackers don’t need to “wait you out” anymore. They can identify targets, test attack paths, and operationalize new techniques quickly, often while defenders are still triaging impact, coordinating change windows, and validating fixes. Encrypted traffic is creating blind spots where attackers can operateEncryption is table stakes. But encryption without visibility can become a hiding place.The report found:1 in 3 organizations inspect 0% of encrypted VPN traffic.Even among organizations that do inspect, near-total visibility is rare.&nbsp;Only 8% can inspect virtually everything.This is a defining vulnerability in modern environments. If meaningful traffic flows are opaque, defenders lose detection opportunities and response confidence. In the AI era, adversaries can move quickly and quietly, reducing the dwell time required to be successful. Lateral movement is the multiplier once attackers get in&nbsp;Once an attacker gets a foothold, the real risk is how far they can move. The report shows that most VPN environments still grant network-level reach rather than app-level containment.&nbsp;Only 11% can restrict a compromised session to a single application.&nbsp;In other words, in the vast majority of organizations, a stolen credential can become a pathway to broader internal access. This is exactly the condition attackers exploit to move laterally and expand impact. User behavior is a risk signal, not a blame pointOne of the most actionable findings in the report is also one of the most human:63% say users bypass VPN controls to reach apps faster.The “why” behind bypass is most often about performance and reliability.Slow connections top the complaint list at 29%, followed by inconsistent device behavior (23%) and frequent disconnections (19%).This isn’t about users being careless. It’s about friction. When secure access feels slow, inconsistent, or cumbersome, people route around it to get work done. Those workarounds create “shadow access paths” that are harder to govern and easier to exploit.For IT leadership, this is a reliability and productivity warning: if access isn’t dependable, people will find alternatives.For security and network ops, it’s a control-plane warning: policy enforcement becomes fragmented across tools and paths.For CISOs, it becomes a risk governance issue: if “official access” isn’t the default, then your risk model is built on exceptions. What this means for leaders: it’s no longer “VPN secure vs not secure”The report’s headline, AI machine speed kills VPN security, is less about a single technology and more about a structural mismatch:AI accelerates attacker speed and variationVPN models often expand reach once connectedVisibility into what matters can be incomplete (especially with encryption)Patch and change timelines remain constrainedUser workarounds widen the attack surfaceThis is how breach windows open. And in 2026, breach windows don’t stay open because teams don’t care. They stay open because the architecture and operations weren’t built to close them fast enough. Containment-first access is becoming the mainstream directionThe report’s findings are pushing many organizations to evolve from network-based remote access toward app-based access principles by reducing broad connectivity, tightening access policies, and improving visibility and control without adding friction.That momentum is already mainstream:84% are planning or transitioning to zero trust, up from 78% two years ago.If you’re evaluating modernization, keep it outcome-driven:Shrink blast radius (limit what a session can reach)Improve meaningful visibility (especially around encrypted traffic patterns and sensitive apps)Enforce access using identity, context, and device postureDeliver a user experience that makes the secure path the easy pathThe hero's move isn’t “buying something.” It’s leading a shift from connectivity-first to containment-first access. The report is a benchmark—use it to take your next stepThe ThreatLabz 2026 VPN Risk Report offers more than stats. It offers a benchmark for how organizations are experiencing AI-driven pressure on VPN security visibility gaps, patch timelines, and user workarounds included.AI machine speed kills VPN security when defenders are forced to operate with broad reach, blind spots, and slow exposure windows. The way forward is measurable containment: smaller blast radius, faster detection, fewer bypass paths, and an access model built for how work happens now.&nbsp;Download the ThreatLabz 2026 VPN Risk Report to see the full data behind these findings.]]></description>
            <dc:creator>Olivia Vort (Senior Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Act Fast: RSA 2026]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/act-fast-rsa-2026</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/act-fast-rsa-2026</guid>
            <pubDate>Fri, 20 Mar 2026 16:00:05 GMT</pubDate>
            <description><![CDATA[Next week, the cybersecurity industry gathers in San Francisco for the RSA Conference. While the scale of the event is always a spectacle, its true value lies in how it nurtures the realignment in our collective understanding of risk.This year, that understanding must undergo a fast and fundamental shift because the systems we are trying to secure no longer behave like bounded systems. They behave as networks of decisions which carry risk in every direction.&nbsp; From Static Systems to Dynamic Supply ChainsEnterprise security once relied on a comfortable assumption: systems were bounded and knowable. AI has rendered that assumption obsolete.A single interaction with an AI assistant can trigger a cascade of activity across external models, APIs, and autonomous agents. Data leaves, transforms, and returns. Decisions are delegated across components that often lack a unified security posture. We are no longer just managing applications; we are overseeing AI supply chains.Risk in these environments is not confined to a single breach point. It emerges from the relationships between components. Our research at ThreatLabz confirms the fragility of this new architecture: in controlled testing, 100% of enterprise AI systems analyzed exhibited exploitable vulnerabilities. Often, a full compromise required nothing more than a single interaction.We have also spent years optimizing detection and response, a model that assumes we have time to act. In the age of AI, that time has further evaporated to nothing.Findings from the ThreatLabz 2026 AI Security Report show that AI systems can fail in as little as one second, with a median time to compromise measured in mere minutes. There is no meaningful dwell time in this scenario. There is only the interaction.This implies a hard truth: security cannot be an afterthought. It must exist within the flow of transactions everywhere. Extending Zero Trust to the InteractionThe shift from bounded systems to distributed networks requires a fundamental evolution of our security principles. Zero Trust has traditionally focused on verifying users, devices, and networks. In the age of AI, we must extend this to the interaction.Continuous Evaluation: Trust cannot be granted at the point of entry and assumed thereafter. It must be reassessed at every step of the decision chain.Visibility Beyond the Edge: Security must be able to follow the data and context as they move across models and third-party services.Inline Control: Policies must operate at the point of interaction, where decisions are made, rather than after an outcome is produced.The gap in security today isn't a lack of tools, but a mismatch of models. The traditional perimeter has not just dissolved; it has been replaced by a complex web of AI supply chains and model interactions. While we have focused on securing the edges of environments that are no longer bounded, the true risk has moved to the interaction layer. Understanding and governing the AI supply chain is the only way to close that gap. At RSA, we need to move past the hype and discuss the practical architecture required to secure these dynamic high-velocity workflows.&nbsp; Complexity is a Gift to the AdversaryOne of the biggest challenges I regularly hear from CISOs is the exhaustion caused by tool sprawl. Over the last decade, organizations have layered point product upon point product. While each was intended to solve a specific problem, the collective result is a fragmented mess that creates fatal blind spots.Amongst the many other challenges, every siloed tool is an opportunity for a threat actor. This is why the industry is increasingly shifting toward platform-based security architectures that unify visibility across users, devices, applications, data, and now AI interactions.You will hear a lot of noise about end-to-end solutions next week. However, there is a fundamental difference between a suite of products stitched together and a platform built from the ground up to share intelligence. A cloud-native AI security platform doesn’t just reduce costs; it provides the inline context and automation needed to solve complexity and outpace threats. In a world of high-velocity attacks, simplification is a strategic imperative. Alignment at RSAThe industry does not lack awareness; it lacks alignment between how systems are built and how they are secured. At RSA, we will demonstrate how the Zscaler AI Security Platform applies Zero Trust to this new reality—securing the interactions that now define enterprise risk.We invite you to visit us at Booth #N-5269 and connect with the Zscaler team to discuss how to discover your AI supply chain, reduce risk fast, and stay secure.I look forward to seeing many of you in San Francisco.]]></description>
            <dc:creator>Sunil Frida (Chief Marketing Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[See You at RSA 2026]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/see-you-rsa-2026</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/see-you-rsa-2026</guid>
            <pubDate>Fri, 13 Mar 2026 17:01:59 GMT</pubDate>
            <description><![CDATA[Every year, the cybersecurity industry gathers in San Francisco for one reason.RSA.For one week, Moscone becomes the center of the security world. Thousands of practitioners, builders, researchers, CISOs, and innovators come together to share ideas, debate the future, and challenge how security needs to evolve.The conversations start early. They spill out into the hallways, across the show floor, and late into the night.And every year, the drumbeat gets louder.This year feels different.AI is changing how every organization works, builds, and innovates. At the same time, it is expanding the attack surface and accelerating the pace of risk. Security leaders everywhere are asking the same question:How do we move faster without losing control?That is the conversation we are bringing to RSAC 2026.Meet with us | Learn more | Register for RSAC 2026 What Zscaler Is Bringing to RSACAt Booth #N-5269, the Zscaler team will be showcasing the AI Security Platform built on Zero Trust.Not as a concept.As something you can see, experience, and challenge with your toughest questions.Throughout the week we will be demonstrating how organizations are applying security outcomes that matter:Zero Trust EverywhereSecure every user, every app, and every location.Secure AI EverywhereProtect AI adoption and govern how AI is used across your organization.Protect Data EverywhereDiscover sensitive data automatically, secure it across all channels including AI, and prevent exposure before it becomes a breach.Reduce Risk EverywhereUnify exposure and threat management and accelerate response with intelligent security operations.If you are navigating AI adoption, updating your architecture, or simply trying to reduce complexity in your environment, these are conversations worth having. Must See Sessions at RSARSA is always packed with great content, and this year the Zscaler team is bringing five different sessions to get excited about. These are conversations that get to the heart of what security leaders are navigating right now.March 23 | 10:15 – 10:45 AM: Join Jay Chaudry, CEO of Zscaler at the CSA Summit 2026 where he will be discussing Zero Trust and AI as the architecture for the intelligent age with Alan Rosa, CISO, CVS.March 24, 2026 | 9:40 AM – 10:30 AM: Securing GenAI Adoption: Usage Insights, Threats, and Defenses with Deepen Desai, EVP Engineering (Agentic Security Operations) and Dhawal Sharma, EVP Products &amp; Strategy (AI Security).March 24, 2026 | 1:15 – 2:45 PM: Hands-On Threat Hunt: Building a Dynamic Hunt Program with Michael Wylie, Director of Threat Hunting.March 25, 2026 | 12:00 PM – 12:50 PM: What Are You, Really? Authenticating Workloads in a Zero Trust World with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist.March 25, 2026 | 2:25 PM – 3:15 PM: MASQUE of the Red Death: Rethinking Secure Connectivity with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist. What I Love About RSARSA is not just about products.It is about the community.It is the one week a year where the entire security industry shows up in one place. The hallway conversations. The sessions. The spontaneous debates about what’s working and what’s not.Some of the most valuable moments happen between meetings, events, and the show floor.That is why so many of us continue to show up every year.And it’s why I am excited for this one. Let’s Connect at RSACIf you are heading to San Francisco, come find us.Stop by the booth. Watch a demo. Attend a speaking session. Challenge our thinking. Share what you are seeing inside your organization.The best part of RSA has always been the conversations.We cannot wait to have them.We will see you at RSAC 2026.Booth #N-5269Moscone Center | San FranciscoAct Fast. Stay Secure.Meet with us | Learn more | Register for RSAC 2026]]></description>
            <dc:creator>Emily Laufer (Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Restrict risk not innovation.  A new mindset for the Financial Services boardroom]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</guid>
            <pubDate>Fri, 13 Mar 2026 13:03:01 GMT</pubDate>
            <description><![CDATA[I met with a CISO last week who could see clear gaps in his internal and external security posture because users were free to disable security controls. He knew it was creating risk but didn’t want to change it because of a ‘user-first’ mentality. This is not a user-centric behaviour, it is creating risk that your organization (and, incidentally, your users) doesn’t need.When caution is risky&nbsp;Big banks can’t out-innovate digital challengers if all their energy is spent ticking compliance boxes. And, if we look at where AI accountability is headed, it’s clear innovation will keep drawing the short straw.&nbsp;That ‘stay in your lane’ understanding between business versus IT is old-school at best, counter-productive at worst. The days of leadership seeing security issues as “something that IT handles” are gone. Singapore is already considering holding top banking execs&nbsp;personally accountable for AI-related risks.&nbsp;If this becomes a global benchmark, leaders will shoot down more bold bets. They will cling to compliance because it feels safe, even if it costs them the win. Customers won’t wait around. If you stall, or seem irrelevant, they’ll jump to the next shiny thing.C-Suite must greenlight innovation to stay competitive. But each new system, AI-driven service or merger comes with risk. Regulators don’t ease up. Every move you make needs evidence, signatures, and someone to blame if it goes wrong. In the financial sector, none of this is new, and it doesn’t go away. Question is, can we protect innovation in this security-first space? Yes. Can we do it without AI? No. If innovation needs confidence and speed, AI gives you the speed. The confidence? That’s where people freeze.Make it safe to go fastIndecision is expensive. While the board takes six months to debate pros and cons of a new capability, a hundred fintechs have beat them to it. It isn’t caution, it’s self-sabotage. They recognize the opportunity but, still, they hesitate.&nbsp;The problem is how we view security. Security isn’t the brakes. It’s the helmet, the seatbelt, and the training the driver gets. You need a roll cage in place. Something that allows you to take the corners at speed, that lets you push hard without worrying that the whole thing will flip over.&nbsp;This is where zero trust comes in. Talk of it is everywhere. Most of it is noise. Here’s what matters: zero trust&nbsp;IS that roll cage. It lets you move fast because it’s built to expect failure and limit the blast radius. It assumes nothing and checks everything; it contains damage, not creative ideas.&nbsp;If the board had the comfort to commit to fast change, they could stop asking “Is this safe?” and start asking “How far can we push this idea?” That’s leadership freedom. It’s not about slowing innovation but about making it safe to maintain speed. Zero trust transforms security from ‘the office of No’ into the foundation that lets the business say “Yes” faster. It gives leaders the confidence to make bold calls.What’s the alternative, really? Keep playing defense? Keep letting legacy liabilities dictate your pace of innovation? Do that and watch competitors lap you.&nbsp;Zero Trust isn’t procurement. It’s postureJust remember not to treat zero trust deployment like a checkbox exercise. It’s a mindset. It’s not just buying a tool; it’s rethinking access, identity, and trust across your entire environment. Beware of vendors who pitch zero trust like it’s a product you can buy on a Tuesday and deploy by Thursday. If someone promises you zero trust in a box, they’re selling you a box.It takes effort to build a great zero trust foundation because ‘verify everything’ isn’t one-size-fits-all. You must define exactly what that means for your business: which users can touch which applications, under what conditions, and which data is truly business‑critical versus routine. It relies on identity‑led policies, granular application access, and data classification that reflects real risk, not blanket permissions or inherited trust.Getting all of this right takes planning and discipline. But done properly, it’s the difference between leading and lagging. This is why zero trust is a leadership issue, not just a technical one.So, here’s my question: What’s the project you’ve been sitting on because you couldn’t justify the risk… to your budget, time, people? What would it take to greenlight it tomorrow?Restrict risk, not innovation:&nbsp;Before you greenlight that project you’ve been sitting on, read&nbsp;The Ripple Effect: A Hallmark of Resilient Cybersecurity for a clear blueprint on extending resilience beyond your walls.]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Der Ripple-Effekt: Warum Ihre Cyberresilienz über interne Sicherheitsmaßnahmen hinausgehen muss]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</guid>
            <pubDate>Fri, 27 Feb 2026 20:34:22 GMT</pubDate>
            <description><![CDATA[Die Welt wird von Tag zu Tag gefährlicher. Von KI-gestützten Cyberangriffen und den drohenden Risiken durch Quantencomputing bis hin zu geopolitischen Spannungen und der Volatilität der Lieferketten – externe Kräfte senden Schockwellen durch jedes Unternehmen. Für Unternehmen, die Geschäftskontinuität und Agilität anstreben, reicht es nicht mehr aus, lediglich auf diese Störungen zu reagieren. Resilienz muss sich von einem internen Abwehrmechanismus zu einem nach außen gerichteten Gestaltungsprinzip weiterentwickeln.Um besser zu verstehen, wie Unternehmen mit diesem externen Druck umgehen, befragte Zscaler 1.750 IT-Führungskräfte in 14 globalen Märkten. Während das Engagement und die Investitionen in Cyberresilienz hoch sind, zeigen unsere Ergebnisse eine entscheidende Lücke auf: Das Vertrauen der Unternehmen spiegelt oft eher eine wahrgenommene Kontrolle über interne Systeme wider als eine tatsächliche Vorbereitung auf externe Störungen. Weltweit gab eine Mehrheit der IT-Führungskräfte (61 %) zu, dass ihre Resilienzstrategien zu stark nach innen gerichtet sind.Der diesjährige Bericht „Der Ripple-Effekt: Ein Kennzeichen resilienter Cybersicherheit“ zeigt auf, dass echte Resilienz sich über alle Abhängigkeitsebenen hinweg – wie Geschäftspartner, Plattformen und Lieferketten – ausbreiten muss, um externe Schockwellen zu dämpfen, bevor diese den Betrieb destabilisieren. Durch einen Resilienz-orientierten Ansatz, der über die eigenen Grenzen hinausreicht, können Unternehmen die Fähigkeit entwickeln, den unvermeidlichen Ernstfall zu überstehen.Kritische Lücken: Wo die Orientierung nach innen versagtNach innen gerichtete Sicherheitsvorkehrungen bergen Risiken für Unternehmen in vier Kernbereichen. Erstens stellt die Abhängigkeit von Drittanbietern eine erhebliche Schwachstelle dar: 68 % der Unternehmen verlassen sich verstärkt auf Drittanbieter, aber weniger als die Hälfte hat ihre Resilienzstrategie aktualisiert, und die Umsetzung von Risikokontrollmaßnahmen liegt unter 50 %. Diese gravierende Diskrepanz führte dazu, dass 60 % der Unternehmen im vergangenen Jahr einen erheblichen, durch einen Lieferanten verursachten Ausfall erlitten. Noch alarmierender ist, dass nur die Hälfte der Unternehmen (54 %) durch eine Cyberversicherung gegen Schäden durch Dritte abgesichert sind. Zweitens stellt die sich ständig weiterentwickelnde Technologie eine Herausforderung dar: 52 % der IT-Führungskräfte glauben, dass ihre derzeitigen Sicherheitsvorkehrungen nicht ausreichen, um bestehende oder neu auftretende Bedrohungen wie agentenbasierte KI und Quantencomputing abzuwehren. Während 42 % agentenbasierte KI testen und 34 % sie bereits implementiert haben, geschah dies bei der Hälfte ohne Governance. Sieben von zehn Befragten berichten von mangelnder Transparenz hinsichtlich des Einsatzes von „Schatten-KI“, 56 % befürchten die Offenlegung vertraulicher Daten. Darüber hinaus haben 57 % die Post-Quanten-Kryptographie (PQC) nicht in ihre Sicherheitsstrategie einbezogen, obwohl 60 % erkennen, dass die heute gestohlenen Daten in 3 bis 5 Jahren gefährdet sein könnten. Drittens erzwingt der makroökonomische Druck rasche Veränderungen: 74 % der IT-Führungskräfte sind der Ansicht, dass das makroökonomische Umfeld schnelle Kurskorrekturen erfordert. Trotz tendenziell besserer Planung (71 % aufsichtsrechtliche Compliance, 69 % Datenlokalisierung), bleibt vieles reaktiv.Die Abhängigkeit von ausländischen Technologieanbietern beeinflusst die Diskussionen über Richtlinien und Vorschriften zur Datensouveränität und treibt proaktive Veränderungen voran. Unsere Umfrage zeigt, dass IT-Führungskräfte dieses Risiko aktiv mindern: 79 % bewerten ihre Abhängigkeit von ausländischer Technologie, während sechs von zehn ihre Cyber-Resilienzstrategie im vergangenen Jahr aktualisiert haben, um neuen oder sich entwickelnden Souveränitätsanforderungen gerecht zu werden. Im vergangenen Jahr haben 60 % ihre Strategien zur Stärkung der Cybersicherheit aufgrund geänderter Vorschriften wie NIS2, DORA und DSGVO aktualisiert.Schließlich stellen Legacy-Architekturen nach wie vor eine erhebliche Hürde dar, da 81 % der Unternehmen immer noch in kritischem oder mittlerem Maße auf Legacy-Systeme angewiesen sind. 64 % der Befragten gaben außerdem zu, dass ihre derzeitige Infrastruktur eine effektive Reaktion auf Störungen behindert, und 59 % sagten, ihre Architektur könne mit den Veränderungen im Geschäftsbetrieb nicht Schritt halten. Um echte Resilienz zu gewährleisten, müssen Unternehmen externe Stresstests durchführen, wie z. B. der Simulation von Quantenbedrohungen, KI-Innovationen und Lieferantenabhängigkeiten, um versteckte Risiken aufzudecken.So stärken Sie Ihre Resilienz durch gezielte Planung: drei MaßnahmenUm Sicherheitslücken zu schließen und von einem schützenden „Ripple-Effekt“ zu profitieren, müssen Unternehmen ihren Resilienzansatz nach außen erweitern. Dies beinhaltet die Priorisierung von Transparenz und die Verankerung proaktiver Risikoanalysen überall. Über interne Systeme hinaus müssen auch die externen Kräfte berücksichtigt werden, die das operative Risiko beeinflussen, und Daten über interne Systeme, externe Partner und die gesamte Lieferkette hinweg verfolgt werden. Um dies zu erreichen, sind drei strategische Kurswechsel erforderlich:Überblick über architektonische Anpassungen: Agilität ist der Schlüssel und erfordert flexible Architekturen, die schnell auf Veränderungen der externen Bedrohungslage reagieren können. Ein Plattformansatz vereinfacht diese Anpassung; Komplexität ist der Feind der Agilität, und die Entkopplung von Sicherheit und Netzwerkinfrastruktur ist für uneingeschränkte Geschwindigkeit unerlässlich.Transparenz und proaktives Risikomanagement: Wechseln Sie von der reaktiven Bedrohungsanalyse zur proaktiven Risikoanalyse und verfolgen Sie Ihre Daten überall – in internen Systemen, bei externen Geschäftspartnern und entlang der gesamten Lieferkette.Kontinuierlicher Aufbau – Zukunftssicherheit ist kein plötzlicher Sprung, sondern ein evolutionärer Prozess: Mit einer robusten, interoperablen Plattformarchitektur wird Zukunftssicherheit zu einem fortlaufenden Prozess. So baut beispielsweise die Absicherung von Agentic AI auf bestehenden DLP-Maßnahmen auf, und die Vorbereitung auf Post-Quanten-Kryptographie ist ein überschaubarer Prozess mit Transparenz und inkrementellen Updates.Resilienz als Ripple-Effekt, der sich von innen nach außen ausbreitetDie Zscaler Zero Trust Exchange wurde speziell entwickelt, um diese erweiterte, nach außen gerichtete Resilienz zu gewährleisten. Als Cloud-native Sicherheitsplattform unterstützt sie Unternehmen in mehrfacher Hinsicht:Priorisieren von Transparenz: mit einer einzigen Overlay-Sicherheitsplattform, die Datensicherheit, KI-Sicherheit und Drittanbietersicherheit unterstützt und so eine durchgängige Kontrolle über die gesamte Risikofläche ermöglicht, einschließlich Auftragnehmer und Lieferketten.Vereinfachte Architektur durch Plattformansatz. Dieser entkoppelt die Sicherheit von der Netzwerkinfrastruktur, ermöglicht sichere, identitätsbasierte Verbindungen und erlaubt es Unternehmen, Märkte oder Datenflüsse schnell neu zu konfigurieren, wenn sich die Bedingungen ändern. Selbst die Anforderungen an die Datensouveränität werden mit 25 Rechenzentren in ganz Europa erfüllt.Zukunftsfähige Anpassungsmöglichkeiten auf Basis von Zero Trust: GenAI-Sicherheit und PQC-Transparenz können einfach über ein einziges Dashboard aktiviert werden. Auf der Grundlage einheitlicher Kontrollmechanismen wird langfristige Einsatzbereitschaft gewährleistet.In der heutigen Drittanbieterökonomie ist die Resilienz eines Unternehmens nur so stark wie das Ökosystem, von dem es abhängig ist. Wenn ein Unternehmen keine Kontrollmechanismen für Lieferanten, Auftragnehmer und gemeinsam genutzte Plattformen entwickelt und diese nicht kontinuierlich überprüft, wird der Vorfall beim Lieferkettenpartner zum katastrophalen Ausfall im eigenen Betrieb.Um in unsicheren Zeiten erfolgreich zu sein, müssen Unternehmen ihre Resilienz von innen nach außen stärken und von reaktiven Maßnahmen zu proaktiven, überlegten Aktionen übergehen.Stellen Sie Ihre Resilienz auf ein solides Fundament, damit der dadurch entstehende Schutz sich nach außen ausbreitet und die Auswirkungen externer Schockwellen, die außerhalb Ihrer Kontrolle liegen, verringert werden.Benötigen Sie Unterstützung? Wenden Sie sich an Zscaler, um den Ripple-Effekt in Ihrem Unternehmen zu verstärken, und sehen Sie sich hierden vollständigen Bericht an.]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[MWC 26: Zscaler Cellular provides a secure and connected world with Telecommunication partners]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</guid>
            <pubDate>Thu, 19 Feb 2026 09:44:23 GMT</pubDate>
            <description><![CDATA[Mobile World Congress is where industries come together to shape what’s next in connectivity - from cellular and private networks to massive-scale IoT. But as enterprises accelerate deployment of connected devices in all manner of environments, from warehouses and retail kiosks to EV chargers and smart city infrastructure, security teams are facing a hard truth: traditional, network-based security models were not built for today’s highly mobile and distributed cellular environments. With AI tools and services booming in organizations, the need for secure device connectivity and accurate data is bigger than ever before.Legacy approaches to cellular-connected security often rely on costly backhaul architectures and infrastructure that can’t scale at the speed of business. Many of these devices operate beyond the practical reach of firewalls, VPNs, and software agents. They are often deployed in hard-to-access locations, managed by different teams, and moved across regions and borders. As a result, organizations struggle with the fundamentals: having visibility into all data streams, controlling how devices connect, enforcing consistent policy, and responding fast when something changes. That lack of visibility and control creates security vulnerabilities and expands organizations' attack surface in exactly the places attackers increasingly target.Zscaler Cellular eliminates these challenges by embedding Zero Trust protection into the SIM itself. That means every packet of data from a cellular-connected device can be evaluated at the first connection—enabling real-time policy enforcement and secure routing through Zscaler’s global, cloud-native security platform. This is a foundational shift from “add security later” to initiate security immediately, at the point where connectivity begins.Visibility and control in “black box” cellular ecosystemsIn many cellular deployments, the customer experience has historically been connectivity-heavy. But security and application-level control are typically left to the enterprise, creating a shared responsibility model where the biggest immediate gap is often visibility. Zscaler Cellular addresses that gap from day one by enabling organizations to treat each asset as an isolated environment, aligned with the Zero Trust architecture. Assets can communicate only according to policy, rather than inheriting implicit trust simply because they are connected. A modern cellular security approach can pair carrier resilience with a control plane for SIM management, while adding security policy enforcement on top turning a fragmented, opaque environment into something measurable and governable. Based on its initial success with the cellular security offer, Zscaler takes the cellular service one step further into the connectivity world.Zscaler partners with leading telecommunications companies to bring advanced Zero Trust security to cellular-connected devices. Connectivity has always been perceived as part of the end-to-end solution and Zscaler is focused on delivering a complete outcome to customers, together with the telecommunication service provider; Providing secure access, protection, and visibility for cellular-connected environments at cloud scale. By leveraging the Zscaler Zero Trust Exchange with telecom infrastructure, Zscaler Cellular delivers secure, scalable, and seamless connectivity to all kinds of mobile devices or things.&nbsp;For enterprises, these partnerships help deliver managed security services that address the unique challenges of securing distributed, cellular-connected environments and thus extending Zero Trust principles across global cellular networks to reduce risk and enable transformation at scale.&nbsp;Partnering with providers to extend reach without heavy liftThat is the reason why Zscaler is investing in partnerships with telecom service providers at this year's MWC. Those partners bring&nbsp;reach, spectrum, and the connectivity footprint, while Zscaler enables&nbsp;Zero Trust security, visibility, and control for the data streams. Zscaler has always been an overlay technology as we don’t depend on&nbsp;how packets move from A to B, but rather focus on securing the conversation between the source and destination. Based on this handshake, providers can deliver an end-to-end offering that customers are actively asking for. This partner-led approach supports the customer‘s choice. Some organizations want to keep their existing provider relationships and SIM estates. Others prefer a fully managed solution. Mobile World Congress 2026 is the right moment for telecom providers to turn security into a growth engine.&nbsp;Zscaler is working with a select set of telecom providers like NTT and Singtel amongst others to build deep integrations that benefit both sides. Providers can continue selling their own SIMs domestically, while enabling customers with international footprints to extend secure connectivity through Zscaler Cellular, delivered via the provider relationship. The result is a practical way for service providers to expand reach and local breakout options without requiring large upfront investments in new equipment or complex deployments. This allows telecom providers to monetize next-generation 5G networks and security with one of the most powerful value-add services they can bring to market. Zscaler has built a global, cloud-native security backbone that now also understands mobile networking. By integrating with Zscaler Cellular, providers can accelerate secure local breakout and deliver 5G-ready experiences with an enterprise-grade security layer without forcing major capital expenditure or rebuilding their portfolios from scratch.Ask for your personal meeting with the Zscaler team on site via this&nbsp;meeting scheduler. See you in Barcelona at MWC!]]></description>
            <dc:creator>Daan Huybregts (Head of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Hamburger IT-Strategietage 2026: KI wird erwachsen – und KI-Sicherheit muss mitwachsen]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/hamburg-it-strategy-days-2026-ai-is-growing-up-and-ai-security-must-grow-with-it</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/hamburg-it-strategy-days-2026-ai-is-growing-up-and-ai-security-must-grow-with-it</guid>
            <pubDate>Wed, 11 Feb 2026 16:04:24 GMT</pubDate>
            <description><![CDATA[Auf dem jährlichen Branchentreff des IT-Managements in Hamburg werden vom 18. bis 20. Februar Trends diskutiert, die die CIOs derzeit beschäftigen. Deshalb überrascht das Dreigestirn auf der Agenda: „AI-Economy – Resilience – Sovereignty“ nicht, denn gerade in diesen Bereichen ist der Gesprächsbedarf aktuell groß. KI ist endgültig aus der Experimentier-Ecke herausgetreten und bekommt für&nbsp; agentenbasierte KI die große Bühne. Doch die Frage bleibt, wie sich Organisationen Resilient by Design aufstellen können, angesichts der wachsenden externen Bedrohungen durch KI, den&nbsp; geopolitischen Rahmenbedingungen und neuen Abhängigkeiten in Form von Supply Chains.KI-Sicherheit - Praxis-Check mit Covestro und SPLXAuf dem Event steht der Austausch mit Organisationen im Fokus, die als Vorreiter den KI-Trend bereits in die Praxis umgesetzt haben. Im Zscaler Fireside-Chat im CIO Forum mit Covestro und SPLX wird eruiert, wie agentenbasierte KI-Systeme die reale Risikolage verändern und wie Unternehmen mit einer “KI first Strategie” Sicherheit und Governance in Einklang bringen können, ohne Innovationen auszubremsen.&nbsp;In vielen Unternehmen geht es nicht mehr nur um Chatbots oder ein paar Prompts, sondern bereits um die Erprobung von Systemen, die denken, entscheiden und handeln – teils autonom, teils in verteilten Workflows. Da diese Systeme nicht nur Antworten generieren, sondern Ziele verfolgen, Schritte planen und Aktionen ausführen können, rücken sie ins Visier von modernen Angreifern. Diese nützen die neuen Einfallsvektoren, die sich in agentenbasierten KI-Systemen rund um die APIs und Supply Chains ergeben, wenn KI über Unternehmensgrenzen hinweg interagiert. Neben dem erwarteten Produktivitäts-Booster wird die KI zur operativen Kraft in Prozessen – und Sicherheitsfragen werden plötzlich sehr real. Je autonomer Systeme handeln, desto wichtiger wird es, deren „Blastradius“ durch moderne Sicherheitsarchitekturen zu begrenzen.&nbsp;Viele Organisationen haben bereits Zero Trust-Prinzipien etabliert und sichern damit&nbsp; Identitäten, minimieren Zugriffsrechte und tragen zur Segmentierung kritischer Unternehmensbereiche bei. Genau diese Logik der kontinuierlichen Sicherheitsbewertung von Usern, Workloads oder Geräten lässt sich konsequent auf die KI erweitern.&nbsp;Durch Cloud-basierte Zero Trust-Sicherheit lassen sich sowohl die User zu App-Kommunikation als auch die Kommunikationsbeziehungen von KI-Agent zu App oder Agent zu Agent absichern. Wenn Transparenz und Regelwerke für Berechtigungen von Beginn an in agentische KI-Systeme implementiert werden, lassen sich Workloads und Zugriffspfade ebenfalls nach dem Zero Trust-Prinzip beherrschen.Allerdings mangelt es Unternehmen heute am zuverlässigen Einblick, wo KI bereits überall zum Einsatz kommt. Neue Komponenten oder embedded Tools schießen aus dem Boden. Dementsprechend muss der erste Schritt lauten, sich den Überblick zurückzuerobern. Welche Tools, Gateways, Modelle oder Integrationen werden in der Unternehmensumgebung genutzt? Aufbauend auf diesem Überblick müssen an die Stelle von Wildwuchs bewusstes Asset Management treten und Kontrollpunkte geschaffen werden, um ungewollten Datenabfluss zu verhindern.Darüber hinaus gilt es, ein Bewusstsein dafür zu entwickeln, dass KI-Sicherheit nicht nur ein Modell-Thema ist. Auch und gerade für KI-Systeme braucht es Schutz vor und nach der Modellphase. Deshalb wird im Fireside-Chat von SLPX das Thema Red-Teaming für KI adressiert. Anstelle der Hoffnung, dass nichts passieren wird, tritt der Realitätscheck. Dabei wird gezielt nach Schwachstellen gesucht, die von Angreifern ausgenutzt werden könnten, bevor sie im laufenden Betrieb zu Schaden führen. Diese Diskussionsrunde im CIO-Forum findet am 19. Februar um 13:55 Uhr statt.Datensouveränität – Rückschritt in Silos oder Sprungbrett zur Kontrolle?Zscaler ist auf den Strategietagen mit einem weiteren Diskussionsthema vertreten. Im Breakout mit der Deutschen Börse wird das aktuelle Thema beleuchtet, wie Datensouveränität und Datensicherheit mit Hilfe der Cloud in Einklang zu bringen sind. Für diesen CIO-Roundtable am 18. Februar um 16:10 Uhr ist eine Registrierung erforderlich.&nbsp;Fazit: KI-Tempo ja – aber mit SteuerbarkeitDie Hamburger IT-Strategietage sind der richtige Rahmen für ein klares Update: Agentenbasierte KI bringt enorme Chancen, aber sie verschiebt die Risikogrenzen. Unternehmen brauchen keine KI-Panik – sie brauchen Transparenz, Governance und&nbsp;Sicherheitsarchitekturen, die moderne Daten- und Aktionsflüsse beherrschen.Wenn Sie auf den Strategietagen dabei sind: Kommen Sie vorbei, bringen Sie Ihre konkreten Fragen mit – und lassen Sie uns gemeinsam die Diskussion von „KI als Trend“ zu „KI als steuerbarer Unternehmensrealität“ drehen. Über die App der Hamburger Strategietage ist das Zscaler-Team vor Ort für ein persönliches Gespräch erreichbar.]]></description>
            <dc:creator>Christoph Schuhwerk (CISO in Residence)</dc:creator>
        </item>
        <item>
            <title><![CDATA[eWorld: IT- &amp; OT- Sicherheitstransformation mit Zero Trust macht die Energiewirtschaft zukunftssicher]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/eworld-it-and-ot-security-transformation-with-zero-trust-makes-the-energy-industry-future-proof</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/eworld-it-and-ot-security-transformation-with-zero-trust-makes-the-energy-industry-future-proof</guid>
            <pubDate>Thu, 05 Feb 2026 09:26:51 GMT</pubDate>
            <description><![CDATA[In Essen trifft sich vom 10. - 12. Februar einmal mehr die europäische Energiewirtschaft auf dem zentralen Branchentreffpunkt für Entscheidungsträger. Bei den Netzbetreibern und Versorgern wird das Interesse der IT- und OT-Verantwortlichen besonders groß sein. Denn nach der Ratifizierung des NIS2-Umsetzungsgesetzes im Dezember 2025 ist der Informationsbedarf hinsichtlich der konkreten Umsetzung moderner Cybersicherheit ein zentrales Thema. Wie lässt sich angesichts der zunehmenden Cyberbedrohungen für Stadtwerke und Energieversorger dieses Jahr der Sprung in die Transformation zu mehr Sicherheit schaffen?Die Energiewirtschaft steht an einem Wendepunkt. Angesichts der rasanten Digitalisierung und immer komplexeren Sicherheitslandschaften wird klar: Die Branche braucht nicht nur innovative IT-Lösungen, sondern auch einen radikalen Schnitt zu herkömmlichen Cybersicherheitssystemen, um den heutigen KI-gesteuerten Bedrohungen Stand zu halten. Führende Energieversorgungsunternehmen haben den Sprung in die Zukunft bereits geschafft und dienen als Vorreiter in Sachen Transformation. Mit Hilfe eines Zero Trust- Sicherheitsmodells sichern sie schon heute nicht mehr nur ihre IT-Infrastruktur, sondern sorgen auch für die erforderliche Segmentierung und granulare Zugangsberechtigungen auf OT-Umgebungen. Ein zentraler Aspekt bei Zero Trust-Architekturen ist der Grundsatz, dass keiner Datenkommunikation mehr implizit vertraut wird. Bei jeglichem Zugriff auf Anwendungen und Systeme, auf lokale Daten oder Cloud-Umgebungen aber auch auf Geräte, Zweigstellen oder Maschinen wird der Datenaustausch kontinuierlich verifiziert und autorisiert, bevor eine Verbindung hergestellt wird.&nbsp;Während große Versorgungsunternehmen im Zuge ihrer IT-Transformation bereits auf Zero Trust setzen, stehen auf der anderen Seite viele kleinere und mittlere Stadtwerke, die mit der Digitalisierung gerade erst beginnen. Diese kommunalen Versorger sind traditionell vorsichtiger und oft in ihren bestehenden Systemen verwurzelt. Doch auch hier besteht Handlungsbedarf, denn die wachsenden Bedrohungen durch Cyberangriffe machen auch vor den kleineren Betreibern nicht Halt. Auch diese kritischen Infrastrukturen und deren digitaler Wandel erfordern den Aufbau sicherer, moderner und agiler IT-Systeme als geschäftskritische Grundlage für einen resilienten Versorgungsbetrieb der Bevölkerung.IT und OT-Sicherheit verschmelzenWährend sich die erste Welle der IT-Transformation hauptsächlich auf klassische IT-Systeme konzentrierte (z. B. Büro-IT, Netzwerke und Cloud-Umgebungen), verschiebt sich derzeit der Fokus auch auf den Bereich der Operational Technology (OT). Hierzu gehören physische, operative Systeme wie Smart Grids, SCADA-Systeme oder IoT-Technologien, die für die Steuerung und Überwachung von lokalen Versorgungsunternehmen unerlässlich sind. Doch diese Systeme stehen vor besonderen Anforderungen, denn gerade kleinere Energieanbieter nutzen noch herkömmliche, geschlossene Systemarchitekturen mit Air Gap-Ansätzen, die einst als sicher galten. Die zunehmende Verzahnung durch digitale Netze und IoT-Sensoren macht jedoch erforderlich, dass diese Schutzmechanismen im Zuge der Digitalisierung aktualisiert werden.&nbsp;Zscaler ist ein erfahrener Partner an der Seite führender Energieunternehmen, die mit uns gemeinsam bereits vor einigen Jahren begonnen haben, die Vorteile einer Zero Trust Architektur umzusetzen. Aufbauend auf dieser Expertise und der Branchenkenntnis unseres Partners Deloitte helfen wir dabei, die komplexen Herausforderungen moderner IT- und OT-Umgebungen zu bewältigen – sicher, agil und zugleich skalierbar. Wir verstehen gleichermaßen die Anforderungen großer Konzerne sowie die Besonderheiten und Bedürfnisse kleinerer, kommunaler Versorger zu adressieren. Mit maßgeschneiderten Lösungen und partnerschaftlichem Ansatz helfen wir Unternehmen jeder Größe, die Digitalisierung sicher umzusetzen – von der Implementierung eines Zero-Trust-Ansatzes bis hin zur Transformation Ihrer OT-Systeme.Wie mit einem Zero Trust-Ansatz lokale Versorgungsunternehmen eine umfassende Sicherheitsstrategie aufbauen können, die sowohl IT- als auch OT-Systeme nahtlos integriert und zukunftssicher macht, erläutert Zscaler am 11. Februar um 10:45 – 11:15 Uhr gemeinsam mit Deloitte in Halle 6, Stand 6F112.]]></description>
            <dc:creator>Christoph Schuhwerk (CISO in Residence)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore Highlights Resilience and the secure Future of AI]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</guid>
            <pubDate>Mon, 22 Dec 2025 13:40:26 GMT</pubDate>
            <description><![CDATA[It was a privilege to join my colleagues on stage for Zenith Live Encore in London earlier this month at the Vision Hall in King’s Cross. Alongside Lee Langley we welcomed over 400 security leaders and innovators to discuss the convergence of AI and Zero Trust. The energy was palpable, and if you couldn’t join us, here is a summary of the key themes and discussions that defined the day.&nbsp;A year of bold transformationThe pace of transformation across EMEA over the last 12 months has been remarkable. We are proud to having been able to help a growing number of organizations fully embrace Zero Trust, consolidate their platforms, and effectively counter real-world threats.&nbsp;However, as we move forward, the lines between internal networks and the public cloud have become increasingly blurred. To navigate this evolution, organizations must shift their mindset. I am continually inspired by the boldness and innovation demonstrated by our customers, but we must all recognize that we aren’t just deploying technology for technology’s sake, we are deploying it to solve critical business challenges.&nbsp;Value over enforcementIn a session on Secure AI Innovations led by James Tucker, Head of CISO at Zscaler, we dug into the reality of AI adoption. There was a clear consensus: the implementation of AI is fundamentally a business process discussion. We need to move from application to finding genuine value. This means focusing on what brings the most time back to employees and identifying where the biggest vulnerabilities lie. Often, the simplest problems to identify are the most complex to solve, which is why bringing employees into the conversation is vital to understand what AI tools they are using to bridge these gaps. This insight is critical for mapping the true flow of data across an organization is a necessary step when we accept that the AI universe is in fact a data security challenge.&nbsp;Speed vs. security – can we have both?&nbsp;One of the day’s standout moments was our industry panel, “The Need for Speed (And Security): Enabling Agentic AI Innovation Without Hitting the Brakes”. Featuring insights from Zeki Turedi, Field CTO at CrowdStrike, Rob Hale, Principal EMEA Security Leader at AWS, and Yaroslav Rosomakho as Zscaler Chief Scientist. The discussion underscored that we are in the midst of the Agentic era and shifting from where AI simply automates tasks but actively executes them on our behalf. This means that we will face more adversaries and more threats than ever before, requiring our defenses to keep pace.&nbsp;As AI agents become more autonomous, the attack surface expands, making it even more of a challenge to enable innovation without wanting to take pause. For security leaders, this means we now need to find that delicate balance and apply a slight break to ensure that we can move at the speed of AI, while still maintaining robust Zero Trust principles.&nbsp;Zero Trust EverywhereFrom disrupting new cyberthreats online, to hearing the real-world stories shared on stage, I feel even more assured that security must be woven into the very fabric of our digital future. And our mission – Zero Trust Everywhere, Powered by AI – is the blueprint for that future.&nbsp;But we cannot do it alone and none of this is possible without the trust of our customers and the dedication of our partners. Thank you for your continued faith in us and I look forward to seeing you all at our next&nbsp;event in January 2026 where we will demonstrate how organisations can accelerate their AI initiatives with Zero Trust.&nbsp;]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore: How to Build a Resilient Digital Future with Zero Trust and AI]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</guid>
            <pubDate>Wed, 26 Nov 2025 21:50:57 GMT</pubDate>
            <description><![CDATA[Organizations face unprecedented pressure to push their technological boundaries as AI adoption accelerates and competition intensifies. However, the current pace of AI integration far outstrips the speed in which organizations normally assess and address the risks. As a result, the race between innovation, speed and security is leaving defenders in an increasingly vulnerable position.&nbsp;IT security practitioners must enable this new technology’s use - whether public tools or internal deployments - while establishing reasonable guardrails that ensure visibility and robust data security assessments. Organizations are urgently seeking best practices to navigate AI-driven transformation. Extending Zero Trust principles to regain visibility and control of all data streams is now more critical than ever.As companies rethink how employees safely consume generative or agentic applications, they must also apply Zero Trust to their broader ecosystem of suppliers, partners, and B2B integrations. Modern supply chains increasingly share data, applications, and now AI models - creating a new attack surface if not properly secured.That’s why Zscaler’s Zenith Live event series is returning in its one-day roadshow format across Europe - turning AI insights into action. The events will showcase how a cloud-based approach to Zero Trust Everywhere can help security practitioners reduce risk, complexity, and cost in the new technology era. Zscaler experts will reveal how AI and Zero Trust are converging to redefine networking and security, fuelling rapid digital transformation and building resilient, mission-critical infrastructures to safeguard today's business aspirations.&nbsp;Participants will discover how a cloud-centric Zero Trust approach is redefining security to protect every connection, from users and workloads to IoT, OT, branches, and even AI. Security practitioners, IT architects, or networking professionals will gain practical insights and tools to drive real transformation, learning from their peers how to reset boundaries&nbsp; in the pursuit of digitalization while carefully managing cybersecurity risks. Zscaler experts will be on hand to share the latest strategies to minimize attack surfaces, eliminate lateral movement and prevent data loss.&nbsp;Following the recent SPLX acquisition, attendees will get first-hand insights at how this addition to the Zero Trust Exchange platform will extend shift-left AI asset discovery, automated red teaming, and governance - helping organizations secure their AI investments from development through deployment. We’re also bringing back industry panels and fireside chats, offering attendees the opportunity to learn from industry leaders and network with their peers.Agentic AI – Friend or Foe?As part of the agenda, we will also be speaking with Zscaler customers at different stages of their Zero Trust transformation journey. Panellists from leading private and public organizations will share their learnings in a ‘fireside chat’ - helping others who wish to take that first step towards a Zero Trust architecture. Having overcome their own implementation challenges, they’ll offer insights and guidance to make Zero Trust a reality.&nbsp;New this year: a panel on the emergence, adoption and security of Agentic AI. Zeki Turedi, Field CTO at Crowdstrike, and Rob Hale, Principal Security Segment Leader at AWS, will debate whether Agentic AI is a friend or foe - and underline the importance of retaining control over critical digital infrastructure, redefining data governance, and unlocking innovation securely.To learn more about the Zenith Live Encore agenda in your city and discover how Zscaler secures data, applications, devices and users on organizations’ transformation journeys, visit the&nbsp;registration site. See you in London on Tuesday, 9th of December 2025 in Vision Hall!&nbsp;]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enabling Europe’s Digital Sovereignty Through Technology]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</guid>
            <pubDate>Fri, 14 Nov 2025 20:21:06 GMT</pubDate>
            <description><![CDATA[For years, Europe has discussed the concept of digital sovereignty, but geopolitical fragmentation and a growing ambition for technological independence have moved the discussion from theory toward action. On November 18, the French and German governments will host a high-level summit aimed at turning this aspiration into a practical roadmap. It’s a pivotal moment as policymakers, industry leaders, and advocates unite to safeguard Europe’s digital future.Let’s be clear: Europe is charting new territory. The ambition to secure control over critical digital infrastructure, redefine data governance, and unlock innovation is bold, understandable, and yet complex. It is, however, not a concept with a clear definition. In fact, if one visited the various EU capitals one would probably encounter more than 27 different versions of what “digital sovereignty” could mean. But the lack of one coherent and agreed upon definition should not be misunderstood. To paraphrase a senior official from one of the largest member states during a recent conversation: The call for digital sovereignty is loud and ideological.&nbsp;In Europe, there is indeed an increasing convergence on a number of principles. First and foremost, it’s about securing the future; about being in control of data, being independent, ensuring service continuity, demanding transparency, and making sure that Europe reaps the benefits of the digital age and remains competitive on the global stage.The tech industry has a responsibility to respond in earnest. At Zscaler, we understand the critical nature of this goal. We believe sovereignty must be achieved on European terms. As a global leader in cybersecurity with almost 2,500 customers across Europe, we are committed to innovating and delivering cutting-edge technology that aligns with and supports Europe’s digital vision. As a testament to this commitment Zscaler was in 2010 the first security service provider to build a cloud for Europe.Ahead of the Summit in Berlin, we offer our perspective on some of the defining elements of digital sovereignty and explore how solutions deliver the security, flexibility, and independence European organizations demand to thrive in today’s interconnected world.1. Safeguarding European DataEurope’s data must be private, secure, and local. As organizations adopt global cloud systems, they are concerned about losing control over sensitive information to outside actors or cyberthreats. Data sovereignty is about keeping data protected, and ensuring compliance with national rules while building trust for critical operations.How Zscaler Supports Europe’s Data Protection and Localization Goals:Zscaler does not store end-user content: All inline traffic processing is performed in-memory inside the local infrastructure, simplifying data control.The Zscaler Zero Trust Exchange secures application access without exposing sensitive data.The platform’s cloud-native design leverages encryption, data visibility, and granular access controls, seamlessly aligning with GDPR and broader compliance requirements.Customers can opt to exclusively use European infrastructure. Zscaler has 25 data centers across Europe (20 in EU countries), ensuring data processing happens locally for optimal performance and sovereignty.European customers' can ensure that their log data is stored within Europe. However, customers have full control over storage decisions and have the option to have data hosted in any sovereign or in-country logging zones.Zscaler makes data control simple and enables organizations to uphold the principles of Privacy by Design and Privacy by Default while delivering low-latency, highly secure access.&nbsp;2. Securing Digital AutonomyDigital sovereignty involves reducing overreliance on foreign technologies, and keeping control over systems. Europe needs flexible frameworks that avoid vendor lock-in while enabling secure innovation. Without autonomy, organizations risk being limited in how they evolve and protect their most critical digital assets.How Zscaler Facilitates Europe's Technological Independence and Cybersecurity Goals:Enabling Europe’s Technological Independence:Zscaler’s vendor-neutral architecture allows European businesses to retain flexibility in their IT frameworks, allowing organisations to mix and match solutions across cloud, data, endpoint, identity, and services from different technology providers. For more information, please visit:&nbsp;/partners/technologyZscaler facilitates delegation of administration which allows only EU citizens to define policies, logging and viewing of any data on our platform.A cloud-based approach ensures businesses can reduce dependencies on legacy systems while avoiding vendor lock-in, preserving sovereignty and freedom to innovate.Zscaler ensures businesses can migrate from legacy systems without being locked into specific hardware, proprietary ecosystems, or constrained by external dependencies.Securing Europe’s Critical Infrastructure:With Zscaler’s Zero Trust architecture, users and devices are continuously authenticated and authorized before accessing applications, preventing breaches.Zscaler’s advanced threat protection capabilities protect organisations from malware, Zero-Day vulnerabilities, and AI-driven cyberthreats, while safeguarding operations across the continent.Zscaler is working with hosting and service providers to own &amp; operate sovereign solutions built on Zscaler cloud solutions in their European datacenters.&nbsp;Zscaler is redefining security for a resilient, self-reliant Europe by blending cutting-edge technology with scalable and best-in-class security.3. Accelerating InnovationInnovation drives growth and competitiveness, and Europe must embrace new technologies to stay ahead. To succeed, organizations need to adopt solutions that are secure and compliant, while still giving them the ability to operate and scale confidently without putting sensitive data at risk.How Zscaler Facilitates Europe’s Innovation and Competitiveness Goals:By facilitating secure, cloud-first strategies, Zscaler reduces infrastructure costs, freeing resources for new investments in innovation and growth. Scalable, flexible solutions allow organizations to confidently adopt emerging technologies.With Zscaler’s capabilities, businesses can seamlessly enable secure hybrid work environments, delivering security and flexibility for modern workplaces.Zscaler innovates, improves operational efficiencies, and responds to market trends faster, gaining a critical edge against international competitors, while maintaining compliance with Europe’s rigorous regulatory standards.A no-compromise Zero Trust approach ensures that organizations can innovate and expand without exposing their systems, people, or data to unnecessary risk.At the same time, a transition away from legacy technology offers the additional advantage of combining state-of-the-art protection while reducing costs: Unlike previous technological innovations, moving forward saves resources.&nbsp;Zscaler redefines what it means to innovate securely in the digital age, ensuring that European businesses grow and stay competitive internationally.4. Delivering Responsible AIAI has the potential to transform the digital economy, but it also brings security vulnerabilities and the risk of misuse. Europe’s goal is to adopt AI responsibly by focusing on privacy, ethical standards, and robust safeguards that ensure trust and transparency in AI systems.&nbsp;As recently recommended in a joint report&nbsp;by French and German authorities, Zero Trust must be applied to LLM systems to address AI-specific security challenges.How Zscaler Enables Responsible AI Adoption:Achieving the productivity gains from AI requires that the AI systems can run safely without exposing organizations to risk.Zscaler is committed to ensuring that any AI systems it deploys in its products adheres to the regulatory requirements set forth in the EU AI Act, which is the first comprehensive AI regulatory framework enacted in the world establishing global standards for transparency, fairness, and accountability in AI.Zero Trust principles protect sensitive AI datasets and data pipelines, preventing manipulation, theft, and malicious exploitation while preserving the integrity of algorithms and models.Through Zero Trust architecture, Zscaler safeguards the use of AI models, agentic AI, and their data pipelines, ensuring the integrity of AI solutions.Zscaler helps European organizations maximize the potential of AI, meeting ethical standards, and protecting systems and data pipelines against misuse.5. Providing Operational ResilienceDisruptions from cyberattacks, natural disasters, damage to undersea cables, and political uncertainty can threaten critical systems and data. Operational resilience helps businesses stay functional and secure during such events, ensuring stability and continuity even in unforeseen circumstances.How Zscaler Bolsters Operational Resilience:Zscaler’s Zero Trust architecture ensures secure, direct access to cloud services and applications, even during disruptions caused by internet outages or attacks on critical infrastructure such as undersea cables, due to our resilient data center architecture, keeping European businesses operational when it matters most.With real-time threat protection, Zscaler prevents ransomware and other cyber threats from disrupting critical infrastructure and business operations.Zscaler provides secure, flexible access that supports employees working from anywhere while maintaining security standards.By decoupling security from legacy network models, and embracing cloud-native solutions, Zscaler empowers organizations to adapt quickly to shifting geopolitical conditions, ensuring business continuity in even the most uncertain environments.Zscaler is the first cloud security solution to deliver a business continuity solution.&nbsp; Through either customer-hosted or third-party hosted infrastructure, Zscaler customers are protected from service interruptions due to black-outs, brown-outs, catastrophic failures of infrastructure, terrorism, or regulatory/policy changes.&nbsp; Issues local to the user, between the user and the cloud, or a cloud incident are detected and fail-over to a business continuity solution occurs automatically.Our customers have an option to keep using a self-hosted private service edge even in case of a catastrophic global routing event which would make all cloud services unavailable.Zscaler builds resilience into organizations’ systems, protecting operations against disruptions and safeguarding sovereignty goals.Zscaler delivers destination agility and resilience by dynamically rerouting traffic and adapting paths in real time, maintaining secure and continuous connectivity during internet or cloud disruptions.The New Reality Requires a Renewed Commitment to Europe’s Digital FutureAs we approach the Franco-German Summit on European Digital Sovereignty, two principles stand out as essential to the success of Europe’s digital ambitions:Digital sovereignty and open strategic autonomy must be shaped on European terms, driven by European priorities and values. This means that technology companies must innovate and deliver solutions that align with Europe’s needs and aspirations.Trusted technology providers that deliver Europe’s sovereignty in practice—not just in words—should be empowered to keep contributing to this vision. EU policy should allow trusted technology providers that demonstrably advance Europe’s sovereignty to continue contributing to this vision.Combining these principles is, in our view, critical to achieving Europe’s sovereign digital future, as well as its global competitiveness at this pivotal moment in history.At Zscaler, we recognize that enabling Europe’s digital sovereignty is about empowering European organizations to secure their systems, innovate without boundaries, and thrive on their own terms. As a global leader in Zero Trust security Zscaler is uniquely positioned to help European organizations meet today’s challenges and build a resilient, self-reliant future.]]></description>
            <dc:creator>Casper Klynge (VP, Government Partnerships)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Step Into the Future of Zero Trust + AI Security with Zscaler at AWS re:Invent 2025]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</guid>
            <pubDate>Tue, 04 Nov 2025 19:46:37 GMT</pubDate>
            <description><![CDATA[Zscaler and AWS are redefining what’s possible in the cloud. Visit Booth #1375 at the Venetian, December 1-5, to see how zero trust + AI security come together to protect data, power innovation, and simplify cloud security operations.Meet with Zscaler at AWS re:Invent 2025: Schedule a meeting | Explore Zscaler for AWSIn today’s cloud-first world, agility and innovation are everything. Yet many organizations are still weighed down by legacy tools that can’t keep up. VPNs, firewalls and static security models were never built for AI-driven transformation or a distributed workforce. They slow progress, create blind spots and expose new attack surfaces in the cloud. As organizations move more applications to the cloud and adopt GenAI, traditional security approaches put users, devices, and data at risk. The future of security depends on moving beyond these limitations towards a unified zero trust architecture. Together, Zscaler and AWS help enterprises simplify, automate, and scale securely across workloads, users, and data while keeping innovation moving forward.&nbsp; What to Expect at AWS re:Invent with ZscalerHere’s what you’ll see:Live demos showcasing Zero Trust + AI innovations in actionExpert insights on securing GenAI Apps and cloud workloadsProven strategies to eliminate VPNs/Firewalls and reduce riskReal-world customer use cases powered by Zscaler on AWSExpert theater presentations on the latest Zscaler solutionsDon’t miss these sessions:Tue., Dec. 2, 2:30PM: Securing the AI Era with Dhawal Sharma, EVP Products &amp; Strategy, ZscalerWed., Dec. 3, 4:00PM: Zero Trust: The Blueprint for Securing AI-Powered SDLC with Brian Lazear, VP, Product Management - Cloud Workloads How Zscaler + AWS Make It PossibleTogether, Zscaler and AWS deliver a secure foundation for cloud transformation.Here’s how:Unify security across AWS environments. Protect users, workloads, and data through the Zscaler Zero Trust Exchange, a global cloud platform built on AWS infrastructure.Secure GenAI applications. Discover and control AI tool usage while preventing data leakage and unauthorized access.Simplify access and eliminate VPNs. Provide seamless, content-based access to private apps on AWS and beyond without the cost and complexity of legacy VPNs.Protect workloads at scale. Segment and secure inter-workload traffic with cloud-native controls that reduce lateral movement and risk.Accelerate cloud migration. Move from on-prem to AWS with built-in visibility, automation, and policy consistency.&nbsp; Join us at AWS re:Invent 2025Zscaler and AWS are shaping the future of secure cloud innovation. Visit Booth #1375 at the Venetian December 1-5, to explore how Zero Trust and AI come together to protect data, accelerate transformation, and simplify security across your organization.Meet our experts, get a live demo, and learn how leading enterprises are using Zscaler and AWS to scale securely, operate efficiently, and innovate with confidence.Schedule a meeting | Explore Zscaler for AWS | Customer success stories | AWS Marketplace]]></description>
            <dc:creator>Dhawal Sharma (Executive Vice President, AI Security and Strategic Initiatives)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust im Fokus der it-sa 2025 – Sind wir bereit für „Zero Trust Everywhere“?]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zero-trust-in-focus-at-it-sa-2025-are-we-ready-for-zero-trust-everywhere</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zero-trust-in-focus-at-it-sa-2025-are-we-ready-for-zero-trust-everywhere</guid>
            <pubDate>Fri, 24 Oct 2025 07:08:19 GMT</pubDate>
            <description><![CDATA[Die it-sa 2025 war erneut ein zentraler Treffpunkt für IT-Sicherheitsverantwortliche. Die wachsende Zahl an Bedrohungen und innovativen Angriffsmethoden verlangt mehr denn je nach wirksamen Sicherheitskonzepten. Themen wie die Umsetzung von NIS2, künstliche Intelligenz (KI), Post-Quantum-Kryptographie, Cloud- und OT-Sicherheit dominierten die Diskussionen der Branche. Gleichzeitig wurde deutlich: Die Datenhoheit steht als übergreifendes Ziel im Zentrum der Herausforderungen.Künstliche Intelligenz: Chancen und RisikenKI verspricht enorme Potenziale für Unternehmen, geht aber auch mit neuen Sicherheitsrisiken einher. Cyberkriminelle nutzen Automatisierung und KI für gezielte Angriffsstrategien wie Prompt Hacking oder Vibe Coding. Adaptive KI-Systeme stellen Unternehmen vor zusätzliche Aufgaben, insbesondere wenn agentenbasierte KI-Anwendungen autonom kommunizieren. Die Frage lautet: Wer schützt die Daten, wenn Systeme miteinander „sprechen“?Die zunehmende Vernetzung: Ein Sicherheitsproblem?Mit der Verbreitung mobiler und dezentraler Geräte steigen auch die Anforderungen an den Schutz von Datenflüssen. Unternehmen müssen sicherstellen, dass sensible Daten durchgängig geschützt sind - unabhängig davon, wie und wo sie ausgetauscht werden. Zero Trust bietet hier ein klares Modell: Nicht Netzwerke, sondern einzelne Applikationen, Workloads und Geräte stehen im Fokus der Sicherheitsarchitektur.Zero Trust: Vision statt TechnologieWie meine Gespräche auf der it-sa verdeutlichten, setzen immer mehr Unternehmen auf das Sicherheitsparadigma Zero Trust. Der Ansatz überzeugt, da er eine ganzheitliche Sicherheitsstrategie ermöglicht – von Internetsicherheit und Remote-Zugriffen bis hin zur KI- und Gerätesicherheit. Entscheidend dabei ist, dass nicht die Technologie, sondern die Geschäftsvision im Vordergrund steht, wenn es um die Einführung geht: ein zukunftssicheres Geschäftsmodell abseits traditioneller Infrastrukturen.Der Weg zur DatensouveränitätDie Modernisierung der IT-Sicherheitsarchitektur ist in vielen Branchen – vom Gesundheitswesen bis zur Industrie oder öffentlichen Verwaltung – unabdingbar. Datenhoheit und lokale Cloud-Lösungen sind zentrale Anforderungen, insbesondere in Europa. Zscaler antwortet hier mit klaren Lösungen: Die lokale Kontrolle über Daten ist gewährleistet, ohne Abstriche bei Sicherheit und Skalierbarkeit.IT-Sicherheit als PrioritätUnternehmen müssen sich jetzt fragen: Haben sie bereits die notwendigen Schritte unternommen, um volle Transparenz und Kontrolle über ihre Datenströme sicherzustellen? Mit Zero Trust Everywhere können Organisationen ihre Sicherheitsstrategien effektiv modernisieren und gleichzeitig auf die dringlichsten Herausforderungen reagieren - sei es im Umgang mit KI, der Cloud oder mobiler Vernetzung.Unser Team steht bereit, um Unternehmen auch nach der it-sa bei wichtigen Fragen zu unterstützen und ihre Resilienz zu stärken.Falls Sie die Zscaler Vorträge auf der it-sa 2025 verpasst haben sollten, gibt es hier die Gelegenheit zum Reinhören:Dienstag, 7. Oktober:&nbsp;Resilienz und Souveränität im Zeitalter der Cloud: Eine Vision für die Zukunft entwickelnMittwoch, 8. Oktober:&nbsp;Vom Klick zur Krise: Wahre Geschichten moderner Angriffe auf MitarbeitergeräteDonnerstag, 9. Oktober:&nbsp;Von Prävention bis Reaktion: KI-gestützte SecOps in einer Zero Trust Architektur]]></description>
            <dc:creator>Christoph Schuhwerk (CISO in Residence)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Der Balanceakt zwischen dezentraler Verantwortung und strikter Sicherheit]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</guid>
            <pubDate>Thu, 23 Oct 2025 07:17:13 GMT</pubDate>
            <description><![CDATA[Geteilte Verantwortung für Sicherheitsgovernance, Implementierung und Innovation führt häufig zu fehlender Abstimmung zwischen verschiedenen Abteilungen und erschwert somit die Compliance. Für Unternehmen mit veralteter Infrastruktur wird diese Aufgabe besonders herausfordernd.  Ein Szenario, das viele große Banken im Finanzsektor kennen.Betriebliche ReibungspunkteIn großen Banken entsteht durch ihre organisatorische Größe ein komplexes Betriebsumfeld. Unterschiedliche Teams verwalten oft isoliert einzelne Technologien oder Sicherheitsbereiche, was zu fragmentierten Entscheidungen führt. Zwar fördert dieser Ansatz Fachwissen in einzelnen Bereichen, doch er verschleiert ein gravierendes Problem: Sicherheitsrichtlinien werden uneinheitlich umgesetzt. Und genau diese Uneinheitlichkeit gilt es in der stark regulierten Finanzbranche zu vermeiden.Sicherheitsverantwortung in großen Banken wird gemeinsam getragen: CISO, CIO und CTO müssen regulatorische Vorgaben, Risikomanagement und Incident Response koordinieren. Der CISO bestimmt das Sicherheitsframework, CIO und CTO setzen dessen Anforderungen in IT-Infrastruktur und Produktumgebungen um. Doch selbst mit einem einheitlichen Framework führen isolierte Arbeitsweisen häufig zu inkonsistenter Umsetzung in den einzelnen Abteilungen. Ohne einen koordinierten Ansatz steigt das Risiko, besonders in Legacy-Umgebungen, in denen Transparenz über Zugriffe und Aktivitäten nicht standardmäßig gegeben ist.Zeit und Budget sind zusätzliche Stolpersteine für Compliance. Mit der wachsenden Zahl an regulatorischen Vorgaben im Finanzsektor wird es immer aufwendiger, diese einzuhalten. Audits können sich über Wochen oder Monate hinziehen und erfordern erhebliche Investitionen in Personal und Technologie, damit Sicherheitsrichtlinien in den alltäglichen Abläufen umgesetzt werden. In Legacy-Umgebungen müssen Sicherheitsmaßnahmen oft manuell überwacht und über verschiedene, isolierte Systeme hinweg zusammengesetzt oder ergänzt werden. Die laufenden Kosten dieser Maßnahmen fallen meist auf CIOs und CTOs, die ohnehin Budgets straffen, um Kosten zu reduzieren, Resilienz zu sichern und Transformationsziele umzusetzen. Wäre Sicherheit von Anfang an in die Architektur integriert, müssten sie die langfristigen Kosten für Entscheidungen außerhalb ihres Verantwortungsbereichs nicht tragen.Wenn Innovationsgeist auf die technische Realität trifftCompliance im Tagesgeschäft ist ein bekanntes Thema – doch was passiert, wenn Banken neue Innovationen umsetzen wollen? Immer deutlicher wird die Diskrepanz zwischen dem strategischen Optimismus der Führungsebene ohne technischen Hintergrund und der nüchternen Einschätzung der technischen Teams.Neue Wettbewerber drängen auf den Markt, und viele CEOs im Bankensektor setzen auf Technologien wie KI, um wettbewerbsfähig zu bleiben. KI bietet tatsächlich großes Potenzial für Innovation, Wachstum und Marktführerschaft. Doch Legacy-Systeme bremsen die KI-Integration aus, erhöhen Risiken und erschweren die Einhaltung von Sicherheitsvorgaben. Außerdem bringt KI ein neues Arbeitsfeld mit eigenen Herausforderungen hinsichtlich Beobachtbarkeit und Kontrolle mit sich. Diese Probleme verschärfen sich noch durch fragmentierte Infrastrukturen, in denen die für KI benötigten Daten in isolierten Systemen gespeichert sind. Das Ergebnis: Früher getrennte Technologiebereiche prallen nun schneller aufeinander – und die Teams stehen unter Druck, schnell zu agieren, ohne die Sicherheit zu gefährden.Skalierbare Sicherheit ohne KompromisseWie bewältigen Banken die Aufgabe, einheitliche Sicherheitsmaßnahmen abteilungsübergreifend durchzusetzen und Innovationen mit neuer Technologie zu fördern? Zero-Trust-Architekturen bieten hier zunehmend die Lösung.Im Gegensatz zu herkömmlichen, perimeterbasierten Ansätzen geht dieses Sicherheitsmodell davon aus, dass innerhalb des Netzwerks kein implizites Vertrauen besteht. Jeder Zugriff wird streng überprüft – egal, wer sich anmeldet, welches Gerät verwendet wird oder wo der Zugriff erfolgt. Mit Zero Trust werden die Verantwortlichkeiten von CISO, CIO und CTO klar aufeinander abgestimmt, indem Richtlinien zentral durchgesetzt, Systeme transparenter gestaltet und Compliance-Management in isolierten Umgebungen vereinfacht wird.Aber Zero Trust ist mehr als nur ein Sicherheitsframework. Zero Trust schafft strategische Voraussetzungen für skalierbare Sicherheit, wie die nachstehenden Punkte verdeutlichen: Zero Trust stellt Sicherheit als Service bereit und sorgt für skalierbare Konnektivität, sodass Banken neue Technologien risikofrei und zügig einführen können. Das Modell liefert in On-Premise- und Cloud-Umgebungen einheitlichen Schutz, identische Funktionen sowie gleichwertige Kontrollmechanismen und sorgt so für die dringend benötigte Konsistenz in hybriden Umgebungen. Teams müssen also keine Kompromisse eingehen oder zwischen Anwendungsbereichen wählen. Alles funktioniert zuverlässig, unabhängig davon, wo sich die Daten oder Anwendungen befinden.Zero Trust bietet lückenlose Transparenz. Selbst wenn Technologiebereiche segmentiert bleiben, sind Transparenz und Kontrolle nicht eingeschränkt, sodass Sicherheitsteams Aktivitäten reibungslos überwachen und steuern können.Datensicherheit ist im Kern der proxybasierten Architektur von Zero Trust verankert – und wird nicht erst nachträglich hinzugefügt. So können Banken neue Technologien – sogar komplexe Integrationen wie KI-Agenten – schnell skalieren, ohne die Compliance oder operative Integrität zu gefährden.  Gleichzeitig bietet die Architektur Anbindungsmöglichkeiten sowohl für Legacy- als auch für neue Services und erweitert den Schutz nicht nur innerhalb der Bank, sondern auch über das gesamte Ökosystem hinweg – einschließlich Partnern und öffentlich zugänglichen Plattformen.Eine gemeinsame Sprache für die SicherheitIn dezentral organisierten Umgebungen hängt die Sicherheitsverantwortung weniger von der Hierarchie ab als von der Abstimmung der Teams. Zero Trust ermöglicht Banken eine einheitliche Sicherheitskommunikation, bei der Compliance in jede Aktivität integriert ist – unabhängig davon, wer gerade die Verantwortung trägt.BEREIT FÜR SKALIERBARE SICHERHEIT? Finanzinstitute benötigen einen modernen Sicherheitsansatz, um aktuelle Herausforderungen zu meistern und für die Zukunft gerüstet zu sein. Zero Trust im Kern der Architektur hilft, Sicherheit zu gewährleisten, Prozesse zu vereinfachen und Compliance sicherzustellen. Hier finden Sie Ihren zukunftssicheren Weg.]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Cost of Trust: Preventing Breaches with Damages in the Millions]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</guid>
            <pubDate>Thu, 16 Oct 2025 07:51:29 GMT</pubDate>
            <description><![CDATA[In Financial Services, trust is foundational. In cybersecurity, implicit trust can be a costly liability, running up millions of dollars in losses.&nbsp;To help ground this statement, I want you to consider a specific amount: $6.08 million to be exact. This is the real-world price tag that Financial Services enterprises are paying for putting their trust in the wrong people, processes, and technologies—it’s the average cost of a data breach in the sector, according to the latest data from&nbsp;IBM.&nbsp;The astronomical stakes make the case for a zero trust approach and highlight that traditional security models, despite their enduring presence&nbsp;in the market, are no longer enough.The Financial Impact of BreachesFinancial Service organizations have always been on cybercriminals’ radar. Over the past two decades, nearly one-fifth of all global cyber incidents have targeted—you guessed it—a financial firm according to the latest&nbsp;IMF report.It’s a significant number and includes many high-profile breaches. For example, in 2019, a CNN headline read:&nbsp;A hacker gained access to 100 million Capital One credit card applications and accounts. This was one&nbsp;of the biggest breaches in recent history, with considerable financial fallout for the American credit provider. There were regulatory fines to the tune of&nbsp;$80 million, because the OCC regulator found that Capital One failed to put risk management practices in place before migrating to the cloud. There was also a hefty&nbsp;$190 million Class Action Settlement&nbsp;to resolve lawsuits from affected customers.When we think about financial consequences of cyber incidents, the first point that comes to mind is the very tangible cost needed to recover and secure operations. Then come potential costs in regulatory fines. But one impact that’s most damaging and enduring is to a brand’s reputation. Customers are increasingly wary of entrusting their data to organizations that have faced a breach. Their concern is valid: the latest ThreatLabz research revealed that data exfiltration surged 92.7% from last year. It shows that data theft is fuelling extortion campaigns, so it makes sense that 47% of businesses (across sectors) say they struggle to attract new customers after publicized cyberattacks according to&nbsp;Hiscox Cyber Readiness Report.Gaining trust is a competitive advantage, but one that’s easily lost. Especially in a digital system ‘protected’ by legacy security.&nbsp;Where Traditional Models FailLegacy security tools&nbsp;fall short of today’s demands in many ways. They focus on protecting the perimeter yet do&nbsp;not offer enough visibility and, as such, deprioritize resilience.Legacy tools like VPNs, firewalls, and static access controls were designed for a time when users and data stayed inside the network perimeter. Today’s cloud-first hybrid environments render these tools insufficient. Once attackers breach the (blurred boundary of an imagined) perimeter, they often face little resistance. And lateral movement could mean unfettered access to masses of sensitive data.What about visibility? There are several reasons why security architects managing traditional set-ups aren’t getting the necessary visibility they need to enforce least privilege or respond quickly to anomalies. One is a flat network architecture where tools like firewalls struggle to&nbsp;differentiate between normal and suspicious traffic&nbsp;because everything looks the same. Without traffic segmentation, it's hard to apply context-aware monitoring that delivers the necessary visibility. Another is broad network access, where the activity of connected users isn’t monitored, meaning suspicious behavior can go unnoticed. Bottom line? Security should provide always-on, real-time visibility of user and device activity.Finally, we touch on the&nbsp;topic of resilience; it’s become something of a mantra at Zscaler, and for good reason. When we look at technology and processes, resilience isn’t only about securing but about responding: how quickly can you contain a breach and bring business back online? We’re in a ‘when not if’ cyberattack era where no business is immune, which is why running threat detection alone is shortsighted. Unfortunately, the reality is, traditional security models struggle to contain an attack, which is disastrous for business continuity.&nbsp;Zero Trust as a Cost-Saving StrategyConsidering the financial ramifications of a security breach, I feel that zero trust can be framed as a cost-saving investment. We should move away from the notion of zero trust being ‘just’ a security upgrade—embracing this modern approach has more to do with implementing a solid business resilience strategy.The return on investment plays out in a few ways. For one, it stops attackers moving from one compromised system to others. Zero trust is also about implementing privilege escalation. In the case of a breach,&nbsp;unauthorized access to higher-level systems is blocked because every access request is verified. Another feature of zero trust architecture is that it enables micro-segmentation to, similarly, reduce the attack surface, but also enact real-time access-policy enforcement without disrupting other workflows.When a zero trust architecture is powered by AI, the ROI is about saving time for often overburdened security architects. They will be able to detect anomalies as they occur and can reduce manual triage because containment measures can be automated. The result is faster incident response and recovery times, which helps lower remediation costs. The cost benefit is especially important in regulated environments like Financial Services, where fines for non-compliance around data protection can be hefty.Cybersecurity is no longer just a technical issue. As this blog shows, the cost of getting it wrong isn’t limited to a dollar figure. It’s tied to your brand’s reputation and affects your ability to give customers what they’re paying for. For decision-makers serious about protecting their brand value and business continuity, zero trust is a logical next step in what has, to date, been a legacy journey. Time to leave that legacy behind.&nbsp;Ready to implement zero trust? If you’re just starting your journey, consider Zscaler’s checklist of features ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our&nbsp;Financial Services&nbsp;eBook and our&nbsp;Financial Services Page.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilienz neu gedacht: Das nächste Kapitel beginnt]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/resilience-reimagined-the-next-chapter-begins</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/resilience-reimagined-the-next-chapter-begins</guid>
            <pubDate>Tue, 14 Oct 2025 15:49:08 GMT</pubDate>
            <description><![CDATA[Im vergangenen Jahr verfolgte Zscaler in EMEA ein zentrales Ziel: Unternehmen dabei zu unterstützen, Resilienz auf- und auszubauen. Damit meinen wir die besondere Fähigkeit eines Unternehmens – und auch jedes einzelnen Mitarbeitenden und seines Teams –, Rückschläge auszuhalten, Abläufe flexibel anzupassen und selbstbewusst weiterzumachen. Kurz: die Fähigkeit, auch bei Gegenwind voranzukommen und an jeder Herausforderung zu wachsen.Ob in unserem wegweisenden Report zum Resilienz in Ihr IT-Ökosystem oder im beliebten Quiz zur persönlichen Resilienz: Unsere bisherigen Einblicke richteten sich vor allem nach innen. In Zeiten dauerhafter Umbrüche haben wir analysiert, wie Unternehmen ihre Strategien und Abläufe robust aufstellen, welche proaktiven Technologien dabei entscheidend sind und wie sie die mentale Stärke ihrer Mitarbeitenden gezielt ausbauen.Je näher das Jahresende rückt, desto wichtiger wird echte Cyberresilienz. Kaum ein Tag vergeht ohne Meldung über den nächsten Sicherheitsvorfall. Betroffen sind Unternehmen jeder Branche und Größe. Und die Folgen solcher Angriffe wirken heute deutlich länger nach als erwartet. Kein Wunder also, dass Resilienz auf dem jüngsten Gartner Security &amp; Risk Management Summit ein zentrales Thema war und weiterhin im Fokus von Unternehmen, Branchenanalysten, Regierungen und internationalen NGOs wie dem Weltwirtschaftsforum steht.CISOs und ihre Teams stehen nach wie vor an vorderster Front – in einer Welt, in der Cyberangriffe so sicher sind wie das Amen in der Kirche. Der nächste Vorfall? Unvermeidbar. Und er kann aus jeder Richtung einschlagen. In den heutigen, stark vernetzten Umgebungen stößt eine rein interne Resilienzstrategie schnell an ihre Grenzen.Unternehmen müssen sich nun mit folgenden Herausforderungen auseinandersetzen:Turbulente Marktkräfte: Neue Regeln, Forderungen nach mehr digitaler Souveränität und ökonomische Turbulenzen verlangen rasche Anpassungen im Betrieb, doch veraltete Architekturen bleiben dabei hoffnungslos zurück.Neue Technologien: Künstliche Intelligenz verändert die Bedrohungslage bereits drastisch, und Quantencomputing steht vor der Tür. Beide Faktoren offenbaren Sicherheitslücken, die Unternehmen gefährlich treffen könnten.Komplexe Betriebsstrukturen: Dezentrale Arbeitsmodelle, externe Mitarbeitende und instabile Lieferketten eröffnen Angreifern neue Ansatzpunkte.Deshalb richten wir unseren Fokus nun nach außen. Wir beleuchten, wie Unternehmen ihre Resilienzstrategien anpassen, um auf externe Faktoren zu reagieren – sei es, um Marktturbulenzen abzufedern, sich gegen Risiken durch neue Bedrohungen und Technologien zu wappnen oder die wachsende Komplexität von Userbasis und Lieferketten in den Griff zu bekommen.Unser Standpunkt ist klar: Unternehmen müssen von Grund auf resilient werden. Das bedeutet, reaktive Ansätze zu überdenken und Resilienz als proaktives, zentrales Prinzip zu verankern – eines, das Unternehmen befähigt, sowohl interne als auch externe Bedrohungen zu antizipieren, ihnen standzuhalten und sich schnell zu erholen.Im nächsten Kapitel geht es darum, neue Blickwinkel einzubeziehen. Dabei geht es um die Erkenntnis, dass Resilienz weit über die Sicherheit hinausgeht – sie ist ein zentraler strategischer Faktor. Ziel ist es, Führungskräfte mit den nötigen Informationen und Tools zu unterstützen, damit sie Resilienz ganzheitlich in die Stuktur ihres Unternehmens einbetten können.Dranbleiben lohnt sich also. Wir präsentieren neue Perspektiven, aktuelle Forschungsergebnisse und handfeste Tipps, damit Sie Ihre Cyberresilienzstrategie über die Grenzen Ihrer bisherigen Strukturen hinaus ausbauen können. Und falls Sie einige unserer früheren Beiträge verpasst haben, können Sie jetzt eine Kopie besorgen.Die Zukunft ist unvorhersehbar. Doch mit dem passenden Mindset und einem durchdachten Konzept wird Resilienz zu Ihrem stärksten Wettbewerbsvorteil.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Die Souveränitätsdebatte gibt Kunden die Kontrolle über ihre Daten (zurück)]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-sovereignty-debate-gives-customers-control-over-their-data</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-sovereignty-debate-gives-customers-control-over-their-data</guid>
            <pubDate>Thu, 02 Oct 2025 12:54:21 GMT</pubDate>
            <description><![CDATA[Unternehmen haben schon immer Netzwerke gebaut, um Daten auszutauschen. Allerdings möchte die IT-Abteilung heute mehr denn je in der Lage sein zu verifizieren, ob der Datenaustausch gewünscht ist. Im Zeitalter des Zero Trust-Ansatzes kommt dazu ein Trusted Broker ins Spiel, der zwischen die im Austausch befindlichen Entitäten geschaltet wird und sicherstellen kann, dass nur autorisierte und überprüfte Kommunikation zustande kommt. Durch diese sehr vereinfachten Grundlagen von Zero Trust entsteht das Vertrauen des abgesicherten Datenaustausches.Aufbauend auf dem Least Privileged Access stellen Unternehmen sicher, das sich nur gewünschte Parteien im Austausch befinden. Der Grundtenor bei Zero Trust lautet dementsprechend, dass Unternehmen die Kontrolle über ihre Datenströme (zurück) erhalten können und dazu heute auch mehr denn je der Bedarf besteht. Die Souveränitätsdebatte hat die Notwendigkeit für einen solchen Zero Trust-Ansatz neu entfacht. Unternehmen müssen dafür Sorge tragen, dass sie nur das miteinander kommunizieren lassen, was auch kommuniziert werden soll. Angefacht durch eine Vielzahl an Cybervorfällen und Fremdzugriffen etwa über Lieferketten müssen sich Unternehmen eingestehen, dass sie den Überblick darüber, wer mit wem oder was kommunizieren darf, im Zuge der Digitalisierung vielleicht eingebüßt haben. Umso dringlicher wird heute der Ruf laut, verifizieren zu können, welche digitalen Entitäten - seien es User, Apps, Workloads, IoT/OT-Geräte, Zweigstellen, Fabriken oder Drittparteien – miteinander im Austausch stehen dürfen.Resilienz und Souveränität gehen Hand in HandDie Themen Resilienz und Souveränität werden oft in einem Atemzug genannt. Auch wenn beide Bereiche ganz oben auf der Agenda der Unternehmensverantwortlichen stehen, muss dennoch klar sein, dass diese Begriffe nicht gleichgesetzt werden dürfen. Grundlage für eine starke IT-Resilienz ist der umfängliche Einblick in alle autorisierten Datenströme, um unerwünschte Kommunikation vom Eindringen in oder Abfließen aus Unternehmensumgebungen abzuhalten. Es gilt Schaden abzuwenden, der durch lahmgelegte Systeme oder entwendete Daten entstehen könnte. Auch Souveränität dient dazu, die Hoheit der Daten unter Kontrolle zu halten. Unternehmen möchten jederzeit wissen, wo ihre Daten vorgehalten werden oder wer oder was darauf Zugriff hat. Beide Male steht die Datensouveränität im Mittelpunkt der Aufmerksamkeit.Doch genau an diesem Punkt müssen sich Unternehmen selbst hinterfragen. Haben sie bereits jetzt alles Nötige für eine allumfängliche Transparenz und Nachvollziehbarkeit ihrer Datenströme veranlasst? Diese Frage tut sich nicht zuletzt im Zeitalter der künstlichen Intelligenz auf, die ganz neue Möglichkeiten schafft, dass Daten über KI-Tools oder -Agents abfließen können. In einem ersten Schritt müssen sich Unternehmen demnach die Frage stellen, ob sie granularen Einblick haben, wo geschäftskritische und sensible Daten vorgehalten werden. In einem nächsten Schritt gilt es zu hinterfragen, wer darauf Zugriff hat, unter Einbeziehung aller möglichen Integrationen mit der Lieferkette oder von Drittparteien. Und schließlich müssen sie auch für KI-Governance sorgen und festhalten, auf welche Daten neue Tools und Anwendungen zugreifen können.Erst nach diesen internen Hausaufgaben kann der Blick auf das große Ganze erfolgen und das übergeordnete Souveräntitätsverständis definiert werden, bei dem es analog um die Fragestellung geht, wer von außerhalb Zugriff auf welche Datenbestände erhält und wie ein souveränes Angebot aus europäischer Hand aussehen kann, ohne auf die Vorteile der Cloud zu verzichten.&nbsp;Die übergeordnete strategische Bedeutung digitaler SouveränitätFür Schwarz Digits ist digitale Souveränität von zentraler Bedeutung. In der strategischen Ausrichtung und operativen Umsetzung bedeutet dies, diese Fähigkeit zu entwickeln beziehungsweise auszubauen; und zwar dort, wo es strategisch sinnvoll und betriebswirtschaftlich darstellbar ist, eine weitgehende technologische Unabhängigkeit und größere Kontrolle über digitale Systeme und Daten zu erlangen und zu wahren.&nbsp;Auf einer übergeordneten Betrachtungsebene stellt digitale Souveränität somit sicher, dass alle digitalen Komponenten und Dienste, die für die wirtschaftliche oder staatliche Autonomie von wesentlicher Bedeutung sind, weitgehend selbstbestimmt und im rechtlichen und operativen Rahmen des eigenen Handelns genutzt werden. Wir erkennen an, dass eine vollständige Autonomie für die meisten Staaten weder technologisch noch wirtschaftlich realisierbar ist. Ein solches Lagebild hilft jedoch bereits, sich kritischer Abhängigkeiten bewusst zu werden und entsprechende strategische und operative Vorbereitungen zu treffen.Die zentrale Herausforderung Europas und die Dringlichkeit einer umfassenden StrategieVor diesem Hintergrund stellt die Gewährleistung einer größtmöglichen Unabhängigkeit der digitalen Souveränität eine zentrale Herausforderung für Europa dar. Um die digitale Transformation erfolgreich und im Einklang mit unseren europäischen Werten zu gestalten, ist es unerlässlich, sich bewusst zu machen, wo und wie unsere Daten gesammelt und gespeichert werden und wer darüber Kontrolle ausübt. Die Tatsache, dass viele dieser Daten von nicht-europäischen Unternehmen gehostet und verwaltet werden, birgt&nbsp;erhebliche rechtliche, wirtschaftliche und sicherheitspolitische Herausforderungen. Insbesondere die Nutzung von Cloud-Diensten, die unter den rechtlichen Strukturen ihrer Herkunftsländer, wie dem US Cloud Act, agieren, gefährdet die Vorgaben der digitalen Souveränität für relevante Daten im deutschen Datenraum. Es wird daher immer dringlicher,&nbsp;eine umfassende Strategie für ein souveränes digitales Europa zu entwickeln&nbsp;– eine Strategie, die sowohl die globalen Dimensionen der Digitalisierung berücksichtigt als auch die Wahrung europäischer Werte und Standards sicherstellt. Dieser Balanceakt ist anspruchsvoll, aber essenziell für die Zukunft unserer Gesellschaft.Diese Fragestellungen werden von Zscaler auf der ITSA gemeinsam mit STACKIT am Dienstag, den 7. Oktober 2025&nbsp; um 15.15 Uhr aufgegriffen. Im Forum in Halle 6 wird unter dem Titel&nbsp;“Resilience &amp; Sovereignty in an Era of Cloud: Crafting a Vision for What’s Next” diskutiert, worauf es bei einem solchen Angebot ankommt. Zscaler verdeutlicht, wie Unternehmen durch Zero Trust digitale Resilienz und Souveränität stärken können – mit Fokus auf Datenhoheit, Governance und Compliance. Im Mittelpunkt der Präsentation stehen praxisnahe Strategien für eine sichere, zukunftsfähige IT-Architektur.Für die Fortführung der Diskussion freut sich Zscaler über Ihren Besuch in Halle 6 am Stand 422.]]></description>
            <dc:creator>Kevin Schwarz (Principal, Transformation Strategy)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Vom Klick zur Krise: Der Blick hinter die Kulissen realer Angriffsszenarien]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/from-click-to-crisis-a-look-behind-the-scenes-of-real-attack-scenarios</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/from-click-to-crisis-a-look-behind-the-scenes-of-real-attack-scenarios</guid>
            <pubDate>Tue, 30 Sep 2025 07:29:27 GMT</pubDate>
            <description><![CDATA[Ob Ransomware, Social Engineering oder kompromittierte Drittanbieter-Accounts: Moderne Cyberangriffe zielen häufig auf den vermeintlich schwächsten Punkt ab – den User Account. Oft beginnt alles mit einem harmlosen Klick und endet in einem Systemausfall, Datendiebstahl oder Erpressungsszenario. Wird über IT-Sicherheit gesprochen, liegt der Fokus allerdings zu oft auf Servern, Webanwendungen oder anderen sichtbaren Angriffspunkten im Netzwerk. Dabei wird ein entscheidender Faktor vernachlässigt: Der User und dessen Arbeitsrechner teilen in der Netzwerkumgebung die gleichen Rechte wie direkt erreichbare Assets. Diese Vernachlässigung öffnet Türen für Angriffe, die sich gezielt auf Mitarbeitergeräte konzentrieren und damit die Grundlage für gravierende Zwischenfälle bilden.Der User: Ein nach wie vor unterschätztes Ziel für AngriffeAktuelle Daten von ENISA und Mitre zeigen, dass bis zu 75 % aller erfolgreichen Cyberangriffe ihren Ursprung auf den Geräten der User nehmen. Oft beginnt alles mit einem Social Engineering-Angriff, etwa über raffinierte E-Mails, USB-Droppings oder gefälschte Support-Anfragen innerhalb der Supply-Chain. Ein Klick genügt, um Malware-Akteuren Zugang zum System zu verschaffen. Das eigentliche Ziel solcher Angriffe liegt jedoch nicht bei den Mitarbeitenden selbst, sondern bei kritischen Daten im Netz und dazu sind Berechtigungen auf weitere Systemressourcen erforderlich. Nach der Erstinfektion eines User Accounts bewegen sich Angreifer deshalb lateral durch das Netzwerk auf der Suche nach wertvollen Informationen. Die Strategie ist klar: Ein einziger Account dient als Ausgangspunkt, um nach und nach Zugriff auf geschäftskritische Informationen und Systeme zu erhalten.Für eine solche Kompromittierung der IT-Umgebung gewinnen KI-gestützte Social Engineering-Angriffe an Bedeutung. Dank modernster Technologien lassen sich Stimmen heute täuschend echt simulieren und werden für Vishing (Voice-Phishing) eingesetzt. Hinter einer Voicemail oder WhatsApp-Nachricht mit dringendem Anliegen, vermeintlich von einer Führungsperson im Unternehmen, steckt ein hochentwickelter KI-basierter Angriff, der mit wenigen Minuten frei verfügbarer Aufzeichnung einer Originalstimme erstellt wurde. Solche Szenarien zeigen deutlich, wie verwundbar bestehende Schutzmechanismen sind – insbesondere, wenn Menschen als Angriffsvektor genutzt werden.Zero Trust: Trennung und Überprüfung von DatenverkehrDiese aktuellen Angriffsszenarien erfordern ein Umdenken in der Planung von Sicherheitslösungen. Dabei ist einerseits die Minimierung der potentiellen Angriffsfläche entscheidend, und andererseits die Limitierung von Zugriffsberechtigungen auch im Rahmen von Drittanbieter-Zugriff und ein Zero Trust-Ansatz bietet sich als Lösung an. Zero Trust basiert auf einem Prinzip der kontinuierlichen Überprüfung aller Zugangsberechtigungen auf Basis von Richtlinien. Jeder Datenstrom, jede Interaktion – sei es zwischen Usern, Geräten oder Diensten – wird vorab validiert. Änderungen im Verhalten, der Geoposition oder der sicherheitsrelevanten Bedingungen können zu reiner sofortigen Re-Evaluierung führen. Ein entscheidender Vorteil ergibt sich hier aus granularen Zugangsberechtigungen zu den jeweils benötigten Daten oder Anwendungen anstelle eines vollständigen, direkten Netzwerkzugangs. Der Least Privileged Access verhindert die&nbsp;Ost-West-Kommunikation im Netzwerk.&nbsp;Selbst wenn ein Angreifer durch geschicktes Social Engineering mit Hilfe von KI Zugriff auf ein User System erhält, hilft die granulare Segmentierung von Zero Trust bei der Eindämmung des Angriffs. Da der User durch ein solches Sicherheitsmodell nicht mehr im Netzwerk exponiert ist und keinen ungehinderten Zugang auf alle Ressourcen besitzt, kommt der Angreifer nicht weiter. Es bleibt ihm der Zugriff auf kritische Informationen in anderen Teilen des Netzwerks verwehrt. Darüber hinaus helfen KI-gesteuerte Abwehrmethoden dabei, den Angreifer auf dem kompromittierten System zu erkennen - etwa wenn Zugriffsversuche auf unerlaubte Ressourcen gestartet werden.Im Zusammenspiel einer&nbsp; Zero Trust-Architektur mit Browser Isolation erzielen Organisationen zusätzlich eine bessere Sicherheitslage, die eine Erstinfektion unterbinden kann. Denn auch&nbsp;der Schutz vor einer Infizierung durch externe Quellen ist Bestandteil der Zero Trust-Prinzipien. So können zum Beispiel über&nbsp;Browser Isolation potenzielle Gefahren durch Webseiten von Endgeräten ferngehalten werden. Webinhalte können so isoliert auf der Zero Trust-Plattform ausgeführt werden, der User oder die Drittpartei wird vor einer&nbsp;Malware-Infektion geschützt.&nbsp;Darüber hinaus können zusätzliche Schutzmaßnahmen wie granulare Sicherheitspolicies, Watermarking oder Sicherheitschecks zum Einsatz kommen. Beispielsweise lässt sich erkennen, ob ein Mitarbeitender unterwegs, etwa bei Starbucks, aus dem Hotel oder Zug, auf sensible Daten zugreifen möchte. Statt den Zugriff pauschal zu blockieren, könnten flexible Mechanismen greifen: Daten werden mit klaren Watermarks versehen, um Missbrauch zu identifizieren. Diese Granularität ermöglicht es, Sicherheit zu implementieren, ohne den User in seiner Arbeit erheblich einzuschränken.Vom Klick zur KriseIm Rahmen der Präsentation “Vom Klick zur Krise: Wahre Geschichten moderner Angriffe auf Mitarbeitergeräte”&nbsp;auf der ITSA 2025 demonstriert Zscaler&nbsp;am Donnerstag, den 9. Oktober 2025 um 10:45 Uhr in Forum A, Halle 6, wie praxiserprobte Sicherheitstechnologien der Zero Trust Exchange-Plattform im Zusammenspiel mit Browser Isolation und KI-Unterstützung die Angriffsfläche minimieren und die Unternehmenssicherheit nachhaltig stärken.&nbsp;Im Fokus stehen dabei typische Schwachstellen in der Kommunikation zwischen Geräten, Diensten und Menschen und wie&nbsp;architektonische als auch organisatorische Entscheidungen&nbsp;dazu beitragen, die Angriffsfläche einer Organisation deutlich zu verringern.Bei weiterem Informationsbedarf können Interessenten ihre persönliche Whiteboard-Session auf der ITSA unter diesem Link buchen.&nbsp;&nbsp;]]></description>
            <dc:creator>Gerd Giese (Architect, Solutions Consulting)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Das Zusammenspiel von Zero Trust und SecOps gewinnt an Bedeutung]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/at-itsa-2025-zscaler-will-demonstrate-how-ai-powered-secops-and-a-zero-trust-architecture-optimize-corporate-security</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/at-itsa-2025-zscaler-will-demonstrate-how-ai-powered-secops-and-a-zero-trust-architecture-optimize-corporate-security</guid>
            <pubDate>Fri, 26 Sep 2025 12:34:54 GMT</pubDate>
            <description><![CDATA[Auf der ITSA 2025 zeigt Zscaler, wie KI-gestützte SecOps und eine Zero Trust-Architektur die Unternehmenssicherheit optimieren.Ob Malware, Ransomware, Phishing und neuerdings sogar KI-gestützte Angriffe auf Unternehmensressourcen: Die Bedrohungen auf moderne IT-Infrastrukturen entwickeln sich rasant weiter und stellen Unternehmen vor komplexe Herausforderungen. Sicherheitsteams müssen Angriffe nicht nur in Echtzeit erkennen und darauf reagieren, sondern auch kontinuierlich ihre SecOps-Lösungen daraufhin anpassen. Dabei werden präventive, automatisierte und Plattform-basierte Architekturansätze immer wichtiger. Genau hier setzt die Kombination aus KI-gestützter SecOps und einer Zero Trust-Architektur an.In einer solch dynamischen Bedrohungslandschaft reicht es nicht mehr aus, reaktiv zu agieren. Sicherheitsteams müssen Angriffe nicht nur in Echtzeit erkennen und bekämpfen, sondern auch ihr SecOps-System ständig optimieren und kontinuierlich weiterentwickeln. KI-gestützte Prozesse bei Threat Management, Detection und Response entlasten Sicherheitsteams durch Automatisierung von Abläufen und beschleunigte Analysen. Eine Symbiose aus einem Zero Trust-Modell, Data Lakes für den Kontext und einer SecOps-Plattform bilden die Grundlage, um modernen Bedrohungen gegenüberzutreten.Synergie von Zero Trust und KI in einer neuen SecOps-ÄraZero Trust gilt mittlerweile als unverzichtbarer Grundpfeiler moderner Sicherheitsstrategien. Das Prinzip verfolgt einen Denkansatz, bei dem keinerlei Interaktion der User ohne Überprüfung vertraut wird. Jedes System, jede Person und jedes Gerät – egal, ob innerhalb oder außerhalb des Netzwerks – wird grundsätzlich als potenziell unsicher betrachtet, bevor eine Verifizierung erfolgt ist. Doch die Implementierung dieses Modells ist im global vernetzten IT-Ökosystem ohne die Unterstützung von künstlicher Intelligenz kaum denkbar. KI tritt an, die zugrunde liegenden Prozesse zu automatisieren, SecOps auf eine neue Ebene zu heben und gleichzeitig Entscheidungen schneller und fundierter zu treffen.Sicherheitsteams benötigten künstliche Intelligenz zur Bewältigung des Alltags: Die schiere Menge an Datenströmen, Log-Daten, Alerts und Bedrohungsanalysen verlangt nach einer Automatisierung, die nicht nur effizient, sondern auch lernfähig ist. Künstliche Intelligenz und Machine Learning übernehmen diese Aufgabe und entlasten menschliche Operatoren durch automatisierte Analysen der Datenmengen, gezieltere Anomalieerkennung und dem Aufzeigen von Schwachstellen – oft in einem Bruchteil der Zeit, die ein menschlicher Operator benötigen würde.&nbsp;Eine starke Symbiose von MDR und Zero TrustMit der Integration von Red Canary in die Cloud-Sicherheitsplattform von Zscaler zeichnet sich eine klare Vision für die Zukunft von Managed Detection &amp; Response (MDR) ab. KI-gestützte Workflows verbinden die Schnelligkeit und Präzision maschineller Analyse mit menschlichem Fachwissen. Durch die riesigen Mengen hochwertiger Daten aus der Sicherheits-Cloud mit dem weltweiten Einblick des ThreatLabz Security Research-Teams wird ein hochintegriertes, agentenbasiertes Security Operations Center (SOC) ermöglicht, das KI-gesteuerte Workflows mit menschlicher Expertise verbindet.Durch die Kombination der Zscaler Zero Trust Exchange mit Red Canarys MDR-Lösung wird der gesamte Datenfluss konsolidiert, zentralisiert und für SecOps zugänglich macht. Hier laufen Sicherheitsdaten von Third Party-Systemen wie Firewalls, Identitäts- und Endpoint-Lösungen zusammen, die dann durch KI aggregiert und analysiert werden. Diese Plattform fungiert als umfassende „Data Fabric“, die nicht nur alles miteinander verbindet, sondern auch die Grundlage für smarte Sicherheitsentscheidungen bietet. Basierend auf den gewonnenen Erkenntnissen können die Zero Trust Policies dynamisch angepasst werden. Gleichzeitig wird durch automatisierte Bereinigungsprozesse die Reaktionszeit auf Vorfälle drastisch reduziert.Hand in HandZero Trust und KI-basierte SecOps stellen ein kraftvolles Duo dar, das Unternehmen durch die heutige Bedrohungslandschaft navigieren kann. Die Synergie der beiden Ansätze ermöglicht ein dynamisches, adaptives und sicheres Security Operations-Modell, das sowohl gegen klassische als auch gegen moderne Cyberbedrohungen gewappnet ist. Unternehmen, die dieses Zusammenspiel adaptieren, legen den Grundstein für eine zukunftssichere IT-Umgebung und verschaffen sich einen entscheidenden Wettbewerbsvorteil.&nbsp;Auf der ITSA 2025 wird am&nbsp;Donnerstag, den 9. Oktober 2025 um 10:45 in Forum A, Halle 6 demonstriert, wie die Symbiose von Zero Trust und SecOps-Plattformen funktioniert, fragmentierte Ansätze ablöst und Prävention und Reaktion gleichzeitig abdeckt.&nbsp;Sie wollen uns lieber persönlich treffen? Unter diesem Link können Sie Ihre persönliche Whiteboard-Session auf der ITSA buchen.]]></description>
            <dc:creator>Manuel Beicht (Transformation Architect)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity (part 2): The Illusion of the Trusted Perimeter]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</guid>
            <pubDate>Thu, 11 Sep 2025 06:59:30 GMT</pubDate>
            <description><![CDATA[Traditional security models were built around the idea of a trusted perimeter: everything inside it was assumed to be trustworthy, and the goal was to keep bad actors out. But that model no longer holds.Now, users connect from anywhere, using a mix of corporate and personal devices, accessing data across multiple platforms. The perimeter has dissolved. And, with it, the illusion of internal safety.It’s something network architects are becoming acutely aware of. They need to make sure that the burgeoning number of users and devices can all connect to the network. This includes connecting unmanaged IoT devices, which—due to their effective invisibility—create a critical point of vulnerability when the network is ‘protected’ by a legacy tool like a VPN.And this critical vulnerability is only growing, as we see leaps and bounds made in interconnected vehicles, smart buildings and the like. In fact, the global number of IoT devices is forecast2 to more than double from 19.8 billion this year to over 40.6 billion in the next decade.The more pervasive IoT becomes, the greater the vulnerabilities in legacy networks will be. IoT introduces proprietary software that often lacks integration with legacy network and security tooling—creating vulnerabilities in your defenses. What’s more, IoT devices are increasing faster than employee counts, rapidly expanding the attack surface. With AI now being embedded into these devices, combined with the emergence of Agentic AI intent, the traditional castle-and-moat architecture is entirely inadequate.These outdated architectures fail to correctly tailor permissions—a critical flaw in a landscape where lateral movement remains one of the biggest threats. They simply aren’t sophisticated enough to correctly tailor permissions. They give broad network access to users and devices with verified credentials. If those credentials are compromised, a hacker using them can bypass your ‘trusted perimeter’ and access any sensitive data hosted internally without going through any further checks.Bottom line? Never trust, always verify, because there is no safe boundary around your network anymore.The Urgent Need for a Psychological ReframeIt seems like a cynical principle: never trust, always verify. However, this foundational philosophy of the zero trust movement isn’t about being paranoid—it’s about being prepared. It’s a recognition that trust, while essential in human relationships, must be earned and continuously verified in digital systems.Understanding this, we can safely say that zero trust isn’t just a technical framework. It’s a mindset shift. We must safeguard our digital environment from the threat of our own familiarity bias; we must turn the decision to trust into an objective action instead of a subjective one to gain assurance that security policies are consistently applied. By enforcing least-privilege access and carrying out continuous authentication, zero trust transforms security from a static barrier into a dynamic, adaptive system.This approach aligns with today’s ‘when not if’ cyberattack reality. It acknowledges that breaches are inevitable, and that internal actors (whether malicious or compromised) can be just as dangerous as external ones.Email phishing, of course, isn’t the only way a compromised internal actor can expose data. Employees using public-facing AI tools to speed up work tasks could unwittingly share private data. And, they are also less likely, considering the familiarity bias undercurrent, to spot AI-refined social engineering. Hackers are also turning to AI to automate their efforts, giving them greater scope and sophistication in less time with far less effort. This increases the likelihood that they’ll hook a victim.Clearly, AI is a pervasive threat and arguably will eventually erode trust to the point we trust nothing. But it’s not all bad. We need to reframe how we view AI: it can be a powerful ally, used to objectively enforce security policies in a way that takes trust out of the equation.From Paranoia to PrudenceFor business decision-makers, the path forward is clear. The threats are evolving. The perimeter is gone. And the psychology of trust must evolve with it.Zero trust offers a way to do just that—not by rejecting trust, but by redefining it for a world where control through continuous verification is the new foundation of security.For further information please visit: https://explore.zscaler.com/emea-financial-services/PART OF A HIGHLY REGULATED INDUSTRY? For organizations in tightly regulatedsectors, particularly those in Financial Services, the need to embrace zero trust now is critical. If you’re just starting your journey, view Zscaler’s checklist of features toconsider ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our Financial Services eBook2Statista, Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2034. June 2025. Available at: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[“AI-liens at the Workforce“ and how new trust frameworks provide risk management strategies in the wake of Agentic AI]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</guid>
            <pubDate>Tue, 09 Sep 2025 08:16:30 GMT</pubDate>
            <description><![CDATA[From Agentic AI to Geopolitics: Zscaler’s Agenda for the Gartner Risk &amp; Security Management SummitLater this month, I’ll be delivering a keynote at the Gartner Risk &amp; Security Management Summit EMEA, where Zscaler will be a Premier Plus Sponsor. Hosted in London between 22-24 September, the annual summit convenes the region’s top security minds to tackle the latest challenges in the evolving digital landscape – where a complex mix of cyber threats, AI, regulatory shifts, and sovereignty demands are all converging to put pressure on business operations.As a global leader in Zero Trust transformation, Zscaler has a wealth of insights on how organizations can adapt to a rapidly changing risk environment, while driving innovation and safeguarding operational resilience. And we’ll be delivering these insights in a variety of different forums across the three days of the Summit.&nbsp;On September 22nd, I’ll be taking to the mainstage for “AI-liens in the Workforce: A New Trust Model with the Introduction of Advanced NHI.” This session will explore how agentic AI is reshaping enterprise ecosystems – driving accelerated automation and enhancing decision-making, but also creating an urgent need for new trust frameworks and more comprehensive risk management strategies. Attendees will leave with actionable insights on how to evolve their trust models to navigate autonomous AI environments securely and adaptively.The following day in our theatre keynote, “Driving Business Leadership with AI, Cellular, and Zero Trust,” Zscaler’s innovations team will reveal how these three technologies are revolutionizing both enterprise security and operational agility. The audience will learn how cutting-edge AI-driven frameworks, secure cellular connectivity, and transformative Zero Trust architectures are enabling businesses to turn risk into strategic advantage. Armed with this knowledge, they will also discover practical strategies to protect distributed environments, future-proof their security architecture, and embrace innovation on the edge in a digital-first world.In addition to the two keynotes, Casper Klynge, our VP of Government Affairs EMEA, will host an exclusive roundtable on day one titled “Navigating the Geopolitics of Tech: Should the Private Sector Be the Custodians of the Transatlantic Relationship?” This invitation-only session will explore the evolving interplay between tech dependency and cybersecurity, set against the backdrop of Europe’s digital sovereignty debate. Focused on the private sector’s role in particular, the roundtable aims to spark meaningful dialogue on the intersections between geopolitics, technology, and private-sector leadership.The Gartner Risk &amp; Security Management Summit offers those of us in the industry an invaluable forum to engage with forward-thinking professionals and security innovators. Whether you are a CIO, CISO, governmental leader, or strategic decision-maker, I believe Zscaler has a compelling perspective to share on how to approach the most pressing challenges facing enterprises today, from managing risk in AI-driven ecosystems to navigating geopolitical complexities. We look forward to exploring groundbreaking ideas, fostering collaboration, and contributing to meaningful discussion.Join us at the Zscaler booth, attend our keynotes, and connect with our executive team at the cocktail reception on Monday, September 22nd. Reach out for your personal invitation&nbsp;here.Together, let’s shape the future of resilience, AI innovation, and security leadership.&nbsp;]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Leader in The Forrester Wave™ Secure Access Service Edge Solutions, Q3 2025: The Future is Zero Trust]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</guid>
            <pubDate>Mon, 08 Sep 2025 17:26:16 GMT</pubDate>
            <description><![CDATA[We are thrilled to announce that Zscaler has been named a Leader in The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025.We are especially proud to be positioned with the highest score in the Strategy category, which we see as a reflection of our unique zero trust approach.To us, this recognition from Forrester reinforces our long-held conviction: true SASE isn't about routing packets or bolting products together; it’s about securely connecting the right user to the right application, based on policy, without ever placing them on the corporate network. This principle is the driving force behind the world's largest security cloud: the&nbsp;Zscaler Zero Trust Exchange™. The Problem with First-Generation SASEMany early SASE offerings simply repackaged old problems. They focused on optimizing network paths by stitching together disparate SD-WAN products with a separate security stack (SSE). This "good enough" approach left enterprises still owning and operating a complex WAN, managing separate policies for network and security, and struggling with visibility gaps. It remained a fundamentally network-centric architecture, creating complexity, cost, and a larger attack surface—the very issues a true SASE platform should eliminate. A New Architectural Approach: The Zero Trust ExchangeOur answer is a completely different architectural model. The Zero Trust Exchange is a cloud-native platform that acts as an intelligent switchboard between users, devices, and applications.Instead of routing packets, it focuses on one thing: brokering secure, policy-based connections.All traffic—from user laptops, guest Wi-Fi, servers, and IoT/OT systems—is forwarded to the nearest Zscaler cloud point of presence.The Zero Trust Exchange delivers comprehensive security services inline. This includes a full SSE stack—from&nbsp;ZTNA and&nbsp;SWG to&nbsp;CASB,&nbsp;DLP, and&nbsp;Firewall-as-a-Service (FWaaS)—to inspect 100% of traffic and apply granular zero trust policies.Secure connections are brokered directly between the entity and the application, eliminating lateral threat movement and completely removing the need to expose your infrastructure to the internet. The Transformative Benefits of Zero Trust EverywhereBy leveraging the Zero Trust Exchange platform, organizations unlock immediate value:Radically Simplified IT: Liberate IT by moving away from owning and operating the WAN. The Zero Trust Exchange enables you to transform traditional offices into secure,&nbsp;cafe-like branch experiences. Provision new sites with full, cloud-delivered security in minutes, not months.Massively Reduced Costs: Stop paying for expensive, private MPLS circuits and move to cost-effective direct internet access. Move from a burdensome CapEx model to a predictable OpEx model, significantly lowering total cost of ownership.Superior Security: Reduce the attack surface to zero by making users and branches invisible to the internet. With full SSL/TLS inspection and consistent policy enforcement for every connection, you can prevent lateral threat movement and stop attacks before they start.A Phenomenal User Experience: Connect users directly and quickly to cloud apps without the latency of backhauling traffic. The result is a faster, more productive experience for every user, at every location. The Future is Zero TrustThe industry is at an inflection point. Owning and managing a network to secure your enterprise is no longer sustainable in a cloud-first world. The future is built on a true zero trust architecture.Being named a Leader in The Forrester Wave™ for SASE Solutions—and recognized with the top score in the strategy category—reinforces our conviction that zero trust simplicity is the proven path forward. We are proud to be named a leader among top solutions in the market and will continue to innovate to help our customers.To learn more, access a complimentary copy of The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025 report.Discover how the Zscaler Zero Trust Exchange can transform your network and security.&nbsp;Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity&nbsp;here .]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity: it’s not Paranoia, it’s Prudence]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</guid>
            <pubDate>Thu, 04 Sep 2025 12:58:38 GMT</pubDate>
            <description><![CDATA[An innate trust in what’s familiar is a very human response. In the workplace, it’s almost a given that colleagues, internal systems, and corporate networks are all trustworthy.But in today’s ‘everything-and-everyone-connects-from-everywhere’ world, this instinct can be dangerously misleading. The enterprise network is the most vulnerable it’s ever been—not only because cloud-first hybrid environments have vastly expanded the attack surface.There are three other reasons we’re experiencing heightened vulnerability. First, there’s the greater chance of compromise as hackers are turning to AI to launch increasingly sophisticated social engineering campaigns. Second is how easy it is for a bad actor to move laterally through the network, unmonitored, using verified credentials to log in (not hack in!). Finally, there’s the danger to data: the alarming rise of ransomware or of data exfiltration (without any alarms being triggered).This is bad news for any industry. Especially for those already ranked among the most attacked1 of all global industries. Considering the sector’s high-value data and regulatory exposure, it’s no surprise to find Financial Services among that group.Heritage status is a double-edged sword for established finance brands. They’ve amassed incredible experience that digital-first challengers can’t compete with; however, years and years of built-up, bolted-on security and performance updates to their legacy tech infrastructure have created complex, unwieldy environments. This means less agility and greater cyber-risk exposure. Complexity extends to the sector’s vast supply chain ecosystem—and the fact that every move within it is highly regulated.There are clear challenges for the Financial Services sector, particularly for the bigger established legacy banks that are up against agile digital-first challengers. Organizations in this industry, and all highly regulated sectors for that matter, really need to double down on security—and fast.This isn’t fearmongering; it’s about challenging the trust bias that, too often, becomes a risky default. It’s about championing security prudence to ensure that control and resilience are maintained.The Human Bias Toward TrustEver heard about cognitive heuristics? Rooted in cognitive science, the term describes the mental shortcuts we take when we need to make decisions quickly or with limited information. There are different types of shortcuts but the one that we really need to be aware of in the digital workplace is the familiarity heuristic. This is about seeking out the familiar in the face of uncertainty. It’s a judgement bias that many of us have defaulted to.In a corporate setting, a familiarity heuristic may see us giving trust without second thought. For example, instinctively believing internal emails are ‘safer’ than external ones, assuming our own company systems are secure by default, or believing our colleagues are less likely to pose a threat to our cybersecurity.This assumption that what’s ‘inside’ is safe is exactly what cybercriminals prey on. Network breaches could be the result of an external threat. More often, they are due to staff credentials being compromised, unintentionally, and largely over email. In 2024, our ThreatLabz team examined 1.2 billion data transactions across apps and core business channels like email. The findings, shared in our 2025 Data@Risk Report, highlight the scale of the issue: sensitive company data (including source code and financial information) was leaked in nearly 104 million email transactions.It’s telling that email phishing is still one of the most effective attack vectors, even in 2025 with all our knowledge about the perils of poor security hygiene. Again, it’s down to that human bias toward trusting the familiar: an internal email from a seemingly legitimate sender lands in the inbox of an employee who clicks on a link as directed, opening the door to a hacker. The attacker then moves laterally across the network—going undetected in a legacy security environment where trust is assumed rather than verified. The question is, can an entity’s trustworthiness ever be assumed?Part 2 of this series on the psychology of trust in Cyber Security is here. If you want to learn more about Cyber Security in the FSI space download the ebook here.1Statista, Distribution of cyberattacks across worldwide industries in 2024. May 2025. Available at:https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Salesloft Drift Supply Chain Incident: Key Details and Zscaler’s Response]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</guid>
            <pubDate>Sat, 30 Aug 2025 19:42:18 GMT</pubDate>
            <description><![CDATA[At Zscaler, protecting your data and maintaining transparency are core to our mission to secure, simplify and accelerate businesses transformation. We are committed to keeping you informed about key developments that may impact your organization.What Happened?Zscaler was made aware of a campaign targeted at Salesloft Drift (marketing software-as-a-service) and impacting a large number of Salesloft customers. This incident involved the theft of OAuth tokens connected to Salesloft Drift, a third-party application used for automating sales workflows that integrates with Salesforce to manage leads and contact information.&nbsp;The scope of the incident is confined to Salesloft’s Drift app and does not involve access to any of Zscaler's products, services or underlying systems and infrastructure.As part of this campaign, unauthorized actors gained access to Salesloft Drift credentials of its customers including Zscaler. Following a detailed review as part of our ongoing investigation, we have determined that these credentials have allowed limited access to some Zscaler Salesforce information.&nbsp;What Information May Be Affected?The information accessed was limited to commonly available business contact details for points of contact and specific CRM related content, including:NamesBusiness email addressesJob titlesPhone numbersRegional/location detailsZscaler product licensing and commercial informationPlain text support case header content from certain cases limited to the following fields: Case Number, Opened, Preferred Contact Number, Description, Priority, Case Owner, Preferred Time Zone, Case Status, Type, Customer Case Reference, Product, Last Activity, Subject, Resolution Notes, Reason for Hand Off, Current Status / Next Plan of Action, Data Collected, Issue Summary / Business Impact, and Requestor. No attachments, files, or images were included in the incident, as it solely involved structured text data from case headers.After extensive investigation, Zscaler has currently found no evidence to suggest misuse of this information. If anything changes, we will provide further communications and updates.&nbsp;What Did Zscaler Do?&nbsp;Zscaler acted swiftly to address the incident and mitigate risks. Steps taken include:Revoking Salesloft Drift’s access to Zscaler’s Salesforce dataOut of an abundance of caution, rotating other API access tokens.Launching a detailed investigation into the scope of the event, working closely with Salesloft to assess and understand impacts as they continue investigating.Implementing additional safeguards and strengthening protocols to defend against similar incidents in the future.Immediately launched a third party risk management investigation for third party vendors used by Zscaler.Zscaler Customer Support team has further strengthened customer authentication protocol when responding to customer calls to safeguard against potential phishing attacks.&nbsp;What You Can DoAlthough the incident’s scope remains limited (as stated above) and no evidence of misuse has been found, we recommend that customers maintain heightened vigilance. Please be wary of potential phishing attacks or social engineering attempts, which could leverage exposed contact details.Given that other organizations have suffered similar incidents stemming from Salesloft Drift, it’s crucial to exercise caution regarding unsolicited communications, including emails, phone calls, or requests for sensitive information. Always verify the source of communication and never disclose passwords or financial data via unofficial channels.Zscaler Support will never request authentication or authorization details through unsolicited outreach, including phone calls or SMS. All official Zscaler communications come from trusted Zscaler channels. Please exercise caution and report any suspicious phishing activity to security@zscaler.com.&nbsp;Need Assistance or Have Questions?If you have concerns or need additional support, Zscaler’s Customer Success and Support teams are available via&nbsp;help.zscaler.com or your existing Zscaler support channels.&nbsp;You can also reach out to our Security team at&nbsp;driftincident@zscaler.com.Your security is our top priority. Thank you for your continued partnership with Zscaler.Update: Blog updated on September 3rd, 2025 to include support case information impacted by the incident. Blog updated on September 7th, 2025 to include additional support case information impacted by the incident.]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Commitment to Responsible AI]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscalers-commitment-to-responsible-ai</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscalers-commitment-to-responsible-ai</guid>
            <pubDate>Thu, 21 Aug 2025 02:00:00 GMT</pubDate>
            <description><![CDATA[There was a question recently posted about how Zscaler trains AI models. We wanted to provide accurate information on how we train our AI models. Zscaler does not use customer data to train its AI models. Each customer owns their proprietary information or personal data (user names, email addresses, device IDs, etc.) in the Zscaler logs. We only use data or metadata that does not contain customer or personal data for AI model training.Organizations want to safely unlock the value of artificial intelligence and machine learning, but they also need to ensure that this does not come at the expense of privacy, security and compliance controls. This becomes particularly charged when we consider the potential of training AI using proprietary data or personal data.&nbsp;The foundation of our architectural approach is data containment. Every customer’s tenant is self-contained: their data lives within their tenancy, under their control. Sensitive information never leaves that boundary. This is not just a principle: it’s a design choice by Zscaler that governs how we build, scale, and deliver value. This is how Zscaler can ensure that customer data is never used to train an AI model beyond a given tenant.Within that contained environment, customers can harness the power of their own data. Logs, transactions, and telemetry generated by their use of our platform are used to improve outcomes for their organization alone. This means customers benefit directly from their own signals, whether it’s for risk modeling, AI copilots, or policy enforcement, without having to trade away autonomy or privacy or security.Leveraging Data ResponsiblyA common concern is whether preserving privacy limits the ability to benefit from large-scale insights. Here’s where an important distinction comes in: personal data remains private, secured, and not included as model training data while metadata that does not contain proprietary information or personal data is used to enrich each tenant’s environment.Think of it like water flowing through pipes: while the content of the water belongs entirely to each customer, the knowledge of how the water moves (its pressure, velocity, and patterns) can inform the system without ever extracting the water itself. Similarly, Zscaler’s platform can use traffic patterns and telemetry that does not contain personal data, and aggregated signals to strengthen AI models and improve the overall environment while still enforcing the guarantee that sensitive data never leaves a customer’s tenancy.Zscaler’s ability to learn from over half a trillion transactions per day leverages a network effect without sacrificing customers’ privacy (specifically and technically a logarithmic utility). Customers benefit from the sheer breadth of signals Zscaler processes because it allows us to recognize global threat trends and provide resilient, real-time defenses. At the same time, customer-specific data is never exposed outside of respective tenancy.Instead, Zscaler leverages the aggregate knowledge of signals across the platform, never tied to an individual customer’s data, to strengthen detection and modeling. Each tenant gains from this global intelligence while maintaining strict boundaries for its own data.To re-emphasize: customers’ proprietary information or personal data in the Zscaler logs is never shared outside of the customer boundary.&nbsp;A Core Security Principle Rooted in Shannon’s Information TheoryThere is deep alignment of our approach with Shannon’s Information Theory, a topic I will delve into more in a future blog. Zscaler views data along a continuum that stretches from low entropy, high-information states such as clear text, through progressively higher entropy forms like ciphertext, and ultimately to encryption and the extreme of pure randomness. At Zscaler, our architectural principle begins with data control. Sensitive classes of data never leave a tenant boundary in any form including customer data. Beyond that, we apply a disciplined progression toward maximum entropy wherever possible, ensuring that only the minimum necessary information is exposed. Techniques such as anonymization, tokenization, de-identification, and other data strategies are not applied as afterthoughts but as deliberate mechanisms to elevate entropy while still preserving just enough structure for essential operations, such as AI modeling and training at the platform level. This approach ensures that the system operates at the highest entropy state consistent with utility, minimizing information exposure while maximizing privacy, trust, and compliance. This is how Zscaler unlocks the value of artificial intelligence but still ensures privacy and compliance for all customers.]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[It’s Time to Take Resilience Personally]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/it-is-time-to-take-resilience-personally</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/it-is-time-to-take-resilience-personally</guid>
            <pubDate>Thu, 24 Jul 2025 15:23:42 GMT</pubDate>
            <description><![CDATA[In a recent&nbsp;blog post, I explored resilience as a central topic for Zscaler. At that stage we’d already released our&nbsp;Resilience Factor research, which highlighted the state of cyber resilience strategies within global businesses and put forward a more proactive ‘Resilient by Design’ approach as the next cyber security imperative. But I also previewed some further work we were undertaking on personal resilience.Why is a technology company looking at personal resilience you might ask?&nbsp;Connecting resilient teams with business continuityAt Zscaler, we believe that the best cyber resilience strategies feature three key elements:&nbsp;processes, technology,&nbsp;and&nbsp;people. However, while companies understand only too well how technology and operational processes affect continuity strategies, that last element is frequently overlooked.&nbsp;And that is a critical misstep. Resilience is an inner strength that prepares individuals and teams to navigate challenges and quickly bounce back. In today’s ‘when not if’ cyberattack reality – where our previous research showed us that 60% of IT leaders expect to experience a cybersecurity failure within the next six months –&nbsp;personal resilience has become a non-negotiable for employees at the frontline of digital defense. And there’s a proven link between this trait and business performance. In fact, studies have shown that resilient employees are almost&nbsp;twice as likely to be motivated and productive than their non-resilient peers.Put simply, business leaders who invest in cultivating the resilience of their people and teams – combined with efforts to address its causes from a technology and process perspective – will have&nbsp;a competitive advantage. At Zscaler we want to empower our customers with this advantage, helping them move forward with confidence, no matter what threat or disruption they faceFostering resilience within your teamSo how do you design your environment to foster resilience, both for yourself and your team – and what do you need your people to be resilient against? To help you get started, we’ve created two key resources:The Missing Link: Why Investing in the Resilience of Your People is Imperative for Business Continuity: Firstly, we’ve teamed up with professional coaching experts Positive Intelligence to create a&nbsp;practical roadmap for strengthening resilience as a core leadership skill. Complemented by valuable insights from our survey of 200+ IT and security professionals across EMEA, the roadmap focuses on integrating resilience into personal habits, team dynamics, and company culture.The Personal Resilience Superpower Quiz:&nbsp;To help identify the resilience “personality types” within your team, we’ve developed the&nbsp;Personal Resilience Superpower Quiz. In just 12 quick questions, you’ll uncover your superpower, potential watch-outs, and strategies to enhance collaboration. Beyond individual advice, you’ll also learn how the four resilience types can work together to create a team that’s prepared for anything.As a Cool Commander, the description of facing problems head-on and going after challenges confidently and in control definitely resonates with me. So it was interesting to read how other personas like the Practical Problem Solver can be vital to sense-check my fast-paced approach.Facing the futureFor over 18 years, Zscaler has offered cloud-based services to protect enterprise networks and their data. Based on this wealth of experience, we know firsthand the risks organizations face by not investing in their front-line employees' resilience as well as not adequately protecting their business.Our mission this year is to help enterprises unlock “The Resilience Factor”, which we define as the unique ability of a business (or an individual employee) to withstand adversity, adapt operations, and be ready to thrive in the face of any challenge. With 47% of the IT professionals telling us they feel only somewhat resilient, and 51% believing their organization doesn’t care about personal resilience, we think it is an urgent one.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unlock Ransomware Resilience and AI Defense with Zscaler at Black Hat 2025]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</guid>
            <pubDate>Mon, 21 Jul 2025 21:33:29 GMT</pubDate>
            <description><![CDATA[Black Hat 2025 is right around the corner, and this year’s agenda hits at the core of what cybersecurity professionals care about the most: stopping AI-driven ransomware by leveraging AI to stay ahead of evolving threats.Whether you are on the front lines of incident response, working to secure hybrid environments or researching the next wave of cyberthreats, Zscaler product and industry leaders will be available to provide insights and showcase new solutions and strategies designed for real-world defense.Here is what you can expect from Zscaler at Black Hat 2025:&nbsp; Experience Zero Trust Everywhere at Booth #3551Cybersecurity isn't a spectator sport - so get hands on with Zscaler at booth #3551. Our in-booth sessions and live demos are designed to help you understand how AI and automation are being used to stop ransomware in real time, reduce attack surfaces and protect sensitive data.Meet face-to-face with our product experts and technology partners to explore new capabilities in inline data protection, threat containment and exposure management. If you are tackling challenges around endpoint visibility or identity-driven policy, the Zscaler booth is the place to ask questions, test solutions and get the technical depth you are looking for.&nbsp; From Risk to Readiness: Combat the Latest Ransomware Extortion Surge with the Zero Trust Defense PlaybookThe intersection of AI and ransomware is reshaping the cybersecurity battlefield – and Deepen Desai, Zscaler CSO, and Dr. Brett Stone-Gross, Zscaler’s Distinguished Security Researcher, are diving into the heart of it. Join their session on Wednesday, August 6 at 2:35 PM to uncover the latest ransomware surge and how organizations can respond with resilient frameworks and smarter defenses. This powerhouse duo will go beyond theory, showcasing the latest research and delivering practical guidance on how to combat AI-driven ransomware.&nbsp; Your Path to AI-Powered Security Starts Here: Schedule a Meeting with Zscaler at Black Hat 2025Transform how you approach cybersecurity by scheduling an on-site meeting with the Zscaler team at Black Hat 2025. Learn how Zscaler addresses emerging threats, boosts operational efficiency, and reshapes security architecture to align with today’s fast-evolving landscape. Tailor the conversation to your unique goals for deploying modern, scalable defenses.Don’t just keep up with cybercriminals—take the lead and visit Zscaler at Black Hat 2025 to discover cutting-edge solutions designed to keep you ahead of the curve.]]></description>
            <dc:creator>Diana Shtil (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A New Chapter for Zscaler in the Heart of London]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</guid>
            <pubDate>Wed, 16 Jul 2025 10:04:45 GMT</pubDate>
            <description><![CDATA[Zscaler has proudly opened the doors to its new EMEA headquarters in London, marking an exciting milestone for the company. Our new home is located on the third floor of the iconic Royal Exchange, a historic building overlooking the Bank of England in the heart of the City district.Originally opened by Queen Victoria in 1844, the Royal Exchange has long been a cornerstone of historic trade and governance. It was the location of the first stock exchange, cementing its role as a global hub for commerce. Over the years, it has witnessed monumental moments, including the proclamation of King Edward VII in 1901 and the announcement of the new Sovereign in 2022. Now in its third iteration, rebuilt after catastrophic fires including the Great Fire of London in 1666, The Royal Exchange stands as a symbol of resilience and reinvention, qualities that closely mirror Zscaler’s mission of empowering customers to overcome challenges and thrive securely in the digital economy.The relocation underscores Zscaler’s dedication to the thriving UK market, which is among the company’s top five regions globally. London’s role as a leading tech hub makes it an ideal base, providing unmatched opportunities to engage with diverse talent, enterprise customers, policymakers, and strategic partners. Being in close proximity to many of our key partners further enhances our ability to collaborate effectively and innovate solutions. This strategic move enables Zscaler to accelerate advancements in cybersecurity, support transformative security initiatives, and strengthen collaboration with customers across EMEA.Beyond serving as Zscaler’s EMEA headquarters, this new space will also act as the primary hub for our Executive Design Center (EDC). EDCs are pivotal in hosting discussions that inspire innovation, foster collaboration, and advance strategic agendas for cyber transformation. Here in the UK, we will leverage the center to deepen relationships with customers and partners, explore new ideas to solve the most pressing cybersecurity and operational challenges, and foster the kind of thought leadership that drives impactful business results.While this move is a celebration of new beginnings, it is also about the hardworking team that drives Zscaler’s success every day. We are proud of our 300+ UK employees and are planning to&nbsp;grow our headcount over the next year, with roles focused on Sales, Marketing, Solution Engineering, Cybersecurity Analysis &amp; Research, Customer Success, and Partner Enablement. At Zscaler, we believe diversity of thought and experience is essential to building exceptional teams. This culture of growth, learning, and impact has earned us distinctions such as the UK’s Best Workplace™ for Employee Development award.The energy within the new space has been palpable as we officially welcomed our teams this week. We look forward to continuing to push boundaries in cybersecurity innovation for our customers across the region. This new office marks a brilliant step forward for Zscaler in EMEA. We’re here to stay, to grow, and shape the future of cybersecurity right from the heart of London.]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Why Our New London Office Marks a Milestone for Zscaler in EMEA]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</guid>
            <pubDate>Tue, 15 Jul 2025 11:44:23 GMT</pubDate>
            <description><![CDATA[This week’s London office opening in the amazing Royal Exchange building is big news for not just the UK, but all of EMEA. More than just another address to add to our global footprint, the office represents our long-term commitment to the region as a strategic hub for security innovation, cloud transformation, talent, and customer collaboration. This new and expanded office reflects our ethos as a world-class international company.Previously, Zscaler’s EMEA operations have been distributed across several regional hubs. Now we’re proud to announce that London is the official headquarters for Zscaler in EMEA. This centralization brings together leadership, strategy, sales, and marketing under one roof – creating a vibrant environment for ideation, collaboration, and the delivery of cybersecurity strategies that protect critical data, enable agility, and drive business outcomes at scale.The centerpiece of the new space is something truly special: our first purpose-built European Executive Design Center (EDC) for the region.Until now, our only Executive Briefing Center was located in San Jose, which meant a long flight for EMEA customers looking to make use of it! With the launch of the London EDC, we’re bringing customers that same immersive, hands-on experience – right on their doorstep. This is truly a game-changer. It will allow prospects and customers to see firsthand how Zscaler technology protects and modernizes some of the world’s largest and most complex organizations. More importantly, it will enable them to co-create strategies with our top-tier consultants to solve the most pressing cybersecurity and IT infrastructure challenges facing enterprises and the public sector across EMEA.Some of the key features the EDC offers include:Access to Zscaler’s global innovation roadmapWorkshops on threat intelligence, AI in security, and Zero Trust Everywhere strategyPeer-to-peer customer sessions and best practice sharingEvery detail of the center has been carefully considered – from a dedicated customer entrance and terrace to flexible meeting rooms to accommodate larger gatherings and a private kitchen – ensuring a tailored, high-impact experience for every visitor.For our customers, the EDC ultimately means earlier access to innovations, more localized support, and direct engagement with EMEA leadership.But it is just one milestone in a far broader regional story.EMEA has always been Zscaler’s second-largest market by geography, contributing approximately 30% of our global revenue – with the UK accounting for a significant portion of that. And our presence here continues to expand. Over the past two years, we’ve established offices and customer hubs in key markets such as Germany, France, the Netherlands, and the UAE. We’ve seen significant team growth, supporting everything from go-to-market roles to technical and partner-focused functions. And we’ve built out our partner ecosystem and joint go-to-market programs with regional system integrators and MSSPs.This growth is being driven by a surge in demand from organizations in the region that are accelerating their move to zero trust security. As concerns around threat protection, data sovereignty, operational resilience and more continue to rise, we are&nbsp;scaling our people and infrastructure to meet that demand – locally and effectively.The opening of our London HQ and EDC is a reflection of EMEA’s growing significance in Zscaler’s global operations. It’s a signal of expanded investment in the region’s cybersecurity ecosystem – and a promise to our customers that we’re thinking long-term about how we support them on the journey ahead.We look forward to welcoming our staff and customers to our new home in London.]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Transformational Zenith Live EMEA]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/a-transformational-zenith-live-emea</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/a-transformational-zenith-live-emea</guid>
            <pubDate>Thu, 10 Jul 2025 09:39:03 GMT</pubDate>
            <description><![CDATA[As the digital landscape continues to evolve at breakneck speed, Zscaler’s Zenith Live EMEA 2025 proved to be more than just a conference—it was a bold statement about the future of secure digital transformation.&nbsp;From demonstrating our latest AI-powered innovations around segmentation, data security classification, prompt visibility and more, to providing deep dives into securing private LLM deployments and on-prem data environments, the event showcased how Zero Trust Everywhere is no longer a concept—it's a necessity.&nbsp;As was evidenced in the brilliant turnout in Prague, this is something more and more organizations – of every size and industry – are coming to realize. I had the pleasure of spending four days at the show and during that time I witnessed firsthand many lightbulb moments for our attendees – where one of our speakers or even a peer introduced an idea or solution that they hadn’t thought of previously.&nbsp;The key topics of discussion were largely what I had expected them to be. As predicated in my&nbsp;previous blog, data resiliency was a huge talking point for customers, partners and media attendees alike, and especially front of mind given the current macroeconomic climate. But we also saw a great deal of interest in data sovereignty and the different approaches organizations could take to achieving this. Whether the use case is public sector or private, country-level or regional, as sovereign demand only grows more nuanced, so too will the need for security companies like Zscaler to respond.And of course, no conference in 2025 would be complete without a heavy focus on AI. With our recent acquisition of Red Canary to expand our AI-powered security operations, and a whole batch of advanced AI security capabilities announced during Zenith Live AMS, we had a lot to say. And a lot to be proud of. As organizations continue to adapt to the AI era, Zscaler is enabling our customers to adopt cutting-edge AI technologies securely and at scale. Our platform leverages the world’s largest inline security cloud—analyzing over 500 trillion security signals daily. This unmatched volume of real-world telemetry fuels Zscaler’s AI engines, enabling precise threat detection and robust automated security.&nbsp;For newer customers attending the show for the first time from markets such as the Middle East, Africa and Eastern Europe, I hope their time in Prague will have solidified something they were already starting to see – that Zscaler isn’t just a security tool, but a platform for unlocking true transformation outcomes.&nbsp;We’re now in a race to the end of our financial year – but the show has yet again proved to us that our direction is the right one. So why not join us on the journey – we’re here to help you deliver security, resilience and operational agility wherever you need it most.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The End of Network Guesswork: Cellular Control Made Simple]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</guid>
            <pubDate>Fri, 20 Jun 2025 06:14:08 GMT</pubDate>
            <description><![CDATA[Most organizations assume that once a device connects to a cellular network, it’s automatically under control. In reality, that assumption is rarely true. When a SIM card is active and connected, its traffic flows freely across networks and borders with little visibility or control. The result is an illusion of security that leaves organizations exposed to risks and policy violations, especially when they need to enforce compliance based on geography or behaviour.As I outlined in my previous&nbsp;blog, telcos provide a certain layer of control at the network-level, but granular control related to an organization’s specific security policies is often missing from their offering. As a result, most organizations still tend to rely on legacy architectures such as firewalls, VPNs, and backhaul networks to try and fill the gap. Not only do these add complexity and cost, but they often fail to deliver the proactive, zero trust control that today’s cellular environments demand. Once connected, devices are allowed to communicate too freely, violating zero trust principles that require strict verification of every interaction.Zscaler Cellular changes this dynamic entirely by giving organizations granular control of every packet leaving the device. Instead of having to wait for traffic to reach a network hub or firewall, every connection attempt is evaluated and decided upon instantly at the edge. This early decision determines whether the traffic is routed to the internet or a private application, and allows organizations to apply related policy enforcement before the data ever leaves the device. Because the control is integrated at this base level, organizations no longer need to deploy complex infrastructure or configure multiple layers of security. The SIM or eSIM simply activates, and control is live.This approach enables highly granular, context-aware policies to be implemented based on identity, location, behaviour, or risk factors. For example, a SIM can be restricted to operate only within specific countries or regions, preventing unwanted roaming, data transfers or misuse. Anomaly detection capabilities further enhance security by flagging or blocking unusual behaviour, such as attempts to access disallowed resources or connect from unexpected locations. These controls are delivered globally and consistently, ensuring seamless security anywhere in the world without added operational overhead.And I’d underline seamlessly here. What makes Zscaler Cellular truly revolutionary is its simplicity by design. There is no need to manage firewalls, tunnels, or backhaul networks. There is no complex setup or manual intervention required beyond inserting or activating the SIM. The traditional guesswork and delays associated with network security are eliminated. Instead, organizations gain immediate visibility and policy enforcement aligned with zero trust principles, transforming reactive security measures into proactive, intelligent control.This seamless integration of connectivity and zero trust security is made possible by uniting two previously separate domains; connectivity from mobile operators and zero trust frameworks from security providers. Zscaler is the first to bring these together in a unified service, delivering secure, ubiquitous communication with intelligent control.In a world where cellular devices increasingly power critical business functions, Zscaler Cellular offers a decisive step forward in protection. This is zero trust application without complexity - and it’s just the beginning. Because once control is simplified, the next frontier is zero trust everywhere.&nbsp;Learn more about the power of ubiquitous protection in my third and final blog of this series next week.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Ein Blick in die sichere Zukunft von KRITIS auf der PITS]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/a-look-into-the-secure-future-of-kritis-at-pits</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/a-look-into-the-secure-future-of-kritis-at-pits</guid>
            <pubDate>Thu, 12 Jun 2025 14:36:42 GMT</pubDate>
            <description><![CDATA[Auf der diesjährigen&nbsp;PITS in Berlin stand das Thema Cyber-Sicherheit als Schlüssel zu nationaler Resilienz im Mittelpunkt. Im Zuge der aktuellen Herausforderungen und Entwicklungen im Bereich der Cybersicherheit wurde die Bedeutung eines ganzheitlichen Cybersicherheits-Managements insbesondere für kritische Infrastrukturen (KRITIS) diskutiert. Sektoren wie der Energiebereich stehen im Visier der Aufmerksamkeit, da Cyberangriffe im schlimmsten Fall die Aufrechterhaltung des öffentlichen Lebens gefährden können. Effektive Strategien zur Risikoanalyse, Überwachung und frühzeitigen Vorfallserkennung gehören auf die Tagesordnung. Doch wie begegnet man als öffentliche Einrichtung oder Organisation diesen Anforderungen, um die Compliance-Anforderungen zu erfüllen und gleichzeitig die Resilienz der IT-Systeme zu verbessern?ISMS als Fundament&nbsp;Im Zentrum vieler Compliance-Vorgaben steht ein Informationssicherheits-Managementsystem (ISMS), das als Grundlage für die Definition und Umsetzung von Sicherheitsmaßnahmen dienen kann. Ein ISMS dokumentiert die Maßnahmen und Prozesse, mit denen Organisationen Risiken minimieren und Sicherheitsstandards durchsetzen können. Auch im Zuge von Zertifizierungen oder Regularien wie NIS2 wird geprüft, ob ein ISMS vorhanden ist und dessen spezifische Anforderungen umgesetzt werden. Hier sind eine klare Struktur und transparente Dokumentation erforderlich. Vor der Risikominimierung muss allerdings die Risikoanalyse erfolgen – und genau an diesem Punkt hakt der Prozess vielfach. Denn für eine umfassende Risikobewertung ist ein ganzheitlicher Einblick in alle Datenströme der relevanten Organisationsbereiche unerlässlich.Transparenz durch EchtzeitüberwachungEine der größten Herausforderungen bei der Risikoanalyse sehen wir im Fehlen von Transparenz. Oft sind Prozesse fragmentiert, verschiedene Datenquellen werden nicht vernetzt, und es fehlt an ganzheitlicher Einsicht. Das Problem: die linke Hand weiß häufig nicht, was die Rechte tut. Ein zentralisierter Ansatz mit einer Sicherheitsplattform bietet hier Vorteile, da Informationen gebündelt, in einen sinnvollen Kontext gesetzt und für unterschiedliche Stakeholder wie Auditoren oder Security-Analysten verfügbar gemacht werden können.&nbsp;Die Zero Trust Exchange-Plattform fungiert hierbei als „Broker“, der die Kommunikation vereinheitlicht und dadurch Risiken präventiv sichtbar machen kann. Mit Hilfe von künstlicher Intelligenz (KI) und maschinellem Lernen können Muster erkannt und Schwachstellen frühzeitig adressiert werden. Durch Einsatz der Plattform ist es möglich, physische und digitale Assets zu identifizieren und deren Interaktionen nachzuvollziehen. Von Endgeräten bis hin zu Datenübertragungen: Ein vollständiges Bild ist der Schlüssel zur Risikoanalyse und die Grundlage für fundierte Entscheidungen zu Abwehrmaßnahmen.Proaktive Vorfallserkennung und ResilienzNeben der präventiven Risikoanalyse ist die proaktive Vorfallserkennung und -bearbeitung essentiell. Durch Echtzeitüberwachung und die kontinuierliche Überprüfung von Sicherheitspolicies können potenzielle Vorfälle identifiziert werden, bevor sie eskalieren und zu Datenverlusten führen. Dies schafft einen entscheidenden Mehrwert: Anstatt auf Ereignisse lediglich zu reagieren, wird Sicherheit aktiv gestaltet und sichergestellt, dass kritische Dienste jederzeit verfügbar bleiben.Die Fähigkeit, Gefahren zu erkennen und automatisierte Gegenmaßnahmen einzuleiten, verstärkt nicht nur die operative Sicherheit, sondern auch die Resilienz einer Organisation. Dies gilt besonders für kritische Infrastrukturen wie Energie- oder Versorgungsbereiche, die für die Sicherheit und das Funktionieren der Gesellschaft unerlässlich sind.Eine ganzheitliche Strategie für CybersicherheitUm den komplexen Anforderungen des öffentlichen Sektors gerecht zu werden, ist eine zentrale, integrierte Plattformlösung entscheidend. Die Kombination aus klarer Risikoanalyse, Echtzeitüberwachung und souveräner Datenkontrolle stellt sicher, dass Behörden und Organisationen ihre IT-Sicherheit auf höchstem Niveau halten können.Mit einem ISMS als Grundlage und innovativen Tools, die Informationen nahtlos verbinden und kommunizieren, legen Unternehmen den Grundstein für Compliance, Resilienz und kontinuierliche Sicherheit. Konkret heißt das, Risiken proaktiv zu adressieren und Vorfälle schnell zu erkennen. Genau solche Ansätze durfte ich auf der PITS diskutieren. Wir waren uns einig, dass der öffentliche Sektor von Vereinheitlichung der IT-Sicherheit und damit einhergehender Transparenz profitieren kann. Heute geht es darum, das Bewusstsein für die Bedeutung eines umfassenden Cyber-Sicherheits-Managements zu stärken.Genau diese Themen stehen in einer Woche wieder auf der Agenda: Wir sehen uns auf der&nbsp;Zenith Live 25 in Prag!]]></description>
            <dc:creator>Gregor Keller (Director Solution Consulting Central &amp;amp; Eastern Europe)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Out of Sight, Out of Control: Bridging the Cellular Visibility Gap]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</guid>
            <pubDate>Thu, 12 Jun 2025 04:22:05 GMT</pubDate>
            <description><![CDATA[Do You Know What Your Organization’s Cellular Devices Are Doing Right Now?Every day, countless cellular-connected devices quietly communicate across the internet and private networks, without the knowledge or oversight of the organizations that own them. These devices - which could range from lighting sensors to critical industrial equipment - operate outside traditional security controls, creating a blind spot in many enterprises’ security strategies. Indeed while it’s commonly assumed that mobile networks provide a secure path for all cellular devices even if you have trouble seeing them, the reality is far more complex and risk-prone than most realize. And so it begs the question, do you know what your organization’s cellular devices are doing right now?Mobile carriers do offer network-level protections, but these aren’t necessarily designed with applications or the sensitive data flowing across them as the priority focus. Cellular devices frequently run multiple software components, making a variety of outbound requests that go unseen by traditional security tools. The implicit trust placed in these mobile connections leaves organizations vulnerable to threats that can easily slip through the cracks.Without full visibility into what these devices are doing, security teams cannot detect unusual activity, enforce granular policies, or respond effectively to emerging risks. The legacy approach of relying on firewalls, VPNs, and costly backhaul infrastructure simply doesn’t scale or adapt well to the sprawling, dynamic world of cellular-connected devices. This results in increased attack surfaces and operational headaches.That’s where Zscaler Cellular changes the game. By ensuring every single data packet from cellular devices go through Zscaler’s zero trust platform, organizations gain complete visibility into device behavior - even for those that were previously out of reach. This transparency means businesses can see exactly where each device connects, what it’s communicating with, and how policies are being applied to it in real-time. Most importantly, it enables a shift from blind trust in mobile networks to informed control over every connection. This is visibility by design.&nbsp;Visibility is more than a technical advantage; it’s the foundation for extending modern security to mobile and IoT environments. But the real opportunity goes further: with Zscaler Cellular, organizations can move from passive insight to active, ubiquitous protection.By bringing zero trust to devices that were previously out of reach, security teams can enforce consistent policy across every connection, everywhere - no matter the network or location. In my next blog, we’ll dive deeper into how this newfound visibility empowers organizations to enforce powerful controls - moving beyond passive monitoring to actively securing every session at the very first packet.If you want to find out more about Zscaler Cellular, join us at Zenith Live EMEA in Prague from 16th - 18th of June 2025.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust is Reshaping Cyber Insurance by Reducing Risk]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</guid>
            <pubDate>Wed, 11 Jun 2025 06:52:49 GMT</pubDate>
            <description><![CDATA[In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.A&nbsp;landmark report from&nbsp;Zscaler, leveraging Marsh McLennan’s Cyber Risk Intelligence Center, found that&nbsp;up to 31% of cyber losses could have been prevented with Zero Trust architecture properly deployed alongside solid cyber hygiene. That translates into&nbsp;$465 billion in avoided global economic damage annually–a staggering figure with major implications for both security leaders and insurers.Where Traditional Security FailsTraditional security models rely on perimeter security appliances like firewalls and virtual private networks (VPNs), but recent data paints a troubling picture: these very devices are often the&nbsp;initial access vector in ransomware attacks.&nbsp;According to Coalition insurance claims data, organizations using perimeter security products like firewalls and VPN’s are&nbsp;up to 12 times more likely to report a claim.Why? Because perimeter defenses foster a&nbsp;false sense of security, encouraging risky behavior like enabling firewalls, VPN’s, remote desktop protocol (RDP) or skipping multi-factor authentications (MFA) under the illusion of “protected borders.” In contrast,&nbsp;Zero Trust assumes breach,&nbsp;verifying every user, device, and application continuously, thereby&nbsp;limiting an attacker’s ability to access and move within a network, even after an initial compromise.Real-World Impact: The Zscaler Zero Trust Exchange and Cyber InsuranceOrganizations that deploy the&nbsp;Zscaler Zero Trust Exchange are not only reducing the risk of breaches and business interruption stemming from ransomware or other attacks, they're also seeing&nbsp;measurable improvements in cyber insurance outcomes.Take&nbsp;Risk360, Zscaler’s cyber risk quantification engine, which helps customers&nbsp;translate Zero Trust posture into dollar-value risk assessments. With telemetry from 50+ million devices and deep visibility across IT estates, Zscaler equips underwriters with the data needed to streamline cyber insurance applications and renewals.That’s already happening. Through relationships like Zscaler and Resilience Insurance, organizations can now feed Zero Trust telemetry into insurance renewals. The result?Simplified Zero Trust inclusion, during policy submissionsBetter assessment of overall riskUnderstanding of Zero Trust controls that address exposure&nbsp;Beyond the Boardroom: Proving ROI on Security InvestmentsCyber insurance isn’t just a financial backstop; it’s becoming a&nbsp;real-time barometer of cybersecurity maturity. And Zero Trust is proving its worth.Darin Hurd, CISO of US-based mortgage company Guaranteed Rates, puts it plainly: “We now have independent validation that Zero Trust offers significant benefits... Companies that prioritize Zero Trust investments gain a significant edge as cyber defenders.”IBM’s 2024&nbsp;Cost of a Breach Report provides further confirmation: organizations with Zero Trust experience&nbsp;20.5% lower breach costs than those without. The report puts the average cost of a breach in the US at $9.48 million.Zero Trust: Best Practice and Business-CriticalAs the threat landscape evolves, organizations can no longer afford to rely on outdated perimeter defenses. Apply proper cyber hygiene in addition to Zero Trust is a better approach. It’s a risk management imperative for cyber resilience. When properly deployed, Zero Trust reduces the external attack surface, prevents lateral spread, protects against comprise and data loss, resulting in:&nbsp;&nbsp;Enhanced cyber insurability, often resulting in more favorable policiesPrevents one third of cyber eventsCuts breach costs by over 20%Reduces insured loss by up to 31%Zscaler’s industry leading Zero Trust Exchange solution enables clients to identify, mitigate and report on their security posture, while streamlining the cyber insurance submission and renewal process with an automated Zero Trust addendum.&nbsp;We knew it. Insurers knew it. Attackers knew it. And now, thanks to&nbsp;Zscaler and Marsh McLennan, we have the data to prove it.&nbsp;]]></description>
            <dc:creator>Stephen Singh (VP, M&amp;amp;A/Divestiture and ITO integration at Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Having Resilient Conversations at Zenith Live 2025]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</guid>
            <pubDate>Tue, 03 Jun 2025 09:30:53 GMT</pubDate>
            <description><![CDATA[Since the start of this year, I have been all over the EMEA region – from Spain to Scandinavia, the UK to the Middle East. It’s been inspiring to understand the different priorities of each market, and where individual companies and broader industries are on their Zero Trust journeys.&nbsp;No matter the location or vertical, however, one topic that is coming up time and time again in my conversations with customers is resilience. Or more specifically, how companies can back-up and protect their existing data estate, and why this action should be acted upon immediately vs. being something that can wait.&nbsp;Exploring today’s resilient landscapeResilience is a topic we’ve been discussing a lot at Zscaler - and not just in terms of our own cloud infrastructure. Earlier this year, we launched&nbsp;research exploring the state of cyber resilience within global businesses. While the results showed an increasing recognition of resilience’s critical business value within a volatile operating environment and escalating threat landscape, they also highlighted worrying inconsistencies, gaps and inefficiencies in current strategies that IT leaders cannot afford to ignore any longer.&nbsp;In particular, we’ve seen that many organizations still rely on outdated or reactive security models. They feel confident in their resilience posture because nothing’s gone wrong yet. But without getting far more proactive with their approaches, set-ups and risk hunting, that confidence may well be misplaced in the wake of emerging developments like AI powered threats. Real resilience comes from visibility, awareness and preparation – not just hope and assumption.The key is building what we call “Resilience by Design.” That means designing systems that can absorb shocks, adapt quickly and keep the business running, even when things go wrong. It applies across every layer of the tech stack, from infrastructure and networks to applications and data. But so too does it apply to the people behind these stacks. As Gartner&nbsp;puts it in ‘Succeed as an SRM Leader by Infusing Resilience Into Your Program’: “Resilient people embody many of the same characteristics as resilient systems and are a key component of a resilient program.”&nbsp;At Zscaler we fully agree with the need for a more holistic approach to resilience – that’s why we’ve also commissioned research into personal resilience, and are due to launch those results in the coming month.&nbsp;Continuing the conversationMy next destination will be Prague for Zenith Live EMEA – Zscaler’s annual user conference. And I’m sure resilience will be a central topic of discussion there as well, as we plan to demonstrate how organizations can thrive in AI with the help of Zero Trust.&nbsp;My attendance of Zenith Live will mark almost a year to the day since I joined Zscaler, so it’s an important milestone for me to reflect upon. In the past 12 months I’ve seen our relationships with partners and customers grow and mature. As companies look to the convergence of AI and Zero Trust to fuel their next level of digital transformation and establish resilient, mission-critical infrastructures, Zscaler’s platform message is&nbsp;resonating more than ever.We’ve also expanded into markets like the Middle East, Africa and Eastern Europe – and I’m really looking forward to meeting some of our newest customers in Prague, as well as our growing partner ecosystem and my team members who are flying in from across the region.&nbsp;We’ve a packed schedule of keynotes, transformation theatre presentations featuring Zero Trust Everywhere and over 60 breakout sessions co-presented by customers, so it promises to be a great event.&nbsp;I’ll be onsite for the full&nbsp;conference so do come and find me on the show floor. We can chat resilience, AI, zero trust and much more.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Zscaler’s CMMC Level 2 Certification Empowers U.S. Department of Defense Contractors]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</guid>
            <pubDate>Tue, 27 May 2025 14:37:12 GMT</pubDate>
            <description><![CDATA[Cyber threats are escalating at an unprecedented rate, and as contractors supporting the U.S. Department of Defense (DoD), the stakes couldn’t be higher. Protecting sensitive data, such as Controlled Unclassified Information (CUI), is a mission-critical responsibility for every contractor within the Defense Industrial Base (DIB). With the establishment of the Cybersecurity Maturity Model Certification (CMMC) framework, the DoD has provided clear guidelines to strengthen the security posture of its contractors and safeguard the digital supply chain that underpins U.S. national defense.At Zscaler, we understand the immense responsibility that comes with operating in this high-stakes environment. It is with great pride that I share the news that Zscaler takes a prominent role as a Security SaaS provider in&nbsp;achieving CMMC Level 2 certification. This accomplishment is not just a certification milestone—it’s a testament to Zscaler’s commitment to empowering DoD contractors with the tools and technologies they need to achieve compliance, modernize security, and execute their mission-critical projects with confidence. Why CMMC Compliance Is a Game Changer for DoD ContractorsThe CMMC framework is DoD’s self-induced catalyst toward strengthening the cybersecurity posture of the DIB. Developed by the DoD, CMMC establishes a governance framework that defines a set of cybersecurity, compliance, and contractual standards that contractors must meet to be eligible for defense contracts. The framework emphasizes the protection of sensitive government data—including CUI—and ensures that cybersecurity is not an afterthought, but a foundational aspect of every contract.Achieving CMMC compliance is about much more than meeting contract requirements. Compliance demonstrates a contractor’s ability to protect critical assets, ensuring mission continuity and safeguarding the integrity of the overall national defense strategy. As threats continue to evolve, the financial, operational, and reputational risks of failing to secure sensitive information mean that compliance has become a strategic imperative for every DoD contractor.At Zscaler, we view compliance not as an endpoint but as a springboard for comprehensive cybersecurity excellence. With our achievement of CMMC Level 2 certification, we are positioned to help DoD contractors strengthen their cyber defenses, streamline compliance, and adopt solutions that meet today’s needs while anticipating tomorrow’s risks. The Zscaler Approach: Zero Trust and Cloud-First SecurityOur journey to earning CMMC Level 2 certification was rooted in our implementation of a Zero Trust Architecture. This approach is powered by Zscaler Internet Access™ (ZIA™) and Zscaler Private Access™ (ZPA™), two of our core solutions that are&nbsp;FedRAMP-authorized and purpose-built to meet the security demands of federal and defense environments.Zero Trust flips the traditional perimeter-based security model on its head. Instead of assuming that entities within a network can inherently be trusted, Zero Trust applies the principle of “never trust, always verify.” It ensures that no user, device, or application can access sensitive resources without first being authenticated and authorized. For the DoD contracting community, this model is a game changer. It eliminates unnecessary risk, minimizes the attack surface, and ensures sensitive data remains secure—no matter where users or applications are located.Our cloud-native approach is designed to simplify the complex. Many contractors today struggle with the operational burden of fragmented legacy systems and disjointed compliance workflows. By centralizing cybersecurity and compliance under the Zscaler platform, we enable contractors to reduce complexity, eliminate inefficiencies, and focus on their core missions. How CMMC Level 2 Certification Benefits DoD ContractorsEarning CMMC Level 2 certification is more than an achievement for Zscaler—it’s a call to action to help DoD contractors embrace industry-leading security solutions. Here’s what this milestone means for your operations:Streamlined Compliance Process: Managing compliance across the DoD contracting landscape can often feel like navigating through a maze of fragmented tools and requirements. Zscaler consolidates and simplifies compliance efforts, helping contractors achieve regulatory requirements faster and with minimal disruption to operations.Enhanced Cybersecurity Posture: With our Zero Trust approach, DoD contractors benefit from robust, cloud-native protections that evolve alongside emerging threats. This proactive security architecture reduces the risk of data breaches and other cyber exploits.Accelerated Digital Transformation: Our cloud-first solutions were built to empower contractors to innovate without sacrificing security. Whether transitioning workloads to the cloud or modernizing IT operations, Zscaler ensures that contractors can embrace digital transformation with confidence.Future-Ready Protections: In the constantly shifting cybersecurity landscape, future-proofing your operations is essential. As Zscaler actively works toward alignment with CMMC Level 3 requirements, contractors can rest assured that their cybersecurity framework will remain adaptable and aligned with DoD mandates.Compliance represents much more than a checkbox exercise; compliance is the foundation for achieving higher levels of organizational resilience and operational agility. As I often say, “Compliance is the foundation and the floor, not the ceiling.” That philosophy drives Zscaler’s approach to CMMC compliance. Looking AheadOur CMMC Level 2 certification is not the endpoint of our journey but a stepping stone to even greater achievements as we continue to support the DIB. We are actively assessing our alignment with CMMC Level 3 requirements and remain dedicated to helping contractors prepare for what’s next.To all U.S. Department of Defense contractors: Zscaler is here to help you protect sensitive data, drive innovation, and sustain mission success in an era of increasingly complex challenges. We’re proud to stand alongside you as a partner in security excellence and a catalyst for meaningful digital transformation.If you’re ready to accelerate compliance and adopt modern security built for the demands of the DoD ecosystem, I invite you to explore Zscaler and see how we can work together to defend the critical missions that keep our nation safe.]]></description>
            <dc:creator>Kumar Selvaraj (Sr. Director, Technology Risk &amp;amp; Compliance)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Leader in the 2025 Gartner® Magic Quadrant™ for Security Service Edge (SSE)]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</guid>
            <pubDate>Fri, 23 May 2025 15:31:03 GMT</pubDate>
            <description><![CDATA[IntroductionAt Zscaler, our mission is to secure, simplify, and accelerate business transformation, empowering your organization to be more competitive. For more than 15 years, we have been pioneering the technology that secures any-to-any zero trust communication using business policies, not corporate networks, and we have witnessed the widespread adoption of SSE solutions that provide a practical path for organizations to follow.Gartner Magic Quadrant for SSEThe 2025 Gartner® Magic Quadrant™ for&nbsp;Security Service Edge (SSE) has been published and Zscaler has again been named a Leader in this report,&nbsp;positioned highest for Ability to Execute. This is the fourth year that Zscaler has been named a Leader in the Magic Quadrant for SSE.We believe that our placement in the Leader Quadrant in this report, alongside 1,000+ reviews for Zscaler SSE on Gartner Peer Insights™, averaging a score of 4.65 out of 5 (as of today), demonstrates our strength in addressing the market for SSE solutions.&nbsp;In our opinion, the services that make up SSE are foundational elements of the&nbsp;Zscaler Zero Trust Exchange™, the first cloud native, multitenant, proxy-based security architecture, that is now processing over 500 billion daily transactions.Zero Trust EverywhereSSE, as defined by Gartner, ensures that authorized users have secure identity- and policy-driven access to approved internet, SaaS, and private applications. Building on more than 15 years of&nbsp;cybersecurity innovation and feedback from thousands of CIOs and CISOs,&nbsp;Zscaler takes this concept further with&nbsp;Zero Trust Everywhere, enabling customers to extend the benefits of SSE and unify security across three broad areas:Users: Secure application access for employees, contractors, partners, suppliers, and other B2B third parties.Branches: Secure each branch, factory, warehouse, and IoT/OT device, treating each as an island of one.Clouds: Secure workload communications across multicloud environment.&nbsp;&nbsp;By extending the SSE platform beyond users, Zscaler enables its customers to simplify their IT operations with a comprehensive, cloud native architecture that can protect their&nbsp;entire organization.Customer EndorsementWe believe that a key measure of Zscaler’s success is the value we deliver to our customers, and the trust they put in us to provide a resilient, scalable, and secure service as they progress through their digital transformation journeys. We’re proud of Zscaler’s recognition, validated by the following proof points:&nbsp;&nbsp;47 million users across approximately 8,500 customers worldwide~45% of Fortune 500 companies across all verticals rely on Zscaler to protect their operationsGlobal reach, with approximately 50% of our revenue in North America and 50% internationallyAn NPS score consistently above 75 vs. an average of 30 for SaaS organizationsConclusionAt Zscaler, driving innovation to empower organizations with a robust SSE-based zero trust platform is at the core of everything we do. Our goal is to stay ahead of evolving security needs, enhancing the Zero Trust Exchange with advanced capabilities to secure workforces, cloud workload communications, IoT/OT access, and B2B connections. With relentless focus, we ensure our customers are always prepared for what’s next.To receive a copy of the 2025 Gartner Magic Quadrant for SSE and see why Zscaler was recognized, please&nbsp;click here.We will be hosting a special webinar looking into the SSE market in 2025. Click here to register.&nbsp;&nbsp;&nbsp;Gartner DisclaimerGartner, Magic Quadrant for Security Service Edge, Charlie Winckless,&nbsp;Thomas Lintemuth,&nbsp;Dale Koeppen,&nbsp;Charanpal Bhogal, 20 May 2025Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, MAGIC QUADRANT and PEER INSIGHTS are registered trademarks of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[IDC MarketScape Recognizes Zscaler as a Leader in Data Loss Prevention (DLP)]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</guid>
            <pubDate>Tue, 29 Apr 2025 15:00:01 GMT</pubDate>
            <description><![CDATA[Data Loss Prevention (DLP) has undergone significant transformations over the years. Initially rooted in reactive measures to prevent data misuse, DLP has evolved to incorporate predictive and automated capabilities powered by AI and machine learning. This evolution enables enterprises to discover and classify sensitive data, identify abnormal patterns, maintain compliance with global regulations, and enhance overall security posture.As organizations adapt to the escalating risk of data breaches, the demand for robust data loss prevention (DLP) solutions has never been higher. IDC defines DLP as the set of technologies and processes designed to discover, monitor, and protect sensitive data from unauthorized access, misuse, or loss.&nbsp; IDC MarketScape for DLP Assessment&nbsp;IDC MarketScape: Worldwide Data Loss Prevention 2025 Vendor Assessment offers a comprehensive evaluation of nine companies in the DLP space. Its research includes vendor capabilities mapping, case studies, customer interviews, and evaluations of innovation at both strategic and tactical levels. By combining vendor performance insights with market trajectories, the excerpt serves as a benchmark for enterprises looking to enhance their data protection strategies with advanced DLP solutions. This rigorous research methodology provides a detailed analysis of vendor capabilities, offering invaluable insights into the competitive DLP landscape. Recently, the IDC MarketScape released its 2025 Worldwide Data Loss Prevention (DLP) Vendor Assessment, positioning&nbsp;Zscaler as a Leader.&nbsp;IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of technology and suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each supplier’s position within a given market. The Capabilities score measures supplier product, go-to-market and business execution in the short-term. The Strategy score measures alignment of supplier strategies with customer requirements in a 3-5-year timeframe. Supplier market share is represented by the size of the icons. Key takeaways from&nbsp;IDC MarketScape: Worldwide DLP 2025 Vendor AssessmentFor technology buyers, the IDC MarketScape assessment offers crucial takeaways. Enterprises are advised to prioritize vendors who concurrently support advanced data discovery, real-time threat prevention, and scalable integration across multi-cloud environments. Seamless deployment, integrations with existing IT ecosystem tools, and advanced reporting and analytics are must-have features for future-proofing data protection strategies. In addition to the excerpt, buyers are especially urged to align DLP investments with zero-trust security principles to ensure that solutions adapt readily to the shifting threat and data loss landscape.&nbsp; Why IDC MarketScape named Zscaler as a DLP LeaderThe IDC MarketScape for DLP 2025 Vendor Assessment named Zscaler as a Leader in the DLP market, citing the following strengths:&nbsp;“Zscaler has a sizeable customer base for its Zero Trust Network products. This gives Zscaler a solid foundation for expanding and growing its data security footprint while offering customers a consolidated experience.”“Customer feedback cited the speed and depth of Zscaler's customer service and support, as well as the interoperability with other products in the portfolio.”What we believe are Zscaler’s Highlights and StrengthsComprehensive Data Protection Platform:&nbsp;Zscaler’s standout strength lies in its&nbsp;Zscaler Data Protection offering and its leverage of the&nbsp;Zscaler Zero Trust Exchange™ architecture. This integrated platform delivers functionalities essential for any contemporary DLP solution: robust data discovery, classification, data security posture management, and proactive mapping of regulatory requirements. Zscaler's platform ensures complete data channel coverage, identifying sensitive data across various workloads, applications, and endpoints, while deploying real-time security capabilities to prevent unauthorized data exposure.Zero Trust Architecture:&nbsp;Zscaler’s Zero Trust Exchange aligns with one of the most effective security philosophies, enabling enterprises to eliminate implicit trust and secure interactions over all digital channels.Discovery and Classification:&nbsp; With powerful AI-driven classification complemented by traditional techniques like Regex, IDM, OCR, and EDM, the excerpt highlights the Zscaler platform’s comprehensive discovery capabilities. As a critical foundation for any data protection strategy, robust classification delivers deep visibility across all devices, applications, and locations, enabling organizations to safeguard sensitive data effectivelyIntegrated DSPM:&nbsp;Beyond simple data visibility, Zscaler’s platform extends into&nbsp;Data Security Posture Management (DSPM). This empowers organizations to uphold compliance, automate least-privilege access, and mitigate risks associated with misconfigurations or insider threats with prioritized risk remediation. Zscaler's DSPM capabilities are currently available as an add-on to its Zscaler AI Data Protection Platform.Email DLP:&nbsp;The newest addition to Zscaler's Platform, this data loss channel enables integrated control over email and attachments. Easily added to existing email infrastructure as an extra hop to M365 or Google services, Zscaler helps further consolidate DLP control across this key channel.Reporting:&nbsp;Zscaler offers comprehensive reporting features in its core product that include historical data, trends, patterns of activity, user behavior and executive summaries with customizable metrics and insights.&nbsp;Rapid innovation comes with unique challenges. Chief among these is the complexity involved in transitioning legacy systems to its advanced cloud-focused model. For some organizations, the gap between on-premise familiarity and sophisticated cloud-native tools may initially find the learning curve steep without adequate resources or organizational buy-in and require extensive change management efforts.&nbsp;Moreover, as DLP policies grow stricter, successful implementation requires strong collaboration between security, compliance, and end-user teams within client organizations.&nbsp; Building awareness at the grassroots level for stakeholders preconditioned to work with legacy solutions is another challenge. To this end, Zscaler offers robust onboarding services to help ease these transitions.&nbsp; Conclusion: Zscaler’s Vision for Future-Proof DLPWe believe that Zscaler continues redefining data protection in a world where sensitive information travels beyond traditional perimeters. Its Zero Trust Exchange, backed by policy-based automation and AI-powered insights, is setting a new standard for protecting enterprise data. As the data risk landscape evolves and regulatory scrutiny intensifies, organizations seeking a proactive approach to data security can trust Zscaler’s innovative solutions to stay ahead.For enterprises navigating the complexities of DLP, we believe Zscaler’s position as a Leader in the IDC MarketScape is more than recognition; it’s a call to action for investing in a future-proof strategy. With the right guidance and technology, businesses can maintain compliance while fostering innovation in a cloud-first, AI-driven world.&nbsp;To learn more, download an excerpt of&nbsp;the IDC MarketScape: Worldwide DLP 2025 Vendor Assessment.&nbsp;Source: “IDC MarketScape: Worldwide DLP 2025 Vendor Assessment” By: Jennifer Glenn, IDC doc #US53234325, March 2025]]></description>
            <dc:creator>Mahesh Nawale (Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Start Spreading the News: Zscaler Rocks Exposure Management]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</guid>
            <pubDate>Mon, 28 Apr 2025 20:14:32 GMT</pubDate>
            <description><![CDATA[It’s not just our customers who love our Exposure Management offerings – now Cyber Defense Magazine has chimed in to recognize the excellence of our solutions with not one but two Global InfoSec Awards!We took the top prize in two categories:Visionary Continuous Threat Exposure Management (CTEM)Cutting Edge Exposure ManagementThe CDM Global InfoSec Awards honor information security innovators who provide unique and compelling products and services. What perfect timing, to earn this recognition just as we kick off the RSA Conference this week! Come see these award-winning solutions in action, at Booth N-5361. Our best-in-class Exposure Management solutionsPowered by our Data Fabric for Security, our solutions provides our customers with a complete and contextual understanding of their risk posture.Our Asset Exposure Management solution for CAASM:Creates a complete and accurate asset inventory by integrating data across hundreds of sources and normalizing the asset metadata for increased accuracy.Identifies coverage gaps to pinpoint missing controls, misconfigurations, and ensure compliance.Automates workflows to adjust access policies and update CMDBs to maintain asset hygiene.Our Unified Vulnerability Management solution:Consolidates data ingested from multiple vulnerability scanners, plus dozens of other security and business tools providing other findings and business context.Correlates the aggregated information to identify a company’s most critical exposures, taking into account their mitigating controls.Prioritizes vulnerabilities based on business impact and exposure severity and identifies key mitigation requirements for high-risk areas.&nbsp;Our Risk360 solution:Assesses risk across Zscaler systems and third-party data sources, surfacing configuration change recommendations within Zscaler offerings to reduce customer risk.Quantifies the financial loss estimates associated with industry standard and custom risk factors.&nbsp;&nbsp; Come see us at RSAAll these solutions, along with Zscaler’s full Zero Trust Exchange solution and Data Protection offerings, will be featured at our RSA Booth, and we’ll have live presentations nearly every hour. We’d love to see you there!If you’re not lucky enough to be at RSA this year, don’t fret – you can always schedule a personalized demo.]]></description>
            <dc:creator>Michelle McLean (Sr. Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler UK User Group provides Insight, Collaboration and Networking opportunities]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</guid>
            <pubDate>Thu, 17 Apr 2025 16:53:57 GMT</pubDate>
            <description><![CDATA[Our recent Zscaler User Group Event at Hijingo in London was once more a testament to the power of collaboration, bringing together over 55 customers for a day of networking, information sharing, and open discussions on how to navigate the evolving landscape of Zero Trust security. As a customer-only event, a user group meeting is designed to foster meaningful dialogue, with an agenda that encourages peer learning, exchange of experiences, and exploring best practices together. In addition to the customer-led sessions that focussed on individual organizations' Zero Trust transformation journeys, and a session from our Customer Success team on 'Zero Trust Beyond Remote Work,' these events truly thrived on the personal exchanges between participants.Key take aways from real-world Zero Trust experiencesThe day’s standout moments are usually the fireside chats amongst customers. These conversations offer candid, real-world insights into both the challenges and successes of implementing Zero Trust across organizations. Interestingly, the key takeaway this year wasn’t technical at all. Customers consistently emphasised that aligning stakeholders, securing executive buy-in, and shifting organizational mindsets are the true foundations of a successful Zero Trust journey. To drive this transformation, it is essential to clearly demonstrate the ROI of a Zero Trust approach by focussing on leadership priorities such as cost reduction and security simplification.As multi-cloud environments grow increasingly complex, organizations are finding it difficult to maintain visibility and control - unless they can unify their data streams through a centralized dashboard. Once they transition to a cloud-based Zero Trust platform, the next challenge often lies in managing Zero Trust across distributed, virtual teams. This shift highlights the need to upskill teams to effectively handle the new security paradigm. This opening session brought a key theme into focus: Zero Trust is as much about operational and cultural transformation as it is about technology.&nbsp;AI, Risk, and the Zero Trust Journey&nbsp;Inspiration provided the session on AI governance in a Zero Trust world. It served as a timely wake-up call for organizations to take a proactive stance on defining AI security policies before security gaps have a chance to emerge. As AI adoption accelerates, so do the challenges around governance, security, and risk management. The session explored how businesses must strike a careful balance between innovation and security, ensuring AI-driven progress boosts productivity without introducing unnecessary risk.&nbsp;As employees will always try to find a way to boost their productivity with the help of AI, organizations have to understand usage patterns of the tools. Only by identifying how employees interact with AI, will they be able to counterfeit the associated risks of the modern ways of working. The recently launched&nbsp;ThreatLabZ 2025 AI security report showed an explosion of AI/ML transactions in the Zscaler cloud with a 3,464.6% year-over-year increase, highlighting the massive growth of enterprise AI adoption. However, AI can be a double edged sword that enables not only a productivity boost, accelerated decision-making, and automated workflows, but cybercriminals are using the same technology to automate and scale more sophisticated attacks. From hyper-realistic deepfakes to advanced vishing scams, AI-generated threats have quickly raised the stakes for enterprise security.According to the report, blocking is the immediate reaction to the emerging threat landscape. With 59% of AI/ML transactions prohibited by enterprises, this signals concerns over data security and the uncontrolled use of AI applications. However, blocking AI-related transactions is only a reaction and not a strategy. Organizations must work to establish AI governance frameworks to ensure AI use is controlled without stifling innovation or user productivity. A risk-based approach that centers around protecting critical assets must begin with a clear classification of the AI tools in use. This foundational step enables IT teams to define precise policies for sanctioned, tolerated, and unsanctioned AI applications. Building on this session, much of the discussion within the user group centered around governance strategies for effectively managing AI-related risks.&nbsp;Fireside Chat: From Strategy to SuccessParticipants also gained valuable insights from peers who shared real-world lessons on implementing Zero Trust in complex environments. The fireside chat highlighted the critical role of cross-functional collaboration in successfully adopting and scaling Zero Trust strategies. One customer shared how they streamlined their security architecture by consolidating firewalls and proxies through the Zscaler cloud – simplifying their toolset while maintaining robust protection. At the same time, they focused on strengthening business continuity by enhancing resilience and improving incident response as part of their disaster recovery planning – a topic that resonated strongly throughout the day’s discussions.&nbsp;While the customer conversations were front and center, Zscaler closed the event with a session on Zero Trust beyond Remote Work. It showcased how the Zscaler cloud platform continues to evolve, enabling organizations to extend Zero Trust principles to all networks and devices, regardless of location. Emphasis was placed on securing all traffic through the Zscaler platform using tools like Client Connector, App Connector, and Private Service Edge. Together, these components help build a resilient Zero Trust architecture that supports granular access controls based on user identity, device posture, and business context. The key message was clear: Zero Trust isn’t just for remote work – it must be embedded across the entire enterprise to effectively replace broad network access with precise, application specific segmentation.&nbsp;&nbsp;In conclusion, our customers’ experiences highlight that Zero Trust is not a one-time project, but an ongoing journey that hinges on stakeholder alignment and strong cross-functional collaboration. As organizations adopt AI, security teams must take a proactive stance, implementing governance frameworks while maintaining visibility and control across increasingly complex multi-cloud environments. Close partnership with product teams also plays a vital role in unlocking the full value of new capabilities. By actively listening to and building alongside our customers, we can guide them through every step of their Zscaler journey and help ensure lasting, successful transformations. Because in the end Zero Trust isn’t a destination - it’s a continuous journey.&nbsp;&nbsp;]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How organisations can weather future storms by becoming ‘Resilient by Design‘]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</guid>
            <pubDate>Thu, 03 Apr 2025 08:33:11 GMT</pubDate>
            <description><![CDATA[In today's world of escalating cyber threats, organisations face unprecedented challenges trying to maintain IT and business operations without disruption. As the pressure to digitally transform continues, cyber resilience is fast emerging as the driving force behind survival and success. But with bad actors currently controlling the pace of change, organisations are having to find more and more ways to improve their security posture, which is why cyber resilience has gained popularity.As an approach, cyber resilience recognises the fact that an appropriate security posture is not just having the best defensive controls, but includes how to stay in business - no matter how significant the attack. The process is never complete, and instead must be constantly evolved to keep up with adversaries. That means that within their cyber security strategies, organisations must respond to the challenge of not only putting controls in place to prevent incidents from occurring, but also having the mechanisms set-up to be able to respond to and recover when they inevitably do. We call this being ‘Resilient by Design.’This is where a mindset shift is needed. According to our recent research report&nbsp;‘Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative’ 60% of IT leaders globally believe their organisation overly prioritizes prevention in its cyber security strategy, and more than half of the respondents (57%) say their leadership continues to define cyber security failure as initial access by a threat actor.&nbsp;This needs to change. Effective cyber resilience approaches that are ‘Resilient by Design,’ must go beyond the technical challenge of cyber prevention, and instead look at the situation far more holistically. They must answer the question: Do we have the ability across our business, infrastructure and people to prevent, withstand and recover from a successful attack?Preparing for the cyber stormThe analogy that comes to mind is that organisations should think of their cyber resilience as if they are preparing for a storm. If they only have an umbrella to hand, that will offer little protection against a hurricane. That is why humans rely so heavily on the weather forecast to warn us of coming storms – so we can take action to not only protect ourselves by seeking shelter, but also deploy additional security and recovery measures in advance. Continuing the analogy, there is more to overcoming the effects of a hurricane than just taking shelter. You also need to be able to prevent and withstand as much damage or impact as possible. Are building construction codes set up in such a way to endure the gale-force winds?&nbsp; Are there clean up plans after the storm clears - and are they prioritised to ensure essential services keep running?Of course, taking effective recovery measures means that you have to declare what those essential services are going to be beforehand. You might, for example, need ambulances to be able to go down roads to tend to the injured – meaning those roads have to be cleared first, and those ambulances are ready to go with medical staff available to equip them. Similar “cyber preparedness” steps have to be taken into consideration to become ‘Resilient by Design.’How to become ‘Resilient by Design’?Organisations need to ensure that they can respond quickly to cyber incidents. At Zscaler we are already helping our customers to shift to an architecture that can weather the cyber storm – not only putting appropriate security controls in place, but also replacing aging architectures that were built on what was effectively a house of cards.&nbsp;Per my introduction, we are also tackling the challenge from a more holistic point of view, looking beyond technology aspects and considering the full breadth of an organisation to deliver the capabilities for a robust response and recovery strategy. Forecasting cyber incidents, based on AI delivered insights should become part of the strategy as well. Additionally, as part of this, ‘Resilient by Design’ must encompass business capability requirements as well. The change to a zero trust based architecture, for example, not only solves the security challenges of digitized organisations, it also supports business agility and delivers a competitive advantage at the same time.&nbsp;With business capability an increasing part of the protection equation, security has already become a board level topic – and so too must resilience. Organisations need a business vision and an investment plan to switch gears to become truly cyber resilient. To continue to innovate with confidence, they also need to know they are as protected as possible, and able to recover from any incident without major interruption to business operations.&nbsp;The changing role of security&nbsp;Security’s role as a business enabler is a new paradigm that has become a reality in the past few years of transformation. In recognition of this, the CISO must also transform their role to reflect the more modern function of a BISO (Business Information Security Officer) and ensure that today’s security processes take business operations into account as well. As the security function matures, a ‘Resilient by Design’ approach is yet further evidence of the increasingly central role it is taking on.&nbsp;Looking ahead, organisations must leave the old school thinking of isolated security controls behind to achieve holistic resilience across their operations. In doing so, they will be able to weather whatever cyber security storms come their way. In today's volatile world, being ‘Resilient by Design’ isn't just a nice to have. It's your ticket to get a competitive advantage and unlock The Resilience Factor.This blog summarizes the first episode of The Resilience Factor podcast series. You can listen to the full conversation of the podcast&nbsp;here.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[DMEA: Keine Angst vor Zero Trust im Gesundheitswesen]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/dmea-do-not-be-afraid-of-zero-trust-in-healthcare</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/dmea-do-not-be-afraid-of-zero-trust-in-healthcare</guid>
            <pubDate>Tue, 01 Apr 2025 16:39:32 GMT</pubDate>
            <description><![CDATA[Die IT-Infrastruktur ist mittlerweile von zentraler Bedeutung für die Gesundheitsversorgung. Cyber-Angriffe auf Einrichtungen des Gesundheitswesens sind damit nicht nur ein Risiko für die IT. Einen Ransomware-Vorfall zu vermeiden, ist ebenso relevant für die Patienten. Welche neuesten Sicherheitstechnologien helfen können, wird vom 8. bis 10. April 2025 u.a. auf der DMEA in Berlin zu sehen sein.Das Gesundheitswesen transformiert sich rasant hin zu digitalen Organisationen. Dabei müssen auch Sicherheitsmaßnahmen an die sich fortentwickelnde Bedrohungslage angepasst werden. Die Fernwartung von Medizintechnik, die Anbindung von Lieferanten und Drittparteien, KI-assistierte Diagnosen, digitale Patientenakten, Telemedizin oder mobile medizinische Geräte haben eines gemeinsam – sie basieren auf der Anbindung über das Internet. Doch eben diese Auffindbarkeit über IP-Adressen vergrößert die Angriffsfläche der Gesundheitsinfrastruktur.Mit jeglicher Transformation gehen neue Risiken einher, die mit modernen Sicherheitskonzepten eingegrenzt werden sollten. Denn die Sensitivität von personenbezogenen Gesundheitsdaten ist eine wahre Goldgrube für Malware-Akteure. Mit 250 $ pro persönlichem Datensatz erzielen diese Informationen laut Trustwave 47-mal mehr Erlös im Darknet als Kreditkarteninformationen. Auch die Angriffsstatistik auf Krankenhäuser von 2024 spricht Bände: 181 bestätigte Ransomware-Angriffe auf Gesundheitseinrichtungen weltweit wurden gezählt.Die Anatomie eines AngriffsDie Malware-Akteure folgen dabei immer dem gleichen Angriffsmuster. Sie nehmen eine Einrichtung ins Visier und suchen nach deren Angriffsfläche. Dabei kann es sich um eine öffentliche IP-Adresse handeln, von einer Firewall oder einem VPN oder dem Portal einer Anwendung. Die Künstliche Intelligenz (KI) trägt dabei zur wesentlich schnelleren Auffindbarkeit von Schwachstellen in solchen Geräten bei und kommt auch bei Phishing-Angriffen auf einzelne User zum Einsatz. In einem nächsten Schritt werden diese Schwachstellen kompromittiert oder User-Anmeldedaten durch geschicktes Social Engineering erbeutet. Sind Eindringlinge auf diese Weise einmal ins Netzwerk eingedrungen, bewegen sie sich lateral fort auf der Suche nach wertvollen persönlichen Gesundheitsdaten, die im letzten Schritt verschlüsselt oder entwendet werden.&nbsp;In einem solchen Angriffszyklus spielen herkömmliche Praktiken, die gerade im Gesundheitsbereich noch vorherrschen, eine große Rolle. Die Problematik besteht in dem Vertrauensverhältnis für den Netzwerkzugriff, der Drittparteien oder auch Mitarbeitenden eingeräumt wird. Sie verbinden sich über VPNs und klassische Firewalls mit den Ressourcen in IT-Umgebungen. Ein moderner Zero Trust-basierter Sicherheitsansatz schließt die Schlupflöcher für Angreifer. Anstelle des grenzenlosen Netzwerkzugriffs tritt authentifizierter, Richtlinien-basierter Zugriff auf der Ebene der einzelnen Applikation. Drittparteien erhalten keinen generellen Netzwerkzugang, sondern lediglich Zugriff auf die benötigte Anwendung. Durch inside-out Anbindung und Verifizierung von Identitäten und Richtlinien lassen sich Risiken unterbinden und die Angriffsfläche eindämmen.Use Case: Zero Trust ist erprobt für das GesundheitswesenAuf der DMEA berichtet die Sana IT GmbH als IT-Dienstleister für die Sana Kliniken AG über ihre 15-jährige Erfahrung mit der Zscaler Zero Trust Exchange Sicherheitsplattform. Jeglicher Internet-basierte Datenverkehr wird von dem Zero Trust-Pionier der ersten Stunde erfolgreich über Zscaler Internet Access abgesichert. Dadurch erhält das Sana IT-Team Einblick in die Datenströme der einzelnen Kliniken und kann diese auf Schadcode und Angriffe compliance-konform scannen.&nbsp;Da die Cloud-basierte Sicherheitsplattform lediglich Log-Daten vorhält und ansonsten keine Daten speichert oder entschlüsselt, kann Compliance mit diesem Sicherheitsansatz umgesetzt und der Alltag des Dienstleisters entlastet werden. „Wir haben uns das Zero Trust-Konzept am Anfang mit einem einzelnen Krankenhaus angeschaut“, fasst Daniel Feicht von der Sana IT den Einstieg in die Cloud-Plattform zusammen. „Das Ergebnis war so überzeugend, dass Zscaler Internet Access heute an allen Standorten eingesetzt wird, um für eine spürbare Verbesserung der Internet-Sicherheit zu sorgen. Das Plattform-Modell ist ein Selbstläufer, mit dem wir fast keinen Wartungsaufwand haben, abgesehen von gelegentlichen Policy-Updates zur Komplexitätsreduktion.“Im gemeinsamen Vortrag mit Zscaler unter dem Titel: „Zero Trust einfach und effizient umgesetzt - Wie die Sana IT Sicherheit und Innovation im Gesundheitswesen vereint“ erläutert die Sana IT am&nbsp;Dienstag, dem 8. April 2025 um 14:40 Uhr auf der DMEA die Erfahrungswerte. Das Zscaler Team freut sich darüber hinaus über ihren Besuch in Halle 4, Stand C103auf der DMEA.]]></description>
            <dc:creator>Gregor Keller (Director Solution Consulting Central &amp;amp; Eastern Europe)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Lessons from Gartner on Infusing Resilience Into Your Security and Risk Program]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</guid>
            <pubDate>Tue, 25 Feb 2025 18:43:25 GMT</pubDate>
            <description><![CDATA[2025 demands a new approach to cybersecurity resilience. As network complexity collides with ever-more volatile threat and operating landscapes, traditional security measures have become untenable.While a security framework with perfectly synchronised people, processes, and partners might sound aspirational, it's no longer something you can choose to reach for—it's essential for business survival.&nbsp;Yet too often, proactive, sustained cyber resilience takes a back seat to reactive responses when cyber-attacks and operational failure scenarios strike.A timely research report from Gartner,&nbsp;Succeed as an SRM Leader by Infusing Resilience Into Your Program 1), offers a practical blueprint for organisations caught in these reactive cycles. It reveals how to build cyber resilience into your operations and create an adaptable system that can tackle constant interruptions, remove complexity, and stay prepared for threats both big and small.At Zscaler, we believe cyber resilience will define business success in 2025. And that a new approach is desperately needed. This isn't about better controls or technology alone – it's about making those controls and technologies work more effectively while supporting the teams that use them. Our mission this year is to help our customers unlock&nbsp;The Resilience Factor—something we define as the unique ability of a business (or indeed individual employee) to&nbsp;withstand adversity,&nbsp;adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.Ready to strengthen your organisation's cyber resilience strategy?&nbsp;Download the Gartner report now to discover practical steps for building a more resilient security programme. And stay tuned—this is just the beginning of our exploration into The Resilience Factor.1) Gartner, Succeed as an SRM Leader by Infusing Resilience Into Your Program, Authors: Michael Aldridge, Belinda Wilson, Arthur Sivanathan, 18th June 2024]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Legacy Architecture is Preventing a Modern Digitised NHS]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</guid>
            <pubDate>Tue, 25 Feb 2025 12:53:45 GMT</pubDate>
            <description><![CDATA[May 12th, 2017 is a day burned into the memories of IT and security teams nationwide. For those lucky enough to not be impacted, it was the first large-scale ransomware attack - titled WannaCry - which encrypted the data on Windows devices that hadn’t updated to a recent Microsoft patch. That data was held for ransom by bad actors who exploited the unpatched software, which had a major impact on more than a third of NHS Trusts and subsequently thousands of patients across the country.Now you might be thinking it’s 2025 – how is WannaCry still relevant eight years later? Well, although the Windows patching has improved beyond what it was in 2017, the fundamental flaws that were culpable in 2017 are still seen today. Traditional connectivity practices are still being used in hospitals and continue to leave our health system open to vulnerabilities due to implicitly trusted network access. Third parties and other organizations continue to connect to internal networks via VPNs or firewalls that have consistently proved to be plagued with basic vulnerabilities and zero-day threat software gaps.&nbsp;All of this subpar infrastructure time from already over stretched IT teams within the public sector and more specifically, our health system. We can’t keep trying to mitigate the flaws in legacy architecture by patching up the holes – there has to be a better way!Four steps to robbing a bankBefore we can identify the solution, we need to identify the root of the problem by understanding how a breach can happen. To put it into non-technical terms, an IT security breach is much like robbing a bank.&nbsp;The first step is to identify all the possible bank branches to hit. Perhaps there are 50 or 500 bank branches out there, so the next step is to narrow this down to a branch that can be broken in without getting caught. Perhaps it is in a secluded area, or the surveillance cameras are not working. The third step, once you're in, is to move laterally - find a cash safe, and make your escape. Four simple steps.&nbsp;This is the same four-step approach to conducting a cyber attack. First, they find your attack surface. What's your attack surface in the cyber world? Well, it's every public IP which may be firewall, a VPN, or application portal. And today, AI is helping bad guys to identify the attack surface very, very quickly. Secondly, they want to compromise you. They do this by essentially finding a vulnerable user or vulnerable applications. And today, you can actually generate phishing campaigns using AI or Machine Learning, or you can even create a webpage to really bring them in. So, either users fall for it through social engineering, or they exploit a vulnerable application. Once infected, the malware moves laterally through the wider network. It finds high-value assets, then encrypts it and asks for ransom. Number four, they don't stop there, they steal your data. And stolen data is often sent to the Internet.Build a zero trust strategyNow you understand the principle of a cyber breach, you need to learn how to mitigate these four steps. This is where a zero trust architecture is the ideal counter-measure. Zero trust isn’t about plugging the gap by creating a new form of firewall or VPN. Its key focus is to make sure the bad guys can be stopped at each of the four steps. For instance, Zscaler’s platform is far more effective than traditional firewall-based architecture. Generally, when new technologies like cloud come, IT vendors try to take existing technologies of networking security and try to adapt it to the cloud. Zscaler Zero Trust is fundamentally different. It never put users or third parties on the network and it only uses inside-out connections, always verify identity, policy and risk before allowing access.&nbsp;Meet us at NHS Cyber Security ConferenceReliance on outdated legacy systems is increasingly untenable in today’s digital age. To avoid another WannaCry incident, NHS Trusts must update their security architecture to a Zero Trust approach to prevent lateral movement and decrease the attack surface of traditional technology stacks. To learn more about how NHS networks are being continuously exposed to threats, please join us on&nbsp;5th of March 2025 at 12:55 for Zscaler’s session on “Why Legacy Architecture is No Longer Fit for Purpose in a Modern Digital NHS”. Using lessons from real world examples of ransomware attacks, we will highlight the limits of patching, and why VPNs and their daily CVEs continue to expose NHS networks to threats. Additionally, we’ll examine the dangers of lateral movement between interconnected NHS trusts and why this sharing of data might increase vulnerability. Attendees will leave with actionable insights on modernizing IT infrastructure to reduce these risks and better secure the future of digital healthcare using zero trust principles.&nbsp;We look forward to seeing you there.&nbsp;]]></description>
            <dc:creator>Mike Culshaw (Sales Engineer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Mobile World Congress: The Demand for Uniformity in Zero Trust]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</guid>
            <pubDate>Tue, 18 Feb 2025 12:43:22 GMT</pubDate>
            <description><![CDATA[My key take away from last year’s Mobile World Congress was that&nbsp;now almost everything is SIM-enabled, the industry focus moving forward will be on how telcos can make use of connectivity being delivered everywhere. Related to this, the open question coming away from the conference was how mobile connectivity can be orchestrated in one environment with effective controls?&nbsp;I have long seen security as the great unifier in this regard - as every user, device, and service demands uniform security on any network. This year I will return to Barcelona to deliver on that vision with an orchestration approach based on the uniformity of Zero Trust delivered via the Zscaler security cloud.For uniformity, the challenge has always been to extend an enterprise’s control, visibility and protection to all its assets, wherever they may be. To do so requires going beyond where physical infrastructure is located, where we have a forwarding router on the edge, or where clients are. To date, our Zero Trust based security cloud has been covering client side software and the edge of a network, and forwarding the edge of the cloud to all things in the IoT or OT-space.&nbsp;But we have not yet addressed the last unexplored territory of cellular connectivity with Zero Trust - meaning that this has still been a blind spot contributing to unsecured data streams from mobile services or things. And I deliberately say “things” here to signify that this goes beyond the scope of devices. The last mile for true uniformity of Zero Trust services has been unrealized – until now. With the extension of our Zscaler Cellular portfolio, we just added the last piece of the puzzle to deliver unified Zero Trust everywhere, at any time, and on anything in the various form factors that we need to deliver.Closing the security gap of mobile thingsZscaler Cellular brings secure Zero Trust-based connectivity into a cellular format; it is designed to enable the secure connectivity of IoT and OT devices or things that move outside the boundaries of a traditional network infrastructure.&nbsp;Typically, the traffic of such mobile devices outside the traditional enterprise perimeter would fall outside the control of IT security teams. Now, by providing organizations with an innovative way to send such traffic of these mobile devices or things through the Zscaler Zero Trust Exchange security platform, Zscaler Cellular helps the devices to achieve secure bi-directional connectivity from enterprises or their customers, and therefore close any potential security gaps.Zscaler Cellular can be deployed with existing cellular providers or through an end-to-end service from Zscaler. To deliver this Zero Trust functionality, Zscaler has built the Zscaler Cellular Edge, which can be deployed via three different routes:1. As a bolt-on for existing telco services&nbsp;2. Through a direct service from Zscaler&nbsp;3. By moving the cellular edge into private cellular environments. Customers that are looking into replacing their Wi-Fi ecosystem with a high speed, low latency solution based on 5G can use this path to gain secure gateway functionality to enable those devices and services to be protected.Zscaler Cellular makes routable or public IPs obsoleteTraditionally, SIMs would connect via a private APN to the customer’s network, which would require an IP address that makes it fully routable. Once the mobile traffic is inside the private network it is secured via the firewall. Such a set-up repeats the old story of tromboning and backhauling data (i.e. per traditional MPLS traffic flows) which a modern Zero Trust approach already made obsolete. The problem with continuing to use these routable networks is that their security models add latency, vulnerabilities, cost and backhauling to the data center, and also make devices visible to attackers.To simplify such a complex set-up, Zscaler Cellular has a direct relationship with any mobile network - turning the cell edges into the gateway to access private or Internet workloads without having to backhaul data. Similar to the early days when the Zscaler service removed backhauling by providing secure direct access to the Internet for users accessing their applications in the cloud, the cloud platform now also considerably simplifies the infrastructure for mobile connectivity and makes SIMs invisible to the outside world. Rather than the heavy lift of previous network configurations, one unified Zero Trust policy secures all cellular data streams via the Zero Trust Exchange platform. As well as simplifying the set-up, this enables Zscaler to give secure connectivity, protection and visibility via one unified approach that serves a multitude of customer use cases.Simplified security for the mobile world at MWCThe benefit of a unified Zero Trust approach is the universal applicability for various use cases of basically everything that is mobile. Whether it is handheld devices, vehicles, machinery, or other use cases in the logistics or mobility space the concept of simplified combined connectivity and security resonates broadly across a variety of industries.&nbsp;If you want to experience the power of the Zscaler Cell Edge and private cellular networks at Mobile World Congress, visit Zscaler at our Deloitte and NTT partner stands or drop by our booth on the executive meeting room level. We are looking forward to showcase how Zscaler Cellular extends the reach of Zero Trust to shape the future of secure connectivity.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Der Weg zu mehr Cyber-Sicherheit: Kosten senken, Budgets priorisieren und Resilienz stärken]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/the-path-to-greater-cyber-security-reduce-costs-prioritize-budgets-and-strengthen-resilience</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/the-path-to-greater-cyber-security-reduce-costs-prioritize-budgets-and-strengthen-resilience</guid>
            <pubDate>Fri, 14 Feb 2025 11:32:10 GMT</pubDate>
            <description><![CDATA[Wenn sich führende Köpfe aus IT und Security bei den Hamburger Strategietagen versammeln, stehen zentrale Fragen zur digitalen Zukunft im Fokus: Mit dem Motto „Foundation – Resilience – Innovation“ liegt der Schwerpunkt dieses Jahr neben gängigen Hype-Themen wie KI oder Resilienz vor allem auf dem Ausschöpfen von Digitalisierungspotenzialen und der Modernisierung von IT-Infrastrukturen. Kurz gesagt, es geht um die erfolgreiche Transformation von Unternehmen im digitalen Zeitalter. Über 1.500 CIOs und IT-Entscheider sind dazu vom 19. bis 21. Februar in Hamburg eingeladen, um über die größten Herausforderungen zu diskutieren, die besten Lösungsansätze zu evaluieren und sich über Best Practices auszutauschen.&nbsp;Über Kostensenkung spricht, wer die Transformation noch vor sich hatDie Priorisierung von Sicherheitsinvestitionen bleibt dabei eine der größten Herausforderungen für Unternehmen, denn selbst in diesem Bereich wachsen Budgets nicht ins Unermessliche und die Vielfalt an Anbietern und Lösungen wirkt oft überfordernd. Diejenigen Unternehmen, die den digitalen Sprung bereits geschafft haben, sprechen nicht mehr über Kosteneinsparung, sondern über Business Enablement. Sie sind im Kampf gegen Cyber-Bedrohungen einen Schritt voraus, denn sie haben Hardware-basierte Infrastrukturen hinter sich gelassen. Sie sind bereits mit einem Plattform-basierten Sicherheitsansatz vollständig Cloud-nativ aufgestellt, nutzen aktiv KI zum Schutz und können somit besser mit den Herausforderungen umgehen. Sie profitieren also schon von ihren Transformationsinitiativen, während sich andere Unternehmen noch mit deren Planung befassen.Wie kommen Unternehmen in eine solch komfortable Position? Wie schaffen sie es, eine erfolgreiche Transformationsstrategie organisatorisch abzubilden? Entscheider stehen vor der Frage, wie ihr Unternehmen „digital native“ wird? Was sind die Herausforderungen, die auf dem Weg zur Ablösung herkömmlicher IT-Infrastrukturen und interner Prozesse gemeistert werden müssen? In Hamburg werden zwei Unternehmen aus völlig unterschiedlichen Bereichen gemeinsam mit Zscaler aufzeigen, wie sie der erfolgreiche Transformationspfad eint. Und sie werden damit anderen Teilnehmenden Anregungen liefern.Wo ist Potenzial für die Risikoreduktion?Das Schließen verbleibender Lücken in der bestehenden Sicherheitsstrategie ist nach wie vor ein Hauptaugenmerk für viele IT-Security Entscheider. CIOs und CISO’s stehen vor der Frage, wo sie für ihre Investitionen den größten Gegenwert in Form von Risikoreduktion erhalten. Soll mehr Budget in eine Data Protection-Lösung fließen oder doch lieber in eine Erweiterung der Ressourcen des Security-Teams? Doch dies sind nicht nur Fragen nach der Priorisierung von Investitionen, sondern oft steht dahinter die viel allgemeinere Frage nach dem Sinn der Ausgaben. Viele Unternehmen investieren zu wenig, weil ihnen entweder die Effektivität gewisser Lösungsansätze nicht bekannt ist oder andererseits die Gefahrenlage falsch eingeschätzt wird. Wieder andere priorisieren falsch und investieren zu viel an ungeeigneter Stelle, während das Geld in anderen Bereichen dringend benötigt wird. Die Möglichkeiten explodieren, die Zahl der Anbieter wird unüberschaubar und Entscheider verlieren nicht selten den Überblick über ihre ausufernde und komplex-gewachsene Sicherheits-Architektur. Ein erster Schritt zum Erfolg ist dabei die Überlegung, welches Resultat im Fokus der IT-Sicherheitsinvestition stehen soll, um darauf aufbauend die richtigen Entscheidungen zu treffen. Denn es gehört Mut dazu, gewachsene Infrastrukturen in Frage zu stellen und sie gegebenenfalls durch moderne Ansätze zu ersetzen.Eine funktionierende Cyber-Resilienz ist unumgänglichUnd schließlich ist auch das Thema Resilienz derzeit allgegenwärtig. Mit der zunehmenden Komplexität von Cyberbedrohungen wird die Fähigkeit zur schnellen Reaktion auf erfolgte Angriffe ebenso wichtig wie deren Abwehr, wie die jüngste Studie von&nbsp;Zscaler „Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative“ belegt. Denn in den nächsten zwölf Monaten rechnen 63 Prozent der deutschen IT-Entscheider mit einem Cyber-Angriff. Unternehmen setzen verstärkt auf resiliente Architekturen, die Cyberangriffe nicht nur abwehren, sondern sich auch selbstständig anpassen können. Zero Trust-Ansätze und kontinuierliche Überwachung aller Datenströme sind dabei ebenso wichtig wie Risikomanagement und Risk Hunting oder adaptive Maßnahmen, um auf ein sich wandelndes Umfeld zu reagieren. Security hat in der Vergangenheit viel überwacht und reagiert. Jetzt ist es an der Zeit, den Fokus auf proaktive Maßnahmen auszuweiten. Wie sehen moderne Strategien aus, Vorsorge mit Reaktionsfähigkeiten auf unvermeidbare Angriffe zu kombinieren? Wie können erfolgte Angriffe erkannt und deren Auswirkungen abgefedert werden durch eine automatisierte Reaktion? Risikomanagement, Breach Prediction- und Deception-Technologien sind nur einige Lösungsansätze für eine funktionierende Resilienz, bei der die Infrastruktur auch bei erfolgten Angriffen zurück federt, ohne Schaden zu nehmen.&nbsp;Die größte deutsche IT-Fachkonferenz bietet Raum, diese und weitere Themen gemeinsam mit Experten und Expertinnen aus den verschiedensten Branchen auf Augenhöhe zu diskutieren. Zscaler präsentiert gemeinsam mit Kunden Cloud-basierte Sicherheitsstrategien in folgenden Vorträgen:Das Panel „Security als Teil der IT-Transformation und Basis für Resilienz: Mehrwert für das Business schaffen, Innovation sichern“ mit Kevin Schwarz findet am Mittwoch, den 19. Februar von 14:30 bis 15:15 Uhr im Raum „Spiegelsaal/Bühne 2“ statt.Der CIO-Roundtable „Die perfekte Balance – Was ist das optimale IT Sicherheitsniveau?“ mit Christoph Schuhwerk findet am Donnerstag, den 20. Februar von 16:20 bis 17:05 Uhr im Raum „Speicherstadt 2“ statt.Alle weiteren Informationen sind auf der Webseite der&nbsp;Hamburger IT-Strategietage zu finden.]]></description>
            <dc:creator>Kevin Schwarz (Principal, Transformation Strategy)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilient by Design: From reactive incident response to proactive cyber strategies]]></title>
            <link>https://www.zscaler.com/de/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</link>
            <guid>https://www.zscaler.com/de/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</guid>
            <pubDate>Tue, 11 Feb 2025 08:00:05 GMT</pubDate>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
    </channel>
</rss>