<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>Press Releases</title>
        <link>https://www.zscaler.com/press/feeds</link>
        <description>Press releases and announcements, featuring Zscaler.</description>
        <lastBuildDate>Thu, 05 Mar 2026 10:59:33 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>en</language>
        <item>
            <title><![CDATA[Zscaler Partners with Singtel Singapore to Bring Zero Trust Security to Cellular IoT/OT Across Southeast Asia with Zscaler Cellular]]></title>
            <link>https://www.zscaler.com/press/zscaler-partners-singtel-singapore-bring-zero-trust-security-cellular-iot-ot-across-southeast</link>
            <guid>https://www.zscaler.com/press/zscaler-partners-singtel-singapore-bring-zero-trust-security-cellular-iot-ot-across-southeast</guid>
            <pubDate>Tue, 03 Mar 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc., the leader in cloud security, today signed a Memorandum of Understanding (MoU) with Singtel Singapore at Mobile World Congress to make Zscaler Cellular available to enterprises across Southeast Asia (SEA) through Singtel’s connectivity and regional reach. This collaboration helps customers secure SIM-connected IoT/OT devices at even greater speed, reduce operational risk and downtime, and extend Zero Trust protections to non-human identities and emerging cellular use cases such as connected vehicles – without requiring device agents or major changes to carrier infrastructure.As cellular IoT/OT adoption accelerates – powering smart infrastructure, industrial modernization, healthcare devices, transportation systems, and connected fleets – the attack surface expands rapidly. This growth often outpaces the visibility and control provided by traditional security approaches built primarily for users and workloads. Momentum in the region underscores the urgency: the&nbsp;SEA IoT market is projected to grow at a CAGR of ~20–23% through 2030, fueling rapid expansion of connected environments that need stronger, more scalable security controls. This risk is already playing out in Singapore, which ranks second globally for observed IoT attacks, accounting for 5.3% of the worldwide total. With more always-on devices, limited patchability, and increased reliance on third-party connectivity, organizations face rising risks of disruption, data exposure, and operational downtime – especially in critical environments where resilience is non-negotiable.The Zscaler-Singtel partnership combines trusted connectivity with cloud-delivered security controls to help customers secure SIM-connected devices and data with a Zero Trust approach. Zscaler Cellular is designed to be quick to roll out, with simple provisioning and minimal changes to existing carrier infrastructure. It lets teams set fine-grained security policies for each cellular device using identifiers like IP address, device international mobile equipment identity (IMEI), or SIM international mobile subscriber identity (SIM IMSI), while providing centralized visibility into all cellular traffic. By isolating devices from one another and enforcing least-privilege access, Zscaler Cellular helps reduce the risk of lateral movement, eliminate the need to manage device agents, and provide organizations secure cellular-connected use cases across industrial IoT, retail, mobility, and critical infrastructure.“The next phase of Zero Trust is protecting all&nbsp; devices that run critical services—not just users and applications,”&nbsp;said&nbsp;Nathan Howe, Senior Vice President, Innovation &amp; Product Management at Zscaler. “At Mobile World Congress, we’re thrilled to partner with Singtel Singapore and sign an MoU that extends the power of the Zscaler Zero Trust Exchange™ to cellular-connected IoT and OT across Singapore and ASEAN. By stopping threats inline and strengthening visibility and segmentation, we’re enabling organizations to operate securely at scale as they connect more devices and modernize critical environments.”“As enterprises expand their use of mobile, IoT and operational technologies, they must scale security in tandem with network growth. Our partnership with Zscaler brings together Singtel’s advanced network connectivity with Zero Trust security to help organizations securely connect and protect critical devices at scale. This partnership reinforces our commitment to delivering integrated connectivity and cybersecurity solutions that accelerate our customers’ digital transformation,” said&nbsp;Keith Leong, Chief Customer Officer, Enterprise, Singtel Singapore.To learn more about how Zscaler utilizes Zero Trust to secure SIM-connected IoT/OT devices, please visit the&nbsp;Zscaler Cellular page.Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected establishment and benefits of the Zscaler-Singtel partnership to deliver Zscaler Cellular across Southeast Asia. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully deliver Zscaler Cellular across Southeast Asia with Singtel. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on February 26, 2026, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler, Together With Bharti Airtel, Announce Launch of AI &amp; Cyber Threat Research Center to Advance Cyber Resilience and Trusted AI Adoption]]></title>
            <link>https://www.zscaler.com/press/zscaler-together-bharti-airtel-announce-launch-ai-cyber-threat-research-center-advance-cyber</link>
            <guid>https://www.zscaler.com/press/zscaler-together-bharti-airtel-announce-launch-ai-cyber-threat-research-center-advance-cyber</guid>
            <pubDate>Fri, 20 Feb 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[New Research Center to Strengthen India’s Cyber Resilience, Build Talent Pipelines, and Advance Public-Private CollaborationTo Invite Additional Select Entities to Join the Vital InitiativeNEW DELHI, India, Feb.&nbsp;20, 2026 –&nbsp;Zscaler, Inc., the leader in cloud security, in partnership with Bharti Airtel (Airtel), one of India’s largest telecommunication service providers, today&nbsp;announced the launch of the AI &amp; Cyber Threat Research Center – India. This multi-stakeholder digital initiative is dedicated to advancing national cyber resilience, protecting sectors, industries and assets that are essential to India’s economic and national security, such as telecommunications, banking, and energy, as well as digital users, and accelerating trusted AI adoption across India’s rapidly expanding digital ecosystem.&nbsp;India has long been a key hub for Zscaler’s technology innovation and cyber research, with a significant share of&nbsp;Zscaler’s research talent based in the country. The research center will serve as an expansion of&nbsp;Zscaler’s operations into a national platform for collaboration between the private sector, public sector, academia and the government. The center is designed "In India, For India," with the goal of strengthening the nation's cyber defenses and building a future-ready talent pipeline to support India's progress toward&nbsp;Viksit Bharat and a peaceful, secure, and digitally self-reliant future.India is in the midst of a generational digital transformation, building systems not at enterprise scale, but at population scale across critical sectors – dramatically expanding the national attack surface. At the same time, the threat landscape is evolving at machine speed, with nation state and financially-motivated attackers increasingly leveraging AI to probe, target, and weaponize vulnerabilities in minutes.&nbsp;Zscaler’s research arm, ThreatLabz India, has observed millions of infiltration attempts each month, including notable campaigns such as:Nation-state cyber espionage activity using the theme of regional geopolitical tensions, which attempted to target multiple Indian entities;A surge in attempts to infiltrate India's private and public sectors, with 1.2 million intrusion attempts originating from 20,000 sources targeting 58 Indian digital entities; andAn increase in zero-day exploit attempts aimed at multiple industries in India.&nbsp;As threats grow in sophistication, traditional perimeter-based security models are no longer adequate, and disruptions to essential services can threaten national economic stability – making secure-by-design foundations and a modern architectural shift imperative to protect national digital systems in an increasingly borderless, AI-enabled environment.The objectives of the AI &amp; Cyber Threat Research Center – India are anchored in four strategic pillars:&nbsp;Protect: Deliver real-time, actionable intelligence to strengthen India’s national cyber resilience and digital-first businesses.Remediate: Partner directly with government agencies to neutralize and prevent cyber attacks.Facilitate: Drive the adoption of modern security frameworks, specifically focusing on AI-driven defenses and Zero Trust architecture.Build: Strengthen the cybersecurity talent pipeline through specialized AI and Zero Trust certifications to bridge the national skills gap.&nbsp;As founding members, Zscaler and Airtel will combine the former’s global intelligence with the latter’s local operational reach to create a stronger, faster research-to-response loop for India. Zscaler will deploy a specialized threat research team focused on India. This team will leverage the Zscaler Zero Trust Exchange™ platform, which processes over 500 billion daily transactions, to extract threat intelligence to secure India's public and private sectors. Airtel will contribute deep visibility into IoT and mobile traffic, collaborating with Zscaler to monitor networks and develop new solutions, enabling faster identification of suspicious activity and more effective coordination with ecosystem stakeholders. Looking ahead, additional members from India’s critical public and private sectors will be invited to join the center to expand collaboration and strengthen cyber resilience across India.“At Airtel, our commitment has been to safeguard our customers and the nation’s digital fabric. This partnership with Zscaler marks a significant extension of this commitment that will combine the power of our AI capabilities and deep scale for cybersecurity research to protect the country’s expanding digital ecosystem,” said&nbsp;Gopal Vittal, Executive Vice-Chairman, Bharti Airtel. “We will focus on addressing challenges unique to our market to build a safer, more resilient digital India where every citizen and enterprise can connect and thrive with confidence. Our research-backed preventive mechanism will also encourage peaceful and secure engagements on digital platforms.”“India is building digital systems at an unmatched population scale. You cannot secure this level of ambition with legacy firewalls and VPNs that were never designed for a hyper-connected world. It demands a modern Zero Trust architecture that is secure-by-design,” said&nbsp;Jay Chaudhry, CEO, Chairman, and Founder, Zscaler. “With the AI &amp; Cyber Threat Research Center – India, we&nbsp;will bring the full power of the world’s largest security cloud to protect the nation’s public and private sectors. By combining actionable intelligence from over 500 billion daily transactions with local expertise, we aren't just building readiness; we are empowering a new generation of defenders to stay ahead of the adversary."For more information, visit the&nbsp;AI &amp; Cyber Threat Research Center and download the eBook,&nbsp;Securing Digital India Against Cyber Threats, for deeper insights and practical guidance on India’s evolving cyber threat landscape.&nbsp;Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected&nbsp;establishment and benefits of the AI &amp; Cyber Threat Research Center – India. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully&nbsp;establish and operationalize the AI &amp; Cyber Threat Research Center – India. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on November 25, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.About Bharti AirtelHeadquartered in India, Airtel is a global communications solutions provider with over 600 million customers in 15 countries across India and Africa. The company also has its presence in Bangladesh and Sri Lanka through its associate entities. The company ranks amongst the top three mobile operators globally and its networks cover over two billion people. Airtel is India’s largest integrated communications solutions provider and the second largest mobile operator in Africa. Airtel’s retail portfolio includes high-speed 4G/5G mobile, Wi-Fi (FTTH+ FWA) that promises speeds up to 1 Gbps with convergence across linear and on-demand entertainment, video streaming services, digital payments and financial services. For enterprise customers, Airtel offers a gamut of solutions that includes secure connectivity, cloud and data centre services, cyber security, IoT, and cloud-based communication. Airtel’s digital arm – Xtelify, empowers telcos globally to leverage the power of AI, data and technology to accelerate their digital transformation and drive growth. Xtelify also offers Airtel Cloud in India enabling enterprises with a sovereign, telco-grade cloud platform that guarantees secure migration, effortless scaling, lower costs and no vendor lock-ins. Within its diversified portfolio, Airtel also offers passive infrastructure services through its subsidiary Indus Tower Ltd. For more details visit&nbsp;www.airtel.com&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Acquires SquareX to Advance Zero Trust Browser Security for the AI Era]]></title>
            <link>https://www.zscaler.com/press/zscaler-acquires-squarex</link>
            <guid>https://www.zscaler.com/press/zscaler-acquires-squarex</guid>
            <pubDate>Thu, 05 Feb 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it has acquired SquareX, to further extend Zero Trust capabilities into the browser for the AI era. This acquisition will help redefine browser security, allowing organizations to embed lightweight extensions into any browser, providing increased security and eliminating the need for third-party browsers.Organizations have been using vulnerability-prone Remote Access Virtual Private Networks (VPN) or expensive Virtual Desktop Infrastructure (VDI) to extend productivity to unmanaged, third-party devices. Zscaler disrupted the market with the introduction of Zscaler Private AccessTM (ZPATM), leading a global shift away from traditional VPNs and toward a true Zero Trust architecture. By utilizing a lightweight agent, Zscaler continues to deliver unmatched security and critical device posture checks to tens of millions of users, setting the standard for secure enterprise connectivity.As organizations' needs evolve and cyberthreats increase, Zscaler is advancing its Zero Trust leadership to address the emerging requirements of the modern, distributed enterprise. With SquareX, Zscaler will extend the same level of uncompromising security to unmanaged devices, enabling organizations to secure users within their preferred browser - such as Google Chrome and Microsoft Edge - without the need for a full agent or the limitations of a separate, third-party browser.“Enterprises have historically relied on legacy VPNs and VDIs, but these technologies are fundamentally flawed and laden with security risks,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “With SquareX, Zscaler is deepening our Zero Trust ExchangeTM Platform’s capabilities in standard browsers, such as Google Chrome or Microsoft Edge, to stop threats without having to deploy a third-party enterprise browser. Zscaler continues to set the standard as we evolve into an increasingly powerful platform for global enterprise security.”“By integrating with Zscaler, we will enable organizations to secure SaaS and private applications across any device - managed or BYOD - without compromising productivity,” said Vivek Ramachandran, founder of SquareX. “This approach allows IT leaders to replace expensive, insecure legacy access tools with precise Zero Trust policies that protect data and AI interactions based on an organization’s specific risk profile.”The acquisition closed on February 5, 2026. Terms of the transaction have not been disclosed.You can find more information via the blog:Zscaler Acquires SquareXFollow Zscaler on LinkedIn,Instagram, and X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits of the proposed acquisition to Zscaler and its customers and plans regarding SquareX’s capabilities. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate SquareX’s technology into our cloud platform, the potential impact of the acquisition to the existing SquareX business and the retention of SquareX employees. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on November 25, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Unveils New Innovations to Secure Enterprise AI Adoption]]></title>
            <link>https://www.zscaler.com/press/zscaler-unveils-new-innovations-secure-enterprise-ai-adoption</link>
            <guid>https://www.zscaler.com/press/zscaler-unveils-new-innovations-secure-enterprise-ai-adoption</guid>
            <pubDate>Tue, 27 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced new AI security innovations designed to empower enterprises to secure the fast growing use of AI, while maintaining visibility, control, and governance. As organizations today adopt generative AI and prepare for the use of agentic AI, they face rising risk of cyberattacks and data loss because traditional security models weren’t designed to secure AI. The Zscaler AI Security Suite eliminates the trade-off between AI innovation and risk, providing the visibility and controls needed to securely build, deploy, and govern AI at enterprise scale.Most enterprises lack a complete view of the AI applications and services in use, including GenAI tools, AI development environments, embedded AI in SaaS, models, agents, and underlying infrastructure. This limits their ability to understand AI exposure, data access, and risk. Organizations also struggle to control access and enforce policy as AI traffic shifts to new protocols and non-human patterns that traditional security tools cannot govern. In fact, in the ThreatLabz 2026 AI Security Report published today, Zscaler experts found most enterprise AI systems could be compromised in just 16 minutes with critical flaws uncovered in 100% of systems analyzed.Zscaler’s new innovations provide enterprises with a comprehensive inventory and dependency map of their AI footprint, spanning GenAI services, embedded AI SaaS, AI development environments, MCP servers, agents, models, and AI infrastructure. The solution correlates asset discovery, access relationships, data lineage, runtime behavior, and security posture, enabling organizations to adopt AI faster while maintaining security, governance, and control.“AI is changing how businesses operate, but traditional security approaches were not designed to secure AI," said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “Business leaders are looking for a comprehensive solution - not more point products. At Zscaler, we’re providing the security necessary for leaders to move forward with confidence and embrace the full spectrum of AI. We aren’t just securing the AI era; we’re accelerating it.”Revolutionizing AI Security Across Three Core Enterprise Use CasesThe new Zscaler AI Security suite addresses enterprise AI security challenges in three critical ways:AI Asset Management gives CISOs, IT, and governance teams a comprehensive inventory of AI apps, models, infrastructure, agents, and usage, helping them detect shadow AI, understand what data AI touches, and prioritize risk by providing visibility on AI usage.&nbsp;Secure Access to AI helps security architects and IT admins safely enable sanctioned AI services like developer tools and AI models with Zero Trust controls, inline inspection, and prompt classification to reduce data loss and misuse while preserving productivity.&nbsp;&nbsp;Secure AI Infrastructure and Apps equips application teams to protect AI development across the lifecycle with automated AI red teaming, prompt hardening, runtime guardrails and continuous risk posture assessment from build to runtime.&nbsp;“The industry is currently struggling with a massive visibility gap because AI traffic doesn't behave like traditional web traffic, said Zeus Kerravala, Principal Analyst, ZK Research. "It’s faster, non-human, and uses protocols that most security stacks simply can't see. What’s important here isn't just another security tool; it’s the shift toward a Zero Trust framework that actually understands the context of an AI conversation. Without this level of deep inspection and automated guardrails, enterprises are essentially flying blind into the most significant technology transition of our lifetime."Governance, Partnerships, and Supplemental ControlsTo simplify global AI adoption, Zscaler now supports&nbsp;customers in aligning their security programs with frameworks such as&nbsp;the NIST AI Risk Management Framework and the EU AI Act. This governance is paired with CXO-level reporting on GenAI usage and deep ecosystem integrations with OpenAI, Anthropic, AWS, Microsoft, and Google. Additionally, Zscaler is expanding its defense capabilities with a new MCP gateway for secure automation and AI Deception to divert and neutralize model-based attacks.To dive deeper into the latest advancements to the Zscaler AI Security suite, please read the following blog -&nbsp;Accelerating AI Initiatives with Zero Trust.&nbsp;Follow Zscaler on&nbsp;LinkedIn,&nbsp;X, and&nbsp;Instagram.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected benefits of the expansion of our AI Security portfolio and the solutions and protections offered to our customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate new features of our product offerings into our AI Security portfolio and the business impact additional offerings may have for our customers. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on November 25, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler 2026 AI Threat Report: 83% Year-over-Year Surge in AI Activity Creates Growing Oversight Gap for Global Enterprises]]></title>
            <link>https://www.zscaler.com/press/zscaler-2026-ai-threat-report-83-year-over-year-surge-ai-activity-creates-growing-oversight</link>
            <guid>https://www.zscaler.com/press/zscaler-2026-ai-threat-report-83-year-over-year-surge-ai-activity-creates-growing-oversight</guid>
            <pubDate>Tue, 27 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[News Highlights&nbsp;AI adoption is accelerating faster than enterprise oversight. Despite 200% AI usage growth in key sectors, many organizations still lack a basic inventory of AI models and embedded AI features, elevating AI governance to a board-level priority.Enterprise AI systems are vulnerable at machine speed. Zscaler experts found most enterprise AI systems could be compromised in just 16 minutes, with critical flaws uncovered in 100% of systems analyzed.AI capabilities are proliferating rapidly across the enterprise. The number of applications driving AI/ML transactions quadrupled year-over-year to more than 3,400, increasing complexity and reducing centralized visibility.AI is becoming a high-volume conduit for sensitive enterprise data. Data transfers to AI/ML applications surged 93%, totaling more than 18,000 terabytes which paints an expanding target on AI platforms for cybercriminals across the globe.&nbsp;&nbsp;San Jose, Calif., January 27, 2026 –&nbsp;Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security,&nbsp;today released the findings of the ThreatLabz 2026 AI Security Report, warning that enterprises are unprepared for the next wave of AI‑driven cyber risk, even as AI becomes embedded in business operations. Based on an analysis of nearly one trillion AI/ML transactions across the Zscaler Zero Trust Exchange™ platform between January and December of 2025, the research shows that enterprises are reaching a tipping point where AI has transitioned from a productivity tool to a primary vector for autonomous, machine-speed conflict."AI is no longer just a productivity tool but a primary vector for autonomous, machine-speed attacks by both crimeware and nation-state," said Deepen Desai, EVP Cybersecurity at Zscaler. "In the age of Agentic AI, an intrusion can move from discovery to lateral movement to data theft in minutes, rendering traditional defenses obsolete. To win this race, organizations must fight AI with AI by deploying an intelligent Zero Trust architecture that shuts down the potential paths for the attackers of all kinds."AI in the Enterprise: Emerging Trends and Security Issues from the 2026 ReportAI Adoption is Outpacing OversightAI usage now spans every business function, yet in many sectors, adoption is scaling faster than the C-suite can manage. Finance &amp; Insurance remains the most AI-driven sector by volume, accounting for 23% of all AI/ML traffic, while the Technology and Education sectors recorded explosive year-over-year growth in transactions — 202% and 184%, respectively. Despite this, Zscaler research reveals a critical gap: many organizations still lack a basic inventory of active AI models and embedded features, leaving them unaware of exactly where sensitive data is exposed.As Agentic AI Looms, 100% of Enterprise AI Systems Found Vulnerable to Breach at Machine SpeedWhile AI security discussions often focus on hypothetical future threats, Zscaler’s red team testing revealed a more immediate reality: when enterprise AI systems are tested under real adversarial conditions, they break almost immediately. In controlled scans, critical vulnerabilities surfaced in minutes, not hours. The median time to first critical failure was just 16 minutes, with 90% of systems compromised in under 90 minutes. In the most extreme case, the defense was bypassed in a single second.As more evidence of AI‑driven attacks by cybercriminals and nation‑state espionage groups is uncovered, ThreatLabz warns autonomous and semi‑autonomous “agentic” AI will increasingly automate cyberattacks, with AI agents assuming responsibility for reconnaissance, exploitation, and lateral movement. Defenders must assume that attacks can scale and adapt at machine speed, not human speed.&nbsp;AI Usage Surges 4x, Fueling New Enterprise Supply Chain Vulnerabilities=ThreatLabz found AI/ML activity increased 83% year-over-year across an ecosystem of more than 3,400 applications. This rapid adoption has left many organizations with no clear map of the AI models interacting with their data or the supply chains behind them. ThreatLabz warns that this AI supply chain is now a primary target, as weaknesses in common model files allow attackers to move laterally into core business systems.Unmanaged Embedded AI Creates Critical Data Exposure RisksAn enormous volume of activity is happening on "standalone AI" such as ChatGPT, which logged 115 billion transactions in 2025 and Codeium, which logged 42 billion transactions. “Embedded AI,” AI capabilities built directly into everyday enterprise SaaS applications and platforms, have become one of the fastest growing sources of unmanaged risk. Because these features are often active by default and escape detection by legacy security filters, they create a back door for sensitive corporate data to flow into AI models without oversight. Among all platforms analyzed, Atlassian was a leading source of embedded AI activity, reflecting widespread use of AI-powered features within its core platforms, such as Jira and Confluence.18,000 TB of Data Poured into AI: A New Target for Machine-Speed AttacksIn 2025, enterprise data transfers to AI/ML applications surged to 18,033 terabytes (TB)—a 93% year-over-year increase and roughly equivalent to 3.6 billion digital photos. The massive influx has transformed tools like Grammarly (3,615 TB) and ChatGPT (2,021 TB) into the world’s most concentrated repositories of corporate intelligence.&nbsp;The scale of this risk is quantified by 410 million Data Loss Prevention (DLP) policy violations tied to ChatGPT alone, including attempts to share Social Security numbers, source code, and medical records. These findings signal that AI governance has transitioned from a policy discussion to an immediate operational necessity. ThreatLabz warns that as these repositories grow, they are becoming high-priority targets for cyber espionage.&nbsp;Modernize AI security with Zero TrustLegacy firewalls and VPNs fail in dynamic AI environments, creating visibility gaps and security blind spots. Zscaler replaces this complexity with AI-native security, providing the real-time visibility and guardrails needed to innovate safely.The Zscaler Zero Trust Exchange helps organizations stay ahead of AI-powered threats by:&nbsp;Eliminating Attack Surfaces: Enforce continuous verification and least-privileged access.Blocking AI Threats: Inspect all traffic, including encrypted data, to stop threats in real time.Protecting Data Everywhere: Automatically discover and classify sensitive data across all environments.Neutralizing Lateral Movement: Use AI-powered segmentation to contain attackers.Optimizing Responses: Leverage predictive AI to accelerate security operations and posture management.Master the new rules of AI security and download the full reportRapidly accelerating AI adoption demands a new approach to protection. To stay ahead of evolving risks, download the full&nbsp;ThreatLabz 2026 AI Security Report for comprehensive threat analysis and actionable best practices.&nbsp;Follow Zscaler on&nbsp;LinkedIn,&nbsp;X, and&nbsp;Instagram.Research MethodologyThe report draws on an analysis of 989.3 billion AI/ML transactions&nbsp; generated by ~9K organizations across the Zscaler Zero Trust Exchange™ from January 2025–December 2025, providing a grounded view into how AI is actually being used (and restricted) across global environments.Correction (February 2026): The year-over-year percentage change in AI/ML transaction volume has been updated to reflect a revised calculation.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Expands in Malaysia With New Data Center in Kuala Lumpur]]></title>
            <link>https://www.zscaler.com/press/zscaler-expands-malaysia-new-data-center-kuala-lumpur</link>
            <guid>https://www.zscaler.com/press/zscaler-expands-malaysia-new-data-center-kuala-lumpur</guid>
            <pubDate>Thu, 22 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc., the leader in cloud security, today announced the launch of a new data center in Kuala Lumpur to deliver greater capacity, performance, and resiliency for customers in Malaysia. As part of Zscaler’s continued investment in Southeast Asia, the new facility is available to all customers in Malaysia and the broader region – complementing the existing Zscaler infrastructure in Kuala Lumpur, with added capabilities and upgraded resilience aligned to modern AI and cloud requirements.“We see public and private sector organizations in Malaysia continuing to modernize applications and infrastructure, ever embracing cloud and AI. With this accelerating shift, the threat landscape and attack surface advances in both volume and sophistication. That makes adopting a zero trust approach more critical than ever, especially as more organizations move beyond legacy private networks, security and governance in a cloud-enabled, connected, mobile-first world,” said Sanjay Yadave, Vice President &amp; Managing Director, Greater Asia at Zscaler. “By expanding our footprint in Kuala Lumpur, we’re strengthening our ability to partner with public and private sector customers across Malaysia to secure, simplify, and transform their operations with local performance, scale, and resilience across all major clouds.”As Malaysian organizations accelerate digitization, hybrid work, and Enterprise AI, cyber threats are growing in volume and sophistication. Zscaler’s new Kuala Lumpur data center delivers lower latency and a better digital experience while enforcing granular, identity-based zero trust security to reduce risk and limit attack blast radius, and supports data residency preferences and high availability for public and private sectors. The site now hosts the full Zscaler Zero Trust ExchangeTM platform, including Zscaler Internet AccessTM (ZIATM) and Zscaler Private AccessTM (ZPATM), to provide fast, secure access to internet, SaaS, AI, and private applications without placing users on the network. Built to Zscaler’s latest global standards, it meets the highest resilience requirements with diverse network paths, redundant power and cooling, and a high-availability design to maximize uptime and business continuity. A significant boost in compute capacity further enhances performance for users and applications across Malaysia and the broader region while supporting long-term growth.In support of Malaysia’s national cybersecurity objectives and National Critical Information Infrastructure (NCII) protection priorities, the new Kuala Lumpur data center brings the Zscaler Zero Trust Exchange platform closer to users and applications, enhancing performance, resilience, and security. The Zscaler platform meets rigorous&nbsp;global security benchmarks and has achieved multiple third-party assessments worldwide. As part of Zscaler’s commitment to sustainability, the new facility joins Zscaler’s global footprint of 160+ data centers, all powered by renewable energy.“Malaysia’s digital economy depends on resilient, secure infrastructure that protects critical national information assets while enabling innovation,” said YB Datuk Wilson Ugak Anak Kumbong, Deputy Minister, Ministry of Digital Malaysia. “We welcome industry investments that align with our national cybersecurity objectives and NCII priorities. Local, high-performance capabilities, like Zscaler’s new Kuala Lumpur point of presence, improve user experience, and help organizations adopt AI and cloud confidently.”&nbsp;To learn how Zscaler safeguards the use of AI and secures your enterprise AI applications, from development through deployment, register for our upcoming launch webinar on 3 February 2026&nbsp;here.&nbsp;Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Appoints Dr. Swamy Kocherlakota as Executive Vice President of Agentic AI Security Engineering]]></title>
            <link>https://www.zscaler.com/press/zscaler-appoints-dr-swamy-kocherlakota-executive-vice-president-agentic-ai-security</link>
            <guid>https://www.zscaler.com/press/zscaler-appoints-dr-swamy-kocherlakota-executive-vice-president-agentic-ai-security</guid>
            <pubDate>Mon, 12 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the appointment of Dr. Swamy Kocherlakota as Executive Vice President of Agentic AI Security Engineering to address a fundamental shift: AI is evolving from chat bots into autonomous agents that function as both users and applications. This shift breaks legacy security models and introduces a new spectrum of advanced threats. Dr. Kocherlakota will lead Zscaler’s strategy to solve the problem at the architectural level, where traditional vendors attempt to patch these risks with isolated tools."Agentic AI is the future of how organizations will work, creating enormous opportunities for automation and scale, but also introducing significant new risks that legacy security tools cannot address," said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. "Swamy brings a unique depth of experience in shaping AI strategies within complex, highly regulated environments. Under his leadership, we plan to accelerate the expansion of our Zero Trust architecture to secure human and machine identities alike, ensuring Zscaler remains the industry's most trusted security platform for the AI era."A 30-year technology veteran who previously led AI strategy at a global financial analytics leader, Kocherlakota plans to accelerate the expansion of the Zscaler Zero Trust Exchange™, the platform trusted by 45% of the Fortune 500 organizations, to secure agentic workflows. Under his leadership, Zscaler plans to innovate deeper in the AI stack, providing the foundation AI developers and business leaders need to protect against the complex new spectrum of cyberthreats.&nbsp;"Zscaler defined and pioneered Zero Trust security for users and applications and I believe it’s the only company with the data and architecture required to secure the AI era," said Swamy Kocherlakota, Executive Vice President of Agentic AI Engineering, Zscaler. "I look forward to helping our customers accelerate this transformation, enabling them to empower their business leaders while rigorously protecting their intellectual property, brand, and data."Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected benefits of the AI Security. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully execute on AI security. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on November 25, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Appoints Sunil Frida as Chief Marketing Officer to Drive Next Phase of Global Growth]]></title>
            <link>https://www.zscaler.com/press/zscaler-appoints-sunil-frida-chief-marketing-officer-drive-next-phase-global-growth</link>
            <guid>https://www.zscaler.com/press/zscaler-appoints-sunil-frida-chief-marketing-officer-drive-next-phase-global-growth</guid>
            <pubDate>Mon, 05 Jan 2026 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the appointment of Sunil Frida as Chief Marketing Officer (CMO). In this role, Frida will lead Zscaler’s global marketing organization, overseeing product marketing, brand strategy, demand generation, corporate communications, and go-to-market execution to further accelerate the company’s leadership in the Zero Trust and AI security market.Frida joins Zscaler with over two decades of experience scaling high-growth SaaS and cybersecurity organizations. Most recently, he served as a senior marketing executive at Crowdstrike, where he was instrumental in expanding market share, strengthening global brand presence, and supporting the company’s rapid growth at scale as a public cybersecurity leader.&nbsp;“As enterprises continue to modernize their IT environments and securely adopt AI, Zero Trust has become foundational to digital transformation,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “Sunil is a proven, visionary marketing leader with deep data, AI and cybersecurity expertise and a strong track record of building world-class teams. His ability to translate complex innovation into clear customer value will be critical as we scale Zscaler’s platform and drive our next phase of growth.”The appointment comes at a time of significant momentum for Zscaler, as the company continues to innovate and expand its AI-powered Zero Trust Exchange™ platform to help organizations move away from legacy network security architectures and securely connect users, devices, workloads, and applications across hybrid and cloud environments."Zscaler is the pioneer of Zero Trust, and I have long admired the company’s clarity of vision, relentless focus on customer success and pace of innovation," said Sunil Frida. I’m honored to join this outstanding team and look forward to advancing the Zscaler story - helping organizations see how our platform reduces risk and increases agility in a cloud-first, AI-driven world.&nbsp;Prior to his most recent roles, Frida held senior leadership positions at Amazon Web Services and General Electric, where he led product marketing, global campaigns, and international brand initiatives across large-scale enterprise and cloud businesses.&nbsp;&nbsp;Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include statements regarding the anticipated contributions and expected impact of Sunil Frida's appointment as Chief Marketing Officer. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate new leadership, retain key personnel, and execute on our strategic objectives. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on November 25, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Awarded a 2025 AWS Partner Award]]></title>
            <link>https://www.zscaler.com/press/zscaler-awarded-2025-aws-partner-award</link>
            <guid>https://www.zscaler.com/press/zscaler-awarded-2025-aws-partner-award</guid>
            <pubDate>Tue, 02 Dec 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS),, the leader in cloud security, is excited to announce it is a recipient of a 2025 Geography and Global AWS Partner Award, recognizing leaders around the globe that are playing key roles in helping their customers drive innovation and build solutions on Amazon Web Services (AWS). Zscaler is excited to announce it has been named the winner of&nbsp;AWS Marketplace Partner of the Year (NAMER), recognizing the top AWS Marketplace Partners with significant AWS Marketplace transactions.Announced during the Partner Awards Gala at AWS re:Invent 2025, the Geographic and Global AWS Partner Awards recognize a wide range of AWS Partners that have embraced specialization, innovation, and cooperation over the past year. Geo and Global AWS Partner Awards recognize partners whose business models continue to evolve and thrive on AWS as they support their customers. Zscaler’s recognition in this category is a testament to its growth and strong partnership with AWS. By focusing on co-selling, co-innovating, and driving joint success through AWS Marketplace, Zscaler and AWS have achieved record-breaking results, surpassing $1 billion dollars in sales, while empowering customers of all sizes to securely adopt the cloud and address critical use cases, including generative AI workloads, Zero Trust access to SAP, and private applications on AWS.“Zscaler’s partnership with AWS is redefining how businesses harness the power of AI with Zero Trust security at the core,” said Raj Judge, EVP of Corporate Strategy and Board Member, Zscaler. “Winning the AWS Marketplace Partner of the Year (NAMER) award and recently surpassing $1 billion in AWS Marketplace sales reflect the trust AWS customers place in Zscaler to protect what matters most - innovating faster, securing critical workloads, and unlocking the full potential of generative AI. Together, Zscaler and AWS are shaping the future of secure AI innovation for businesses globally, and we are honored to receive this recognition."The Geography and Global AWS Partner Awards included a self-nomination process across several award categories, awarded at both the geographic and global level. All AWS Partners were invited to participate and submit a nomination. Award submissions were reviewed by a third-party, Canalys, and selected with special emphasis placed on customer success use cases.In addition, there were several data-driven award categories, which were evaluated by a unique set of metrics that helped measure AWS Partners’ performance over the past year. Canalys audited the datasets used to ensure that all measurements and calculations were objective and accurate. Finalists represented the top three ranked AWS Partners across each category.The AWS Partner Network (APN)&nbsp;is a global program focused on helping partners innovate, accelerate their journey to the cloud, and take full advantage of the breadth and depth of AWS.&nbsp;Supporting Quotes:“Presidio and Zscaler are redefining how enterprises embrace business transformation through the power of AWS Marketplace," said Jim Finn, Vice President, Cybersecurity Sales, Presidio. "With Zscaler’s leadership in Zero Trust security and AI, and our shared focus on accelerating modernization with AWS,, we are bridging the gap between innovation and execution for our customers. By integrating cutting-edge AI and delivering scalable solutions, Presidio, Zscaler, and AWS are empowering organizations to securely modernize their operations, harness marketplace agility, and achieve transformative business outcomes.”“World Wide Technology (WWT) and Zscaler are transforming how the world’s leading enterprises design and secure scalable architectures for AI on AWS,” said Ashish Upadhyay, AVP Global Cyber Partner Alliance, WWT. “Zscaler’s momentum on AWS Marketplace allows us to co-sell with greater precision and agility, empowering customers to advance Zero Trust adoption and accelerate modernization. Together, we’re delivering solutions that simplify enterprise security, foster innovation, and position organizations to succeed in an AI-driven economy.”Learn more about&nbsp;Zscaler solutions for AWS, read real-world Zscaler customer&nbsp;success stories, and obtain Zscaler solutions in&nbsp;AWS Marketplace today.Connect with us at AWS re:Invent 2025: December 1-5, 2025, Booth #1375 at The Venetian, Las Vegas, NVFollow Zscaler on&nbsp;LinkedIn,&nbsp;X, and&nbsp;Instagram.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Is a Proud Partner In The Microsoft Entra Agent ID Partner Ecosystem]]></title>
            <link>https://www.zscaler.com/press/zscaler-proud-partner-microsoft-entra-agent-id-partner-ecosystem</link>
            <guid>https://www.zscaler.com/press/zscaler-proud-partner-microsoft-entra-agent-id-partner-ecosystem</guid>
            <pubDate>Tue, 18 Nov 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc.&nbsp; the leader in cloud security, today announced its inclusion as an early adoption partner in the Microsoft Entra Agent ID partner ecosystem. Zscaler was selected based on their proven experience with Microsoft technologies, willingness to explore and provide feedback on cutting edge functionality, and relationship with Microsoft.&nbsp;"We enable organizations to adopt AI rapidly,&nbsp; safely, and at scale, while upholding uncompromising Zero Trust security standards,” said Raj Judge, EVP of Corporate Strategy and Board Member, Zscaler. “This integration with Microsoft empowers customers to bring authorized agents into their AI workflows, confident that every request is validated, authorized and governed.”“AI agents are rapidly transforming how organizations operate, collaborate, and innovate, said Alex Simons, Corporate Vice President, Microsoft Entra. “With Microsoft Entra Agent ID, we’re enabling both Microsoft platforms and other agentic platforms to manage, protect and govern agents, giving every agent a first-class identity, robust identity governance, and enterprise-grade protection.&nbsp; We’re privileged to collaborate with Zscaler, who is pioneering new use cases and helping to shape the future of identity-driven AI.”Zscaler is working with Microsoft to shape the development of Microsoft Entra Agent ID, including validating integration scenarios, providing feedback on product development, and advancing API extensibility. As part of the partner ecosystem, Zscaler is integrating across Microsoft’s full Entra Agent services: Agent Registry, Agent ID, and Agent Directory. These innovations help organizations securely onboard, manage, and govern AI agents at scale, delivering seamless authentication, lifecycle management, and policy enforcement for agents across diverse environments. This unlocks new value for customers and supports secure, compliant adoption of AI in the enterprise.&nbsp;Zscaler is committed to delivering seamless interoperability with Microsoft Entra ID for Agents, providing enhanced visibility and simplified policy controls to bolster agent activity management. As part of Zscaler’s ongoing innovation, we’re working to integrate Entra Agent ID as a first-class identity within the Zscaler platform, to support consistent Zero Trust protections across users, applications, and AI agents. This collaboration promotes improved security while minimizing operational complexity for our customers.Follow Zscaler on&nbsp;LinkedIn,&nbsp;X, and&nbsp;Instagram.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected enhancements of Microsoft Entra Agent ID and opportunities for collaboration between Zscaler and Microsoft. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate new features into Microsoft Entra Agent ID and the business impact additional offerings and partnerships may have for our customers. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 11, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.For additional information:&nbsp;To learn more about Microsoft Entra Agent ID, please check out&nbsp;https://aka.ms/blog/entra.Product or service names mentioned herein may be the trademarks of their respective owners.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler ThreatLabz Reveals 67% Jump in Android Malware and 40% of IoT Attacks Target Critical Industries and Hybrid Work]]></title>
            <link>https://www.zscaler.com/press/zscaler-threatlabz-reveals-67-jump-android-malware-and-40-iot-attacks-target-critical</link>
            <guid>https://www.zscaler.com/press/zscaler-threatlabz-reveals-67-jump-android-malware-and-40-iot-attacks-target-critical</guid>
            <pubDate>Wed, 05 Nov 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:Critical infrastructure in the energy sector experienced a 387% increase in attacks compared to the previous yearIndia continues to be the top target for mobile attacks, with 26% of activityThe US remains the top target for IoT attacks, with 54% of activitySan Jose, Calif., Nov. 5, 2025 –&nbsp;Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published the findings of its Zscaler ThreatLabz 2025 Mobile, IoT, and OT Threat Report, outlining how threat actors are leveraging malware attacks and constantly evolving their tactics. The report uncovered hundreds of malicious apps in the Google Play Store that have been downloaded over 40 million times, targeting users that are searching for productivity and workflow apps. Based on Zscaler's mobile telemetry dataset, the ThreatLabz team identified several emerging mobile threats and new malicious activity, providing valuable insights to help enterprises stay ahead of attackers in a mobile-first world.&nbsp;Hundreds of malicious apps downloaded over 40 million timesSimilar to last year, this year we again saw threat actors developing and releasing malicious applications targeting trusted marketplaces and hybrid work environments.&nbsp;The result, which the report reveals is a 67% year-over-year increase in Android malware transactions, reflects&nbsp; the continued risks of spyware and banking malware. ThreatLabz researchers identified 239 such applications hosted on the Google Play Store, which were collectively downloaded 42 million times.A key distribution channel for this malware was the "Tools" category, disguising malicious applications as productivity and workflow tools. This tactic capitalizes on users' trust in functionality-driven applications–a trust that is particularly strong in hybrid and remote work settings where mobile devices are integral to professional tasks.Manufacturing remains a top target for mobile and IoT attacksThreatLabz's analysis of Android attack volumes reveals that the Manufacturing and Energy sectors remain prime targets for cybercriminals due to the potential for significant returns. Notably, the energy sector experienced a substantial 387% increase in attacks compared to the previous year, highlighting an escalating threat to critical infrastructure and greater exploitation of vulnerabilities within these essential industries.In the IoT landscape, the Manufacturing and Transportation sectors continue to be the most frequently targeted verticals. This year, each&nbsp; sector accounted for 20.2% of all observed IoT malware attacks, collectively representing over 40% of total incidents. This marks a shift from 2024, when Manufacturing alone represented 36% of total incidents, followed by Transportation at 14%. This suggests that while Manufacturing remains a critical target, threat actors are increasingly diversifying their efforts across other high-dependency IoT industries.Most prevalent IoT malwareRoughly 40% of blocked transactions are linked to the Mirai family alone, and Mozi has overtaken Gafgyt as the second highest malware family. Together, Mirai, Mozi, and Gafgyt account for roughly 75% of all malicious payloads in IoT environments.Mobile attacks cluster in India, US and Canada; US is the IoT threat epicenter at 54 percentWorldwide, mobile threats have surged, with the majority of these attacks concentrated in three key regions: India, accounting for 26% of all mobile attacks, the United States at 15%, and Canada at 14%. India, in particular, experienced a significant 38% increase in mobile threat attacks compared to the previous year.&nbsp;The top five countries that receive the most mobile malware traffic are:&nbsp;India (26%)United States (15%)Canada (14%)Mexico (5%)South Africa (4%)The report also revealed that the US is both a hub for IoT activity (54.1%) and a primary target for malware attacks. The top five countries that receive the most IoT malware traffic are:United States (54%)Hong Kong (15.%)Germany (6%)India (5%)China (4%)“Attackers are pivoting to areas with maximum impact. We’re seeing a YoY rise of 67% in malware targeting mobile devices and 387% in IoT/OT attacks on energy sectors often hosting critical infrastructure, which is a massive swing,” said Deepen Desai, EVP and Chief Security Officer at Zscaler. “A Zero Trust everywhere approach, combined with AI-powered threat detection, is imperative to reducing the attack surface, limit lateral movement, and provide organizations the defense they need against ever-evolving attacks.”Additional highlights and new findings this yearA new backdoor called Android Void malware has infected 1.6 million Android-based TV boxes, primarily in India and BrazilNew Remote Access Trojan (RAT), Xnotice, was identified for targeting job seekers in the oil and gas industry, particularly in MENAAdware overtook the Joker malware family as the top mobile threat, with a leading 69% of cases, while Joker dropped to 23% of cases, from 38% last yearThreat actors are abandoning card-focused fraud in favor of mobile paymentsDefending against growing IoT, OT and Mobile threatsZscaler Zero Trust Branch delivers comprehensive security and operational efficiency for branch offices, remote sites, and distributed networks, designed for environments that rely heavily on mobile, IoT, cellular IoT, and OT technologies. Using a cloud-native and AI-driven Zero Trust architecture, Zscaler aims to ensure all users, devices, and applications are safeguarded with continuous real-time verification and robust policy enforcement, regardless of their location relative to the traditional network perimeter.Zscaler Cellular offers secure, scalable, and efficient connectivity as a service for IoT and mobile devices that rely on cellular connections. This solution, powered by the Zscaler Zero Trust Exchange™ platform, addresses the growing security challenges posed by billions of IoT devices and mobile endpoints, which traditional security methods often fail to secure effectively. It achieves this by enforcing granular policies, providing centralized visibility, and eliminating attack surfaces for all cellular traffic.Download your copyThe 2025 Mobile, IoT, and OT Threat Report highlights the critical importance of securing mobile endpoints, IoT devices, and OT systems. Access the full report at&nbsp;https://www.zscaler.com/campaign/threatlabz-mobile-iot-ot-report.&nbsp;Research MethodologyMobileThe research methodology for this report includes analysis of mobile transactions and associated cyberthreats based on data collected from the Zscaler cloud between June 2024 and May 2025. The dataset comprises more than 20 million threat-related mobile transactions.IoT/OTThe team focused their research on understanding the distinct attributes and activity of IoT devices via device fingerprinting (DFP) and analyzing the IoT malware threat landscape.Device fingerprinting data from March 2025 to May 2025 included:A complete inventory of devices, including device types and manufacturersThe volume and source of IoT device transactionsThe industries and geographies contributing to IoT trafficIoT malware threat data from June 2024 to May 2025 included:The most active malware familiesThe industries and geographies most targeted by IoT attacksThe top attacked devices]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Secures The Enterprise AI Lifecycle With Acquisition of Innovative AI Security Pioneer SPLX]]></title>
            <link>https://www.zscaler.com/press/zscaler-secures-enterprise-ai-lifecycle-acquisition-innovative-ai-security-pioneer-splx</link>
            <guid>https://www.zscaler.com/press/zscaler-secures-enterprise-ai-lifecycle-acquisition-innovative-ai-security-pioneer-splx</guid>
            <pubDate>Mon, 03 Nov 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it has acquired innovative AI security pioneer SPLX, extending the Zscaler Zero Trust ExchangeTM platform with shift-left AI asset discovery, automated red teaming, and governance, so organizations can secure their AI investments from development through deployment.&nbsp;“Today marks an important step in advancing Zscaler’s role as the trusted partner helping organizations securely adopt AI,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “AI is creating enormous value, but its full potential can only be realized when it can be secured. By combining SPLX’s technology with the intelligence of the Zscaler Zero Trust Exchange and its native data protection that classifies, governs, and prevents loss of sensitive data across prompts, models, and outputs, Zscaler will secure the entire AI lifecycle on one platform. This will strengthen our industry leadership and give customers the confidence to safely embrace AI.”As AI drives record infrastructure investments projected to exceed $250 billion by end of 20251, organizations face a rapidly expanding attack surface and shadow AI sprawl. Continuously evolving models, agents, and large language models (LLMs) require ongoing discovery, risk assessment, and remediation, while AI agents and Model Context Protocol (MCP) servers demand strict guardrails and new techniques to secure data and AI assets across the lifecycle.SPLX’s innovative technology and deep expertise in AI red teaming, asset management, threat inspection, prompt hardening and governance will expand Zscaler’s current capabilities, creating a new, dedicated and natively integrated layer of AI protection within the Zscaler Zero Trust Exchange platform, that includes:&nbsp;AI Asset Discovery and Risk Assessment: Discovery extends beyond public generative AI applications and public clouds to include AI models, workflows, code repositories and RAGs and MCP servers in both public and private deployments.&nbsp;Automated AI Red Teaming and Remediation: From development to production, with 5,000+ purpose-built and domain specific attack simulations to find risks and vulnerabilities, and offer remediation in real time.&nbsp;&nbsp;AI Runtime Guardrails and Prompt Hardening: Expands Zscaler’s current AI Runtime Guardrails that protect sensitive data and block malicious attacks between AI apps and LLMs, as well as agentic workflows, to include deep visibility within development environments and automate Guardrails for risky AI assets.&nbsp;AI Governance and Compliance: Risk mitigation and support for organizations to shift from reactive defense to proactive protection for their valuable AI investments, and comply with governance frameworks.&nbsp;“Zscaler and SPLX share a vision to confront the vast new attack surface created by rapidly expanding AI infrastructure investments,” said Kristian Kamber, CEO and co-founder of SPLX. “By joining forces, we’ll bring our innovation to one of the most trusted security platforms in the world, securing AI innovation at the speed organizations are adopting it.”&nbsp;Source: 1) Goldman Sachs, “Technology in 2025: The Cycle Rolls On” February 2, 2025Follow Zscaler on&nbsp;LinkedIn,&nbsp;Instagram, and&nbsp;X.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected benefits of the proposed acquisition to Zscaler and its customers and plans regarding SPLX’s capabilities. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to Zscaler’s ability to successfully integrate SPLX technology into our cloud platform, the potential impact of the acquisition to the existing SPLX business and the retention of SPLX employees. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 11, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Announces New Innovations for Advanced End-to-End Monitoring, Diagnostics, and Remediation]]></title>
            <link>https://www.zscaler.com/press/zscaler-announces-new-innovations-advanced-end-end-monitoring-diagnostics-and-remediation</link>
            <guid>https://www.zscaler.com/press/zscaler-announces-new-innovations-advanced-end-end-monitoring-diagnostics-and-remediation</guid>
            <pubDate>Wed, 29 Oct 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today unveiled new Zscaler Digital Experience™ (ZDX™) innovations that help enterprises monitor and fix performance issues faster–achieving real-time insights across the internet and endpoint, cutting issue detection by 98%, and resolving issues in minutes to strengthen SLAs and minimize downtime. These enhancements deliver visibility that helps to ensure a seamless Zero Trust experience and optimal productivity for users everywhere.Troubleshooting user issues is complex; isolating the device, network, or application is challenging. Siloed teams and legacy tools severely impact rapid root-cause identification. Industry experts believe this leads to an estimated $400 billion in annual losses from digital downtime. ZDX closes that gap by unifying device, network, and application telemetry to pinpoint root cause fast, cut time to detect and resolve, and keep users productive—all while aligning with Zero Trust.&nbsp;New ZDX innovations:Network Intelligence: Identifies ISP bottlenecks, enabling organizations to leverage Zscaler Internet Access™&nbsp;(ZIA™) to reroute traffic to another Zscaler Zero Trust Exchange™ data center, ensuring fast connectivity and minimizing disruptions that impact user productivity. By rapidly rerouting around ISP disruptions, organizations can significantly enhance end user productivity and reduce issue resolution times from days to minutes.Zscaler Managed Monitoring: Monitors critical SaaS and custom web apps 24/7 with multipath insights from global locations, allowing network operations to detect issues proactively, ensure application providers meet SLAs, and reduce disruptions that impact productivity. This allows organizations to hold ISPs accountable, secure compensation, and negotiate better terms.Device Health Score, System Events, and Remediation: Delivers enterprise-wide visibility into device health and performance, helping organizations proactively address widespread hardware and software issues that affect multiple users, rather than only isolated cases. These new features allow administrators to monitor device health, optimize utilization, and remotely remediate, extending device lifecycles, saving on hardware refresh costs, and minimizing end user disruptions.“ISP disruptions, like the recent Red Sea cable cuts, cause significant outages for businesses and end users alike,” said Dhawal Sharma, EVP of Products, Zscaler. “These innovations give enterprises end-to-end visibility and control to keep users productive, resolve issues in minutes instead of days, and ensure reliable app experiences globally—all while lowering costs by extending device lifecycles and holding service providers accountable.”"The market has shifted from fragmented point solutions to unified security and networking platforms designed to meet the demands of a world that is increasingly dynamic, distributed, and AI-first," said Zeus Kerravala, Principal Analyst at ZK Research. "Zscaler is well-positioned in this transition to meet these demands, leveraging its globally distributed, multi-tenant cloud to consolidate functions and deliver end-to-end visibility. By applying AI across its extensive telemetry, Zscaler's new ZDX innovations further accelerate issue resolution while enhancing user experience—outcomes that isolated tools cannot achieve."To dive deeper into the latest enhancements to ZDX, please read this blog.Follow Zscaler on&nbsp;LinkedIn,&nbsp;X, and&nbsp;Instagram.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to&nbsp;our management. These forward-looking statements include the expected benefits of new enhancements to our ZDX product offerings and the business opportunities they provide to our customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate new features into our ZDX offerings and the business impact additional offerings may have for our customers. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 11, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Unveils World Class FedRAMP Moderate International Data Centers and Modernized Government Experience to Accelerate Mission Readiness]]></title>
            <link>https://www.zscaler.com/press/zscaler-unveils-world-class-fedramp-moderate-international-data-centers-and-modernized</link>
            <guid>https://www.zscaler.com/press/zscaler-unveils-world-class-fedramp-moderate-international-data-centers-and-modernized</guid>
            <pubDate>Tue, 09 Sep 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc., the leader in cloud security, today announced sweeping upcoming advancements for U.S. Federal Civilian and Department of Defense (DoD) agencies, including next-generation Federal Administration experience and FedRAMP Moderate and High Authorized Data Centers. These upcoming innovations address the government’s urgent modernization demands while fortifying national security against increasingly sophisticated cyber threats.The new capabilities—powered by Zidentity, Experience Center, Data Fabric for Security, and OneAPI—will begin rolling out over the next few months and bring near-full commercial parity to federal deployments, breaking down the historical gap between public and private sector capabilities. U.S. Government agencies and contractors will operate more efficiently domestically and overseas, with improved productivity and increased security posture, while also lowering total cost of ownership. The Data Fabric for Security will drive unified security operations, accelerating agencies’ abilities to identify security gaps, detect and contain attacks, and streamline remediation and investigations.Addressing Today’s Federal Cybersecurity ImperativesFederal Civilian and DoD agencies face accelerating timelines to adopt Zero Trust, reduce operational costs, and eliminate aging infrastructure. Zscaler’s expanded FedRAMP data centers enable over one million mission owners across hundreds of Federal organizations to:Increase Productivity and Lower Costs: Modernize administrative operations to remove complexity, streamline workflows, and reduce reliance on legacy tools.Modernize to Commercial Innovation: Access advanced capabilities and features comparable to those enjoyed by private-sector—adapted to meet federal compliance frameworks and mission requirements.Unify User Experience and Integration: Deliver a seamless, intuitive experience across all platforms and tools, helping to ensure consistent and efficient mission operations.Strengthen Cyber Resilience: Meet and exceed the Office of Management and Budget (OMB) and DoD Zero Trust objectives while defending against nation-state and insider threats.Enhance Mission Readiness: Deploy secure, high-performance cloud capabilities globally to meet dynamic mission needs.FedRAMP Mod International Expansion DCs: Expanded international access to FedRAMP Moderate-certified data centers, now available in Zurich with Singapore and São Paulo coming soon.&nbsp;“As federal agencies embrace transformative technologies, ensuring robust data protection remains a top priority,” said a major government healthcare agency. “With Zscaler’s innovative advancements in Enhanced Data Loss Prevention (EDLP), Generative AI protection, and Zero Trust Browser, we’re able to safeguard sensitive information more effectively than ever before. These solutions empower us to efficiently leverage modern capabilities while adhering to the principles of zero trust, maintaining the integrity and security of the critical data entrusted to us, and reinforcing our commitment to protecting the privacy of patients and stakeholders alike.”“The mission of protecting the nation demands speed, resilience, and innovation equal to the threats we face,” said Drew Schnabel, Zscaler Vice President, Government Solutions. “By delivering a fully modernized federal admin experience, Zscaler is closing the technology gap between the public and private sectors. Federal and DoD agencies can now operate with the agility of leading commercial enterprises—while meeting the highest standards of security, compliance, and mission assurance.”]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Completes 2024 IRAP Assessment, Demonstrates Enhanced Security and Governance Maturity]]></title>
            <link>https://www.zscaler.com/press/zscaler-completes-2024-irap-assessment-demonstrates-enhanced-security-and-governance-maturity</link>
            <guid>https://www.zscaler.com/press/zscaler-completes-2024-irap-assessment-demonstrates-enhanced-security-and-governance-maturity</guid>
            <pubDate>Wed, 27 Aug 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc., the leader in cloud security, announced that it has successfully completed the 2024 Information Security Registered Assessors Program (IRAP) assessment in Australia for its Zscaler Zero Trust Exchange™ platform. The evaluation focused on compliance with the Australian Government's December 2024 Information Security Manual (ISM), as well as relevant IRAP and Australian Cyber Security Centre (ACSC) guidelines.The IRAP assessment reviewed Zscaler's security controls across key areas, including governance, platform infrastructure, data protection, and shared responsibility. Notably, it showcased Zscaler’s advancements in zero trust architecture and governance while highlighting the company’s continued investments and improvements in security maturity.The new assessment demonstrates a stronger alignment between Zscaler’s solution offerings with the “Protected” level ISM controls – underscoring the company’s robust commitment and ability to protect Australian organisations with trusted, cloud-native security solutions.The IRAP assessment reflects Zscaler’s dedication to aligning with stringent Australian government security standards. These efforts are designed to ensure that public sector and enterprise customers have confidence in deploying Zscaler’s Zero Trust Exchange platform as they strengthen cyber defenses and help achieve enhanced compliance.“The successful completion of the IRAP 2024 assessment reinforces Zscaler’s dedication to helping Australian organisations adopt innovative security measures that meet the highest standards of compliance and trust," said Eric Swift, Vice President &amp; Managing Director, Zscaler Australia and New Zealand. "With the rapid evolution of digital transformation across sectors like government, healthcare, and finance, this milestone demonstrates our commitment to delivering a secure, zero trust-powered platform that enables organisations to confidently scale their operations and protect sensitive data without compromise."For more information on the IRAP assessment, please visit Australian Government: Build Citizen Trust page.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and CrowdStrike Expand Partnership to Strengthen AI-Driven Security Operations]]></title>
            <link>https://www.zscaler.com/press/zscaler-and-crowdstrike-expand-partnership-strengthen-ai-driven-security-operations</link>
            <guid>https://www.zscaler.com/press/zscaler-and-crowdstrike-expand-partnership-strengthen-ai-driven-security-operations</guid>
            <pubDate>Wed, 20 Aug 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced an expanded partnership between Red Canary, a Zscaler company, and strategic partner&nbsp;CrowdStrike to deliver enhanced protection across endpoints, users, and workloads. Together, Zscaler and Red Canary are delivering a seamless path forward for customers migrating from legacy endpoint products to CrowdStrike's Falcon platform. By integrating the Zscaler Zero Trust Exchange™ platform, the AI-native CrowdStrike Falcon® platform, and Red Canary’s agentic-AI driven security operations platform, customers gain a multi-layered defense against threats. This powerful combination delivers enriched user and endpoint context, enabling lightning-fast responses to stop and neutralize threats.Red Canary's agentic-AI driven managed detection and response (MDR) further leverages deep endpoint context from CrowdStrike’s Falcon platform and will be enhanced by the combined power of rich user context from the Zscaler Zero Trust Exchange platform to improve threat detection accuracy and response time.&nbsp;Organizations can modernize their security by replacing multiple legacy point products with a cloud-native architecture that features AI-powered detection, integrates with Zscaler, and is delivered through Red Canary’s security operations platform. This solution replaces outdated Endpoint Detection and Response tools and fragmented security stacks, providing enhanced protection through automated workflows and integrated responses across endpoint, identity, and network – all within a unified solution.“Zscaler and CrowdStrike share a vision to enable secure digital transformation with uncompromising protection across every layer of the enterprise,” said Raj Judge, Board Member and EVP of Corporate Strategy at Zscaler. “By expanding our partnership with CrowdStrike through Red Canary, we are accelerating security operations with advanced AI-powered automation, best-of-breed technologies, and a shared commitment to putting our customers first.”This collaboration builds on a deep, strategic, and successful multi-year partnership between Zscaler and CrowdStrike. As a preferred partner in the Red Canary security operations ecosystem, CrowdStrike strengthens Red Canary’s ability to provide greater flexibility and control&nbsp;–&nbsp;helping customers optimize their security investments and empowering partners to deliver robust managed SOC services. The joint offering enhances partner-delivered MDR services and unlocks new opportunities across the shared ecosystem.“Organizations are moving away from legacy, point product endpoint vendors in search of platform outcomes and elite protection,” said Daniel Bernard, Chief Business Officer at CrowdStrike. “By expanding our partnership with Red Canary and Zscaler, we’re delivering world-class security operations powered by the Falcon platform, Red Canary’s agentic-AI managed endpoint expertise, and Zscaler’s cloud-native zero trust capabilities. Together, we’re helping customers standardize their security architectures, stopping breaches with real-time threat detection, lightning-fast response, and the confidence that comes with the AI-native Falcon platform.”“We’re fundamentally transforming the security operations landscape by bringing together three undisputed leaders in cybersecurity that raises the bar for security outcomes,” said Brian Beyer, Co-founder and President of Red Canary, a Zscaler Company. “Our customers are experiencing dramatic improvements in threat detection accuracy, response times, and operational efficiency – proving that when you bring together the best technologies and expertise, you deliver exceptional outcomes.”&nbsp;Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits and impacts of the proposed partnership to Zscaler and its customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to Zscaler’s ability to successfully integrate Red Canary technology into our cloud platform.Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Completes Acquisition of Red Canary to Accelerate Innovations in Agentic AI-driven Security Operations]]></title>
            <link>https://www.zscaler.com/press/zscaler-completes-acquisition-red-canary-accelerate-innovations-agentic-ai-driven-security</link>
            <guid>https://www.zscaler.com/press/zscaler-completes-acquisition-red-canary-accelerate-innovations-agentic-ai-driven-security</guid>
            <pubDate>Fri, 01 Aug 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it has completed its acquisition of Red Canary. Together, the companies will deliver unified Security Operations, combining sophisticated exposure management with agentic AI-driven threat management.&nbsp;To ensure continuity for its customers, Red Canary will initially operate as a separate business unit within Zscaler. It will benefit from Zscaler's scale and resources while continuing to innovate its advanced Security Operations Center (SOC) capabilities. Zscaler will integrate Red Canary’s agentic AI technology with its Data Fabric for Security to deliver one of the industry’s most comprehensive SOC solutions—enabling customers to run their own SOCs more efficiently and allowing partners to offer powerful managed SOC services based on this foundation.“We’re delighted to officially welcome Red Canary to the Zscaler family,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “By combining Red Canary’s domain expertise in advanced SOC operations with detections, signals, and context from 500 billion daily transactions in the Zscaler Zero Trust ExchangeTM&nbsp;platform, we will deliver solutions that help customers strengthen their cyber defenses and efficiently advance their security operations. Following the successful integration, Zscaler will offer the industry’s most robust security platform that combines the power of Zero Trust with automated security operations, and provides protection that spans communications, exposure management, and threat detection, investigation, and response.”Zscaler’s security operations solutions streamline detection and remediation of exposures and threats. The 10 years of threat intelligence Red Canary has amassed, along with its automated runbooks and agentic AI operations, will yield combined solutions that enable organizations to confidently detect, triage, investigate, and respond to cyber threats faster and with greater precision.“This is a massive step forward in our mission to improve security operations, not just for our customers, but for the entire cybersecurity community,” said Brian Beyer, CEO of Red Canary. “As part of Zscaler, we’re bringing together Red Canary’s proven AI-powered threat detection and deep security operations expertise with Zscaler’s leading zero trust platform. Together, we will empower customers and partners to find and stop threats faster—dramatically reducing investigation and response times. By simplifying and unifying security operations, we’re setting a new standard for protecting against threats in an ever-changing landscape."Following the close of the acquisition, Red Canary will be branded as Red Canary, a Zscaler company.&nbsp;Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits and impacts of the proposed acquisition&nbsp;to Zscaler and its customers and plans regarding Red Canary’s capabilities. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to Zscaler’s ability to successfully integrate Red Canary technology into our cloud platform, the potential impact of the acquisition to the existing Red Canary business and the retention of Red Canary’s employees.Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Ransomware Surges as Attempts Spike 146% Amid Aggressive Extortion Tactics]]></title>
            <link>https://www.zscaler.com/press/ransomware-surges-attempts-spike-146-amid-aggressive-extortion-tactics</link>
            <guid>https://www.zscaler.com/press/ransomware-surges-attempts-spike-146-amid-aggressive-extortion-tactics</guid>
            <pubDate>Tue, 29 Jul 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:Ransomware attacks blocked by the Zscaler cloud rose 146%, the sharpest spike observed in the past three years.Public extortion cases jumped by 70%&nbsp;based on data leak site analysis.Data exfiltration volumes increased 92%.Manufacturing, Technology, and Healthcare were the top targeted industries, and the Oil &amp; Gas sector experienced a 935% increase in attacks.Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published its annual Zscaler ThreatLabz 2025 Ransomware Report. The report examines the latest trends shaping the ransomware threat landscape, revealing how attacks are adapting and escalating. It highlights the most targeted sectors and regions, profiles the most active ransomware families, analyzes shifting attack methodologies, and provides actionable recommendations to help organizations strengthen their defenses. ThreatLabz’s findings underscore the critical importance of organizations adopting a comprehensive Zero Trust Everywhere strategy. This approach is essential to prevent ransomware and other malicious threats from lateral movement and compromising sensitive user data, applications, and information.“Ransomware tactics continue to evolve, with the growing shift toward extortion over encryption as a clear example," said Deepen Desai, EVP Cybersecurity, Zscaler. "GenAI is also increasingly becoming part of the ransomware threat actor's playbook, enabling more targeted and efficient attacks. As threats advance, security measures must keep pace. The Zscaler Zero Trust Exchange™ platform empowers organizations to shrink their attack surface, identify and block initial compromise threats, prevent lateral movement, and stop data exfiltration to shut down extortion events before they happen."Data Demand Fuels Steady Attack GrowthRansomware attacks are intensifying at an alarming rate, with attempted attacks blocked in the Zscaler cloud up 146% year-over-year. This escalation reflects a strategic shift: ransomware groups are increasingly prioritizing extortion over encryption. Accordingly, the report details a 92% increase in the total volume of exfiltrated data by 10 major ransomware groups in the past year, rising from 123 TB to 238 TB. This emphasis on data theft—and the threat of exposure—allows attackers to exert greater pressure on victims, amplifying the impact of ransomware on organizations globally.Industries Under SiegeCybercriminals continue to focus on the high-stakes environments of the Manufacturing (1,063 attacks), Technology (922), and Healthcare (672) sectors, making them the most frequently hit by ransomware over the past year. These industries are particularly vulnerable due to the potential for operational disruption, the sensitivity of stolen data, and the associated risks of reputational damage and regulatory fallout.The Oil &amp; Gas sector has seen a staggering increase in ransomware attacks, spiking over 900% year-over-year. This surge is likely a result of increased automation of systems that control critical infrastructure, including drilling rigs and pipelines, expanding the sector’s attack surface, coupled with outdated security practices.United States Is the Target of Half of All Ransomware AttacksLeak site data highlights a distinct geographic disparity, with victims in the United States accounting for 50% of ransomware attacks, significantly outpacing Canada (5%) and the United Kingdom (4%). Ransomware attacks in the U.S. more than doubled to 3,671, exceeding the combined total number of attacks reported across all other countries in the top 15 most-targeted countries. This concentration demonstrates how threat actors continue to strategically target digitally concentrated, high-value economies.Ransomware Groups Driving the SurgeSeveral highly active groups continued to dominate the ransomware ecosystem, with RansomHub leading the pack, claiming the highest number of publicly named victims at 833. Akira and Clop have both moved up in the ransomware attack rankings since last year. Akira, associated with 520 victims, has steadily expanded its reach through numerous affiliates and initial access brokers. Clop, known for its focus on supply chain attacks, is close behind with 488 victims, employing an effective strategy of exploiting vulnerabilities in commonly used third-party software.Zscaler ThreatLabz identified 34 newly active ransomware families over the past year, bringing the total number tracked to 425 since their research began, and has a public GitHub repository that now hosts 1,018 ransomware notes, with 73 added in the last year.How Zscaler Stops Ransomware with Zero Trust + AIRansomware flourishes in environments with fragmented security, limited visibility, implicit trust, and outdated legacy architectures that amplify risk rather than reduce it. The Zscaler Zero Trust Exchange mitigates these risks by replacing traditional, network-centric models with a cloud-native, AI-driven zero trust architecture, and stops ransomware at every stage of the attack life cycle by:Minimizing the attack surfacePreventing initial compromiseEliminating lateral movementBlocking data exfiltrationAdditional AI-powered ransomware protections from Zscaler include:&nbsp;Breach predictionPhishing and C2 detectionInline sandboxingZero Trust BrowserSegmentationDynamic, risk-based policyData discovery and classificationData loss prevention (DLP) controlsDownload the ReportGet the full ThreatLabz 2025 Ransomware Report to explore how Zscaler ThreatLabz plays an active role in protecting enterprises worldwide.&nbsp;Download today.Research MethodologyThe research methodology for this report is a comprehensive process that uses multiple data sources to identify and track ransomware trends. The ThreatLabz team collected data between April 2024 and April 2025 from sources including the Zscaler global security cloud, and the team’s own analysis of ransomware samples and attack data.About ThreatLabzThreatLabz is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the thousands of organizations using the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team&nbsp;members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabz regularly publishes in-depth analyses of new and emerging threats on its portal,&nbsp;research.zscaler.com.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[IT Resilience Undermined by Lack of Support for Team Wellbeing]]></title>
            <link>https://www.zscaler.com/press/it-resilience-undermined-lack-support-team-wellbeing</link>
            <guid>https://www.zscaler.com/press/it-resilience-undermined-lack-support-team-wellbeing</guid>
            <pubDate>Tue, 15 Jul 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. the leader in cloud security, today released the findings of a research report which reveals that businesses often neglect the personal resilience of their IT and security employees while prioritising technological and operational resilience in the face of growing cyber disruptions. This oversight poses significant risks to operations, from costly downtime to weakened business continuity, at a time when resilience is more critical than ever.The report,&nbsp;‘The Missing Link: Why Investing in the Resilience of Your People is Imperative for Business Continuity’ underscores the human impact of escalating cyber threats and workplace pressures. Many IT professionals report feeling underprepared and unsupported by their organization. Nearly half (47 percent) of the respondents describe themselves as only “somewhat resilient" or worse, while 50 percent believe that their organizations aren’t aware of the day-to-day stressors of major security incidents or disruptive IT events in their working lives. Inferring that this lack of awareness may be conscious, 51 percent don’t believe that their employers care about their personal resilience in the first place.&nbsp;“At Zscaler, we believe that the best cyber resilience strategies feature three key elements: processes, technology, and&nbsp;people,” said James Tucker, Head of CISOs in Residence at Zscaler EMEA. “However, while companies understand only too well how technology and operational processes affect continuity strategies, that last element is frequently overlooked.&nbsp;Everyone’s so focused with technology in continuity planning, but they ignore the human factor, as if it's optional.”&nbsp;With 43 percent of IT professionals saying that their organizations do not recognize the link between personal resilience and overall business resilience, it is unsurprising that little attention is being paid to monitoring personal resilience. According to respondents, only 37 percent of organizations explicitly measure individual resilience through employee surveys, and less than a third (29 percent) measure levels of individual resilience at all.&nbsp;James Tucker continued: “Enterprises not only need reliable cloud based security solutions like the Zero Trust Exchange platform, but must also consider the resilience of the professionals responsible for executing their business resilience strategies. In a volatile environment of relentless cyber threats, continuous workplace disruptions, and the ongoing pressure of digital transformation, personal resilience could become the element that tips the scales of your resilience strategy that makes the difference between success and failure.”&nbsp;Zscaler is on a mission to help enterprises harness the ‘Resilience Factor’, the ability to withstand adversity, adapt operations, and thrive in uncertainty. The report offers a comprehensive roadmap for businesses looking to cultivate resilience not just as a technical imperative, but as a leadership and cultural strength. It also introduces practical tools to help business leaders get started, including an interactive Resilience Superpower Quiz designed to uncover participants’ resilience personality type and superpower.To download the full report, please visit the landing page for&nbsp;‘The Missing Link: Why Investing in the Resilience of Your People is Imperative for Business Continuity’.Methodology:&nbsp;Zscaler and research partner INFUSE reached out to IT and security professionals throughout the EMEA region from February through April 2025. A total of 206 qualified respondents completed the survey.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Extends Zero Trust Platform to Enable Cellular Communications for IoT/OT with simply a SIM card - No VPN or software]]></title>
            <link>https://www.zscaler.com/press/zscaler-extends-zero-trust-platform-enable-cellular-communications-iot-ot-simply-sim-card-no</link>
            <guid>https://www.zscaler.com/press/zscaler-extends-zero-trust-platform-enable-cellular-communications-iot-ot-simply-sim-card-no</guid>
            <pubDate>Tue, 08 Jul 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ:&nbsp;ZS), the leader in cloud security, today extends the AI-powered Zscaler Zero Trust Exchange™ platform with the launch of Zscaler Cellular. This easy to install innovation enables Zero Trust communication for IoT and OT devices using only a cellular SIM card—eliminating the need for additional software or ineffective VPN connections. Zscaler Cellular delivers resilient connectivity by ensuring IoT/OT devices automatically connect to any cellular network globally, while providing zero attack surface by isolating each device on its own private island, with all connections securely routed through the Zscaler platform.“Zscaler pioneered Zero Trust architecture; first with the introduction of Zero Trust for Users, then with Zero Trust for Cloud, followed by Zero Trust for Branch,” said Nathan Howe, Group VP of Emerging Technologies at Zscaler. “With the introduction of Zscaler Cellular, we have extended the power of the Zero Trust Exchange to IoT and OT devices with an easy ‘install and go’ SIM card that securely connects to any cellular network. This innovative solution provides customers with resilient connectivity, isolates each device to remove the attack surface, and ensures all inbound and outbound connections are protected through the Zero Trust Exchange.”As enterprises rapidly deploy IoT/OT devices across diverse environments, traditional firewall and VPN-based security models fail to meet the demands of today’s mobile and distributed organizations, leaving devices exposed to cyber threats. Legacy approaches rely on costly infrastructure that cannot scale and cellular networks by themselves aren’t designed to enforce Zero Trust principals resulting in security blind spots and expanding attack surfaces.“Zscaler Cellular solved our long-standing challenge: how to effectively secure the IoT and mobile devices that we deploy at clients’ and customers’ properties,” said Brian Shelby, Director of IT Infrastructure and Cybersecurity at Maverick Transportation. “We need to operate these tablets, time-tracking devices, and more on sites where we have no control over the networking options provided or the operating environment, and without adding software agents or using remote access VPNs. The solution allowed us to create device-bound authentication through Zscaler. This became our test case, and after equipping kiosks with Zscaler Cellular, our Zero Trust policies are enforced through the Zscaler Cellular Edge. The lines are gone, the employee experience is better, our business is still protected, and we don’t need a software agent or VPN on the device.”Partnering with Telcos to Build a Foundation for Zero Trust Security at ScaleZscaler partners with leading telecommunications companies to bring advanced Zero Trust security to cellular-connected devices. By leveraging the Zscaler Zero Trust Exchange platform with telecom infrastructure, Zscaler Cellular delivers secure, scalable, and seamless connectivity for IoT and OT devices. Through solutions like Zscaler Cellular and Zscaler Cellular Edge, and collaborations with providers such as NTT, enterprises gain managed security services that address the unique challenges of securing distributed, cellular-connected environments. These partnerships ensure organizations can extend Zero Trust principles across global cellular networks, reducing risks and enabling secure digital transformation at scale.“Zscaler Cellular represents a significant advancement in IoT and mobile security,” said Zeus Kerravala, founder and principal analyst, ZK Research. “By leveraging Zero Trust with cellular networks, Zscaler helps eliminate longstanding visibility and control gaps that have plagued enterprises for years. It’s the first solution I’ve seen that brings cloud-scale security to every connected device—with the simplicity of activating a SIM.”AvailabilityZscaler Cellular is available globally in August 2025. The solution is already in use by leading organizations including Sandvik and Maverick Transportation, with additional customers to be announced.Read the blog by Maverick Transportation:&nbsp;Maverick Transportation Puts Zero Trust Cellular in High Gear]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust Security Reduces Cyber Insurance Claims, Preventing up to $465 Billion Annually in Global Economic Loss from Cyber Attacks]]></title>
            <link>https://www.zscaler.com/press/zero-trust-security-reduces-cyber-insurance-claims-preventing-465-billion-annually-global</link>
            <guid>https://www.zscaler.com/press/zero-trust-security-reduces-cyber-insurance-claims-preventing-465-billion-annually-global</guid>
            <pubDate>Tue, 10 Jun 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Nearly a third of the cyber events encompassed by the study potentially could have been prevented&nbsp;if zero trust was deployed, assuming proper cyber security hygiene was also appliedCompanies can limit the risk of a damaging cyber incident by deploying zero trust,&nbsp;potentially&nbsp;reducing insured cyber loss by up to 31%&nbsp;annuallyZscaler, Inc.&nbsp;(NASDAQ: ZS), the leader in cloud security, today published a special report, examining the number of cyber incident insurance claims that potentially could have been avoided if the victim organization had deployed a zero trust architecture. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight-years, which collates cyber incidents from past claims, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero trust security. This adds up to a projected reduction of up to $465 billion in global annual total economic losses.The analysis showed that North America experienced significantly more cyber incidents than the rest of the world during the past eight-year period, experiencing almost four times the amount of European cyber incidents. However, of the total incidents encompassed by the study, the percentage of attacks that potentially could have been mitigated by zero trust was greater internationally, with 41% of European events assessed as potentially preventable through zero trust architecture compared to 31% of events in North America.Scott Stransky, Managing Director and Head of the Marsh McLennan Cyber Risk Intelligence Center, said:&nbsp;“Being able to quantify the cost associated with the lack of zero trust implementation has not been previously investigated. The figure demonstrates the value and benefit of such controls, and highlights the potential benefits of greater cyber hygiene across industries.”The report highlighted that the rise in ransomware incidents, which increased 126% in a single&nbsp; year, has elevated the proportion of events that zero trust could have mitigated globally. From a size perspective, companies with over $1 billion in annual revenue stood to benefit the most from zero trust implementation, with 60% of attacks being deemed mitigable.Stephen Singh, Global Vice President, M&amp;A/Divestiture and Cyber Risk,&nbsp; Zscaler, said:&nbsp;“This report underscores the importance of recognizing Zero Trust as a fundamental cybersecurity control that fortifies cyber hygiene.&nbsp; With the external attack surface identified as a key predictor of potential breaches, adopting Zero Trust and phasing out outdated, high-risk technologies such as firewalls and VPNs, shows a dramatic reduction in risk exposure.”&nbsp;Zero trust significantly increases the security of enterprise IT infrastructure and limits the ability for attackers to cause widespread and costly damage, by requiring continuous verification of every user, application, and device accessing an enterprise.Darin Hurd, CISO at Guaranteed Rate, commented: "We now have independent validation that zero trust offers significant benefits for cyber security practitioners responsible for mitigating business risk -&nbsp; companies that prioritize zero trust investments gain a significant edge as cyber defenders.”Some Zscaler customers are already receiving more favorable policies when partnering with cyber insurance underwriters, using Zscaler to accurately quantify business risk. Risk360, a part of the Zscaler Zero Trust ExchangeTM security platform, is a powerful cyber risk quantification service that streamlines cyber insurance applications and renewals.&nbsp;Built on Zscaler's powerful Data Fabric for Security, Risk 360 provides organizations with a comprehensive and accurate cyber risk profile. With more than 50 million devices using Zscaler agents to collect and share telemetry, the platform provides in-depth visibility across an IT estate, enabling customers to share their zero trust adoption during the underwriting process.Download the&nbsp;full version of the special report&nbsp;now to dive further into the data.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler First to Achieve AWS ISV Competencies in Healthcare, Education, and All Categories of the Relaunched Government Category]]></title>
            <link>https://www.zscaler.com/press/zscaler-first-achieve-aws-isv-competencies-healthcare-education-and-all-categories-relaunched</link>
            <guid>https://www.zscaler.com/press/zscaler-first-achieve-aws-isv-competencies-healthcare-education-and-all-categories-relaunched</guid>
            <pubDate>Mon, 09 Jun 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it is the first Independent Software Vendor (ISV) to earn the Healthcare ISV Competency, Education ISV Competency, and all three subcategories of the newly relaunched Amazon Web Services (AWS) Government Competency, which includes National Security &amp; Defense, Public Safety, and Citizen Services.This milestone recognizes&nbsp;Zscaler as an AWS partner with demonstrated expertise in delivering high-quality solutions that help government agencies and public sector institutions meet mandates, reduce costs, drive efficiencies, and boost innovation. Earning these new AWS Competency badges reaffirms Zscaler’s commitment to helping government, education, and healthcare institutions modernize effectively while maintaining the highest standards of security and performance.&nbsp;“Whether protecting students from online threats, enabling healthcare organizations to deliver better patient care, or supporting governments in securing their most sensitive data, these competencies demonstrate the depth of solutions Zscaler offers to AWS’ public sector customers globally,” said Peter Amirkhan, Senior Vice President, Public Sector, Zscaler. “The rigid evaluation process behind these badges highlights the breadth of our capabilities and our unwavering commitment to excellence. Earning all three Public Sector Competency badges takes our long-standing relationship with AWS to the next level, solidifying our role in delivering trusted, innovative solutions for education, healthcare, and government customers around the world.”&nbsp;This announcement also signals Zscaler’s growing momentum in emerging technologies. As part of its ongoing partnership with AWS,&nbsp;Zscaler is expanding efforts in Generative AI adoption and supporting the activation of Sovereign Cloud regions, further helping public sector organizations address evolving security, compliance, and innovation needs.&nbsp;Through this achievement, AWS and Zscaler together offer best of breed solutions to tackle the [some of the/many of the] toughest challenges facing the public sector, such as critical infrastructure protection. Public sector agencies can now more confidently leverage Zscaler’s validated capabilities to advance mission goals and accelerate digital transformation without compromising security or compliance.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Unveils Cutting-Edge AI Innovations to Stop Attacks, Protect Sensitive Data, and Enable Businesses to Embrace AI Securely]]></title>
            <link>https://www.zscaler.com/press/zscaler-unveils-cutting-edge-ai-innovations-stop-attacks-protect-sensitive-data-and-enable</link>
            <guid>https://www.zscaler.com/press/zscaler-unveils-cutting-edge-ai-innovations-stop-attacks-protect-sensitive-data-and-enable</guid>
            <pubDate>Tue, 03 Jun 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced advanced artificial intelligence (AI) security capabilities and new AI-powered innovations to enhance data security and stop cyberattacks. These advancements address critical challenges for businesses adopting AI, including safeguarding proprietary information and maintaining regulatory compliance.As organizations adapt to the era of artificial intelligence, Zscaler is enabling businesses to adopt advanced AI technologies securely and at scale. The Zscaler platform securely connects users, devices, and data across distributed environments, leveraging the world’s largest inline security cloud—processing over 500 trillion security signals every day. This unparalleled real-world telemetry powers Zscaler’s AI engines, delivering highly accurate threat detection and effective automated security.Zscaler’s latest AI-focused solutions address the complexities associated with deploying advanced AI tools in large, distributed environments. The new capabilities drive precision, automate threat neutralization, and power frictionless collaboration by harnessing the power of AI to unify users, applications, devices, clouds, and branches.The following solutions—showcased during Zenith Live 2025—are available for Zscaler customers to accelerate secure, AI-driven innovation:AI-powered Data Security Classification:&nbsp;Zscaler’s newest AI-powered data security classification brings human-like intuition to identifying sensitive content, now including more than 200 categories, allowing advanced classifications that find new and unexpected sensitive data beyond traditional regex-based signature detection. As a result, organizations can get very granular data security posture assessment in a fraction of the time.Enhanced Generative AI Protections with Expanded Prompt Visibility: Zscaler delivers greater visibility and control over GenAI applications, including Microsoft CoPilot, by enabling advanced prompt classification and inspection. Organizations can block prompts that violate policies and leverage existing DLP capabilities to safeguard sensitive data and ensure compliance across AI-powered workflows.AI-Powered Segmentation:&nbsp;Enhancements include the first purpose-built user-to-application segmentation AI automation engine to now simplify app management, app grouping and segmentation workflows with user identity built in. This capability significantly accelerates the segmentation workflow to rapidly improve an organization's security posture.Zscaler Digital Experience (ZDX) Network Intelligence: Powered with AI, Network Operations can now instantly benchmark and visualize internet and regional ISP performance, correlating last-mile and intermediate ISP outages with multi-path flow analysis to optimize connections to Zscaler data centers and applications, ensuring greater reliability and improved performance. Additionally, network operations teams can also proactively detect, isolate, and analyze trends for disruptive ISP issues, such as packet loss impacting users, enabling faster remediation through rerouting, and cost savings via better ISP negotiations."Zscaler is redesigning the boundaries of enterprise security by advancing AI-driven innovations that address the complex challenges of today's digital age," said Adam Geller, Chief Product Officer, Zscaler. "With industry-first capabilities like AI-driven threat detection and automated segmentation, we empower organizations to adopt and scale AI responsibly and securely. These advancements not only neutralize emerging threats but accelerate collaboration and operational efficiency, allowing businesses to capitalize on the transformative power of AI with confidence and precision."Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expectations, beliefs, plans, and intentions relating to new innovations Zscaler is developing. Such statements include statements regarding future product capabilities and offerings and expected benefits to Zscaler and its customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including (i) delays and unexpected difficulties and expenses in executing the product capabilities and offerings, (ii) changes in the regulatory landscape related to AI and (iii) uncertainty as to whether future sales will justify the investments in the product capabilities and offerings. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Launches New Solutions to Strengthen and Extend Zero Trust Everywhere]]></title>
            <link>https://www.zscaler.com/press/zscaler-launches-new-solutions-strengthen-and-extend-zero-trust-everywhere</link>
            <guid>https://www.zscaler.com/press/zscaler-launches-new-solutions-strengthen-and-extend-zero-trust-everywhere</guid>
            <pubDate>Tue, 03 Jun 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced a new suite of solutions that enable customers to quickly adopt Zero Trust Everywhere. These innovations extend the reach of true Zero Trust and enable businesses to modernize and scale securely by providing end-to-end segmentation between and inside branches and enhance security across multi-cloud environments.Organizations are increasingly distributed, rapidly adopting IoT, OT, and multi-cloud architectures and grappling with increasing digital complexity. Zscaler has unveiled innovative updates to the Zscaler Zero Trust Exchange™ platform, empowering businesses to extend Zero Trust Everywhere—across users, applications, devices, clouds, and branch locations. These enhancements make an organization’s branches and clouds invisible to bad actors, and eliminate the lateral movement of threats like ransomware within the organization’s network.With its expanded capabilities to strengthen Zero Trust Everywhere, Zscaler is advancing its cybersecurity postures, simplifying security network infrastructure, and making it easier for businesses to scale securely in today’s rapidly changing threat landscape.The following Zero Trust solutions—highlighted at Zenith Live 2025—are now generally available or accessible for select use cases by Zscaler customers.Unified Appliance for&nbsp;Zero Trust Branch:&nbsp;Zscaler’s Zero Trust Branch redefines enterprise security and networking with a unified appliance that secures communications between branches, campuses, and factories, and segments OT and IoT devices within them including legacy OT, with no downtime. The solution also provides newly introduced disposable jumpboxes that enables contractors secure, time-bound access to critical systems. By eliminating the need for firewalls, legacy NAC, cumbersome VLAN configurations and VDI for remote access, organizations can stop lateral threat movement with unparalleled efficacy. This approach not only elevates security, but also dramatically reduces complexity and costs, empowering businesses to modernize and scale faster without compromise. Unified Appliance for Zero Trust Branch is generally available.&nbsp;Zero Trust Gateway for Cloud Workloads:&nbsp;This cloud-native service on AWS enables organizations to secure communications from workload to the internet, and East-West traffic between workloads and VPCs/VNETs, in under 10 minutes without deploying agents or VMs with a Zscaler managed offering. This strengthens security in hybrid and multi-cloud environments, allowing organizations to reduce the attack surface associated with firewalls, and eliminate complexity and secure workload communications. Zero Trust Gateway is generally available.Zscaler Microsegmentation for Cloud Workloads: Zscaler further extends AI-driven segmentation to cloud workloads with newly introduced host-based Microsegmentation service that provides granular host and process level segmentation policies using its AI- powered Segmentation engine for Workloads in public clouds such as AWS and Azure as well as on-premise Data Center based workloads that run on bare metal. Zscaler Workload agent provides process and workload level metrics, traffic flows as well device context, that protects crown jewels against lateral threats and compromise. Zscaler Microsegmentation is generally available.Zero Trust Exchange for B2B:&nbsp;The introduction of B2B Exchange revolutionizes secure collaboration by providing a cutting-edge app-sharing platform for partner organizations, eliminating the need for outdated technologies like MPLS circuits or VPNs that come with complexity and the risk of oversharing. This solution accelerates seamless, secure connections between enterprises, empowering organizations to drive faster, more efficient mergers, acquisitions, and partnerships while safeguarding sensitive data. Zero Trust Exchange for B2B is available for select use cases, with extended capabilities coming soon.&nbsp;&nbsp;"Zscaler's latest innovations for the Zero Trust Exchange truly extends Zero Trust Everywhere beyond users and redefines the enterprise security and networking by seamlessly unifying operations, strengthening threat defenses, and enabling secure connectivity across users, devices, applications, branches, and clouds with better visibility and experience—no matter how complex or distributed the environment,” said Dhawal Sharma, EVP Product Strategy, Zscaler. “With this expanded Zero Trust Everywhere approach, organizations can accelerate security modernization, mitigate risks, and protect data everywhere business happens."Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expectations, beliefs, plans, and intentions relating to new innovations Zscaler is developing. Such statements include statements regarding future product capabilities and offerings and expected benefits to Zscaler and its customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including (i) delays and unexpected difficulties and expenses in executing the product capabilities and offerings and (ii) uncertainty as to whether future sales will justify the investments in the product capabilities and offerings. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Kevin Rubin Joins Zscaler as Chief Financial Officer to Drive Continued Growth]]></title>
            <link>https://www.zscaler.com/press/kevin-rubin-joins-zscaler-chief-financial-officer-drive-continued-growth</link>
            <guid>https://www.zscaler.com/press/kevin-rubin-joins-zscaler-chief-financial-officer-drive-continued-growth</guid>
            <pubDate>Thu, 29 May 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the appointment of Kevin Rubin as Chief Financial Officer. In his role, Rubin will oversee Zscaler’s global finance organization and play a critical role in scaling the company's operations to support its next phase of growth and innovation.Rubin brings a wealth of financial expertise and strategic leadership experience in the technology industry, with a strong track record of driving operational excellence, managing business transformations, and delivering shareholder value. He will succeed Remo Canessa, who announced his intention to retire last year. Canessa will remain with Zscaler until the end of the fiscal year 2025 in an advisory capacity to support the transition."I am thrilled to welcome Kevin to the Zscaler leadership team during this transformative era of growth," said Jay Chaudhry, Chairman and CEO of Zscaler. "As organizations around the globe embrace AI security and Zero Trust Everywhere for their digital transformation journeys, Kevin's exceptional financial expertise, industry depth, and leadership at scale will be pivotal in driving Zscaler towards $5 billion and beyond in Annual Recurring Revenue. His proven CFO experience will be instrumental as we empower businesses to reimagine secure cloud adoption, harness AI-driven innovation, and shape the future of cybersecurity. I look forward to collaborating closely with Kevin to achieve our goals and further strengthen Zscaler’s leadership in the market."Rubin brings over two decades of experience leading finance organizations at high-growth public and private companies. Prior to Zscaler he was CFO at BetterUp, where he guided the company’s financial strategy and operational scale. Before that, Rubin served as CFO at Alteryx, where he was responsible for global financial operations, investor relations, corporate development and ventures, real estate, and workplace services. Rubin led the company's successful IPO, and under his leadership, the company’s Annual Recurring Revenue grew to $1 billion.&nbsp;Previously, Rubin served as CFO at MSC Software, Pictage, DDN Storage and MRV Communications, honing a diverse skill set in financial strategy, operations, compliance, and investor relations.“Zscaler is driving a major paradigm shift in cybersecurity with its unique Zero Trust platform which enables organizations to digitally transform their operations and securely adopt AI for productivity and efficiency gains,” said Kevin Rubin. “I am excited to join such a dynamic and innovative company and look forward to collaborating with the team to advance Zscaler’s mission.”Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the potential impact of the executive appointment to Zscaler's future recurring revenue and ability to grow and scale. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release.Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler to Accelerate Innovation in AI-Powered Security Operations with Acquisition of Red Canary]]></title>
            <link>https://www.zscaler.com/press/zscaler-accelerate-innovation-ai-powered-security-operations-acquisition-red-canary</link>
            <guid>https://www.zscaler.com/press/zscaler-accelerate-innovation-ai-powered-security-operations-acquisition-red-canary</guid>
            <pubDate>Tue, 27 May 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it has signed a definitive agreement to acquire Red Canary, a recognized leader in Managed Detection and Response (MDR). With over 10 years of expertise in security operations (SecOps), Red Canary has enabled its extensive customer base to investigate threats up to 10 times faster with 99.6% accuracy, while streamlining workflows through automated remediation. Combined with Zscaler’s massive amounts of high-quality data—derived from the world's largest security cloud—and global intelligence from its ThreatLabz Security Research team, the combination will deliver a unified, agentic Security Operations Center (SOC) that combines AI-driven workflows with human expertise. These complementary capabilities will redefine how businesses detect, respond to, and mitigate modern cyber threats.“With our innovative AI-powered risk management services like Risk360 and the acquired data fabric technology from Avalor, we are disrupting legacy security operations just like we did with our Zero Trust ExchangeTM platform,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “The proposed acquisition of Red Canary is a natural expansion of our capabilities into managed detection and response and threat intelligence to accelerate our vision of AI-powered SOC of the future. By integrating Red Canary with Zscaler, we will deliver to our customers the power of a fully integrated Zero Trust platform and AI-powered security operations.”Protecting nearly 45% of the Fortune 500 organizations, Zscaler has established over 15 years of leadership operating the world's largest cloud security platform which processes over 500 billion daily transactions. It has leveraged its massive, high-quality data lake to accelerate the development of advanced AI-driven solutions, like Zscaler Digital Experience (ZDX) and Zscaler Exposure Management. A proven innovator in MDR, Red Canary has been recognized as a Leader in the Forrester Wave™: Managed Detection and Response for the third consecutive year and featured in the Gartner® Market Guide for MDR for the seventh year in a row. Within the SOC, Red Canary plays a crucial role by helping security teams automate remediation workflows, resulting in greater efficiency and improved security outcomes.By bringing together Zscaler’s AI-powered Zero Trust platform with Red Canary’s domain expertise in threat detection and response—spanning endpoints, identity, network, and cloud workloads—this transaction is uniquely positioned to address the operator pain points that often lead to missed signals, incomplete threat analysis, and increased vulnerability to undetected threats. The integration of Zscaler and Red Canary will better enable security teams to detect, triage, investigate, and respond to threats with greater speed and efficiency, helping organizations confidently and precisely tackle modern security challenges.“For over 10 years, we’ve protected our customers by combining high-fidelity signals with agentic AI, behavioral analytics, and global threat intelligence—delivering fast, accurate, and high-quality threat detection and response,” said Brian Beyer, CEO of Red Canary. “As part of Zscaler, we will elevate how IT and security teams address the rapidly shifting threat landscape with the strength of our combined technology and expertise. Zscaler’s global scale and reach provide the resources and granular data needed to fuel advanced AI, threat intelligence, and detection engineering, giving us a broader view of adversary behavior while enabling faster innovation across the board. Both companies share a relentless commitment to quality, execution, and delivering exceptional outcomes for our customers.”The acquisition is subject to customary closing conditions, including regulatory approvals, and is expected to close in August 2025.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits and impacts of the proposed acquisition. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate Red Canary technology into our cloud platform and our ability to retain key employees of Red Canary after the acquisition.Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on March 10, 2025, which is available on our website at&nbsp;ir.zscaler.com and on the SEC's website at&nbsp;www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Recognized as a Leader in the 2025 Gartner ® Magic Quadrant™ for Security Service Edge]]></title>
            <link>https://www.zscaler.com/press/zscaler-recognized-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge</link>
            <guid>https://www.zscaler.com/press/zscaler-recognized-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge</guid>
            <pubDate>Fri, 23 May 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced it has been positioned by Gartner, Inc. in the Leaders quadrant of the “2025 Security Service Edge Magic Quadrant.” This year, Zscaler set the bar by excelling beyond all other vendors, placed highest on the ‘Ability to Execute’ axis.SSE enables secure, identity- and policy-driven access for the right users to the appropriate internet resources, SaaS platforms, and private applications. The report calls out key SSE market drivers such as VPN replacement, Zero Trust networking, and SaaS adoption and GenAI security, stating: “Gartner estimates that SaaS is the largest cloud revenue generator and that it will grow at a compound annual rate of over 15% through 2028.”&nbsp;1Leveraging over 15 years of cybersecurity innovation and insights from thousands of CIOs and CISOs, Zscaler enhances this approach with Zero Trust Everywhere. By expanding the SSE platform beyond user access, Zscaler enables organizations to streamline their IT operations through a unified, cloud-native SSE platform designed to safeguard their entire enterprise.“We’re proud to see Gartner recognize Zscaler's position in the Leaders quadrant, reinforcing our mission to help organizations unlock the full potential of their information while driving business performance,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “Being named a Leader in the Magic Quadrant for SSE is a testament to our commitment to delivering a comprehensive, industry-leading SSE platform that safeguards enterprises against today’s rapidly evolving and complex threat landscape. My vision is to extend Zero Trust Everywhere– to users, to branches, to workloads, and IoT/OT devices."A complimentary copy of this 2025 Gartner Magic Quadrant for SSE report can be downloaded&nbsp;here. For additional insights from Zscaler CPO Adam Geller, please read this&nbsp;blog.&nbsp;&nbsp;1&nbsp;Gartner, Magic Quadrant for Security Service Edge, Charlie Winckless, Thomas Lintemuth, Dale Koeppen, Charanpal Bhogal, 20 May 2025.Disclaimer:&nbsp;Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Leads by Example and Achieves DoD’s CMMC Level 2 Certification]]></title>
            <link>https://www.zscaler.com/press/zscaler-leads-example-and-achieves-dod-s-cmmc-level-2-certification</link>
            <guid>https://www.zscaler.com/press/zscaler-leads-example-and-achieves-dod-s-cmmc-level-2-certification</guid>
            <pubDate>Wed, 21 May 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that it has achieved Level 2 certification under the U.S. Department of Defense’s (DoD) Cybersecurity Maturity Model Certification (CMMC) framework. This accomplishment places Zscaler at the forefront of Security SaaS companies attempting to reach this critical milestone, further cementing the company’s leadership role in delivering trusted, compliant, cloud-native Zero Trust cybersecurity solutions protecting government and defense environments.&nbsp;CMMC, developed by the DoD, is a comprehensive framework that ensures the Defense Industrial Base (DIB) can meet stringent cybersecurity standards to safeguard the DoD’s digital supply chain, such as Controlled Unclassified Information (CUI). Achieving CMMC compliance is essential for contractors to demonstrate not only their defense contract eligibility but more importantly their ability to protect sensitive information critical to the U.S. National Defense Strategy (NDS).&nbsp;Zscaler achieved CMMC Level 2 certification by implementing a Zero Trust Architecture, powered by Zscaler Internet Access™ (ZIA™) and Zscaler Private Access™ (ZPA™), both of which are FedRAMP authorized. With this industry-first certification, Zscaler helps customers integrate cybersecurity and compliance seamlessly into their operations, reducing the need to manage disparate systems, accelerating their momentum to meeting CMMC and other compliance requirements.“Compliance is the foundation and the floor, not the ceiling. Considering this, DoD’s CMMC mandate aims to solidify the cybersecurity and compliance foundation for government contractors and their supply chains. Zscaler consolidates, enhances and simplifies these cybersecurity and compliance requirements, helping to expedite CMMC compliance adoption and protect against data exploitation,” &nbsp;said Kumar Selvaraj, Zscaler’s VP of Global Security Compliance.&nbsp;“Zscaler is proud to take a prominent role in achieving CMMC Level 2, providing cloud security innovations that help customers exceed CMMC requirements, which elevate CMMC architectural resilience and performance to easily support everyday use cases while defending against future threats,” Kumar continued. “This accomplishment underscores Zscaler’s commitment to addressing emerging regulatory mandates and dedication to delivering cloud-native trusted cybersecurity solutions (CUI assets) that protect national security interests and propel customers’ digital transformation—in lockstep.”By removing complexity and accelerating readiness, Zscaler empowers customers to maintain competitiveness and compliance in a rapidly changing environment. The certification emphasizes Zscaler’s broader strategy to support the modernization of government cybersecurity, enabling customers to embrace zero trust in a way that is practical, scalable, and aligned with Federal mandates.&nbsp;&nbsp;Zscaler is actively self-assessing its CMMC Level 3 alignment so that Organizations Seeking Assessment (OSAs) this certification can streamline their assessment without disruption to business operations. Additionally, Zscaler’s Digital Experience (ZDX™), Internet (ZIA™) and Private Access (ZPA™) Cloud Service Offerings (CSO) are FedRAMP Moderate and High authorized, so federal and defense customers can embrace the cloud with modern zero trust offerings.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Raj Judge Joins Zscaler’s Board of Directors and as EVP of Corporate Strategy &amp; Ventures]]></title>
            <link>https://www.zscaler.com/press/raj-judge-joins-zscaler-s-board-directors-and-evp-corporate-strategy-ventures</link>
            <guid>https://www.zscaler.com/press/raj-judge-joins-zscaler-s-board-directors-and-evp-corporate-strategy-ventures</guid>
            <pubDate>Wed, 21 May 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, is pleased to announce that Raj Judge has been appointed to the company’s Board of Directors and joined as Executive Vice President of Corporate Strategy and Ventures. In this role, Judge will lead the company’s growth strategy, business development, and venture investment initiatives to drive Zscaler to $5 billion in ARR and beyond.Judge brings over 25 years of experience in the tech legal and venture capital space, having previously served at Wilson Sonsini as Senior Partner and Co-Chair of the firm’s core practice, Emerging Companies and Venture Capital. Throughout his career, he has been instrumental in driving strategic growth, identifying emerging market opportunities, and creating solutions that have led to significant business growth for his clients.“Raj’s deep expertise in corporate strategy and investment, combined with his track record of success, makes him the ideal leader to drive Zscaler’s growth and innovation agenda,” said Jay Chaudhry, Chairman and CEO of Zscaler. “We are excited to welcome Raj to our leadership team and we look forward to the impact he will have on shaping the future of our company.”Judge will be responsible for key growth and investment opportunities as well as forging strategic initiatives. He will work closely with internal and external stakeholders to accelerate innovation and substantially broaden the company’s platform for Zscaler’s customers. The appointment of Judge to the Board further demonstrates the company’s dedication to advancing its corporate strategy and long-term vision.“I am excited to join Zscaler at such a pivotal time in its growth journey,” said Raj. “I look forward to bringing my experience and strategic skills to drive new &nbsp;initiatives and investments that will accelerate its continued success.”Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the potential impact of the executive appointment to Zscaler's future strategic investments and our ability to grow and scale. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on May 29, 2025, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler ThreatLabz Uncovers Surge in AI-Driven Cyberattacks Targeting Critical Business Operations]]></title>
            <link>https://www.zscaler.com/press/zscaler-threatlabz-uncovers-surge-ai-driven-cyberattacks-targeting-critical-business</link>
            <guid>https://www.zscaler.com/press/zscaler-threatlabz-uncovers-surge-ai-driven-cyberattacks-targeting-critical-business</guid>
            <pubDate>Thu, 24 Apr 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:Global phishing is down 20%, but attackers are striking deeper, not wider—targeting IT, HR, finance, and payroll teams with high-impact campaigns.Telegram, Steam, and Facebook are top platforms for phishing – used for both impersonation and malware delivery.Tech support and job scams increase with 159M+ hits in 2024, preying on users across social platforms.Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published its Zscaler ThreatLabz 2025 Phishing Report, analyzing over two billion blocked phishing attempts between January and December 2024 captured by the Zscaler Zero Trust Exchange™, the world’s largest cloud security platform. The annual report exposes how cybercriminals are using Generative AI to launch surgical, targeted attacks against high-impact business functions – and why a Zero Trust + AI defense strategy is mission critical. The report uncovers a shift from high-volume email blasts to targeted, AI-fueled attacks designed to evade defenses and exploit human behavior. It also offers actionable insight to help organizations defend against this evolving threat landscape.“The phishing game has changed. Attackers are using GenAI to create near-flawless lures and even outsmart AI-based defenses,” said Deepen Desai, CSO and Head of Security Research, Zscaler. “Cybercriminals are weaponizing AI to evade detection and manipulate victims, which means organizations must leverage equally advanced AI-powered defenses to outpace these emerging threats. Our research reinforces the importance of adopting a proactive, multi-layered approach—combining robust zero trust architecture with advanced AI-driven phishing prevention—to effectively combat the rapidly evolving threat landscape.”Emerging markets see a surge in phishing activityWhile phishing dropped overall by 20% globally and by nearly 32% in the U.S., due in part to rising email authentication standards, attackers transitioned just as fast, launching more attacks on emerging markets like Brazil, Hong Kong, and the Netherlands, often where digital adoption outpaces security investment. &nbsp;Established targets like India, Germany, and the UK remain under sustained pressure, as threat actors adapt to local patterns and seasonal trends.Community platforms fuel phishing growthPhishing campaigns are increasingly abusing community-based platforms like Facebook, Telegram, Steam, and Instagram – not only spoofing their brands, but using them to distribute malware, mask C2 communications, gather target intel, and carry out social engineering attacks. Meanwhile, tech support scams, where attackers pose as IT support teams to exploit urgency and safety concerns of victims, remain widespread with 159,148,766 hits in 2024.Threat actors capitalize on AI: Phishing-as-a-Service and AI deception on the riseCybercriminals are using GenAI to scale attacks, generate fake websites, and craft deepfake voice, video, and text for social engineering. New scams mimic AI tools – such as resume generators and design platforms – tricking users into handing over credentials or payment data. Critical departments like payroll, finance, and HR are prime targets, along with executives – as they hold the keys to sensitive systems, information, and processes, and can more easily approve fraudulent payments.Cybercriminals are also creating fake “AI assistant” or “AI agent” websites, falsely offering services such as resume generation, graphic design, workflow automation, and more. As AI tools become increasingly integrated into daily life, attackers are capitalizing on the ease of use and trust around AI to drive unsuspecting users to fraudulent sites.Zscaler can help: Defending against AI threats with Zero Trust everywhere + AIAs cybercriminals continue to use GenAI to develop new tactics and deliver more sophisticated attacks, enterprises need to strengthen their defenses against every type of compromise.The Zscaler Zero Trust Exchange protects users, applications, and data across all phases of the attack chain by:Minimizing the attack surfacePreventing initial compromiseEliminating lateral movementShutting down insider threats&nbsp;Stopping data lossZscaler AI-powered offerings add advanced protection by securing public AI use, shielding private AI models, and detecting AI-generated threats.Download the ReportGet the full ThreatLabz 2025 Phishing Report to explore emerging trends and attack vectors. Learn why a Zero Trust + AI approach is critical to staying ahead of today’s phishing threats. Download today.Research MethodologyZscaler ThreatLabz analyzed 2 billion blocked phishing transactions between January–December 2024, exploring various aspects including the top phishing attacks, targeted countries, hosting countries for phishing content, distribution of company types based on server IP addresses, and the top referrers linked to these phishing attacks. Additionally, ThreatLabz tracked and examined notable phishing trends and use cases observed throughout 2024.About ThreatLabzThreatLabz is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the thousands of organizations using the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team&nbsp;members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabz regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Listed in AWS “ICMP” for the US Federal Government]]></title>
            <link>https://www.zscaler.com/press/zscaler-listed-aws-icmp-us-federal-government</link>
            <guid>https://www.zscaler.com/press/zscaler-listed-aws-icmp-us-federal-government</guid>
            <pubDate>Thu, 24 Apr 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that it listed its solutions in the AWS Marketplace for the U.S. Intelligence Community (ICMP). The ICMP is a curated digital catalog from Amazon Web Services (AWS) that makes it easy to discover, purchase, and deploy software packages and applications from vendors that specialize in supporting government customers.Zscaler delivers secure cloud modernization for the federal government through its zero trust solutions in the AWS ICMP, providing seamless access to applications and data. The Zscaler Zero Trust Exchange™ platform is now authorized through the U.S. federal government’s FedRAMP program at High and Moderate levels, helping public sector agencies modernize securely while meeting the highest security standards."Zscaler's inclusion in ICMP marks a significant milestone in our commitment to supporting our nation's federal government," said Drew Schnabel, President and GM of Zscaler US Government Solutions. "By providing the government with greater access to the Zscaler Zero Trust Exchange platform, we are driving the acceleration of secure cloud adoption and empowering agencies with the modern, resilient cybersecurity infrastructure required to outpace an ever-evolving threat landscape."]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler ThreatLabz 2025 VPN Risk Report: Over Half of Organizations Say Security and Compliance Risks Make VPNs Obsolete]]></title>
            <link>https://www.zscaler.com/press/zscaler-threatlabz-2025-vpn-risk-report-over-half-organizations-say-security-and-compliance</link>
            <guid>https://www.zscaler.com/press/zscaler-threatlabz-2025-vpn-risk-report-over-half-organizations-say-security-and-compliance</guid>
            <pubDate>Thu, 10 Apr 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:92% of organizations are concerned about ransomware attacks due to VPN vulnerabilities93% of organizations fear backdoor vulnerabilities from third-party VPN connections81% of organizations are adopting or planning to adopt zero trust within the next yearZscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published the Zscaler ThreatLabz 2025 VPN Risk Report, commissioned by Cybersecurity Insiders, which highlights the widespread security, user experience and operational challenges posed by VPN services. The findings are based on insights from a survey of 600+ IT and security professionals. The results are stark: maintaining security and compliance is the single largest challenge (56%) facing enterprises using VPNs today. Meanwhile, the risks of supply chain attacks and ransomware are top of mind for these companies with 92% of respondents concerned that persistent VPN vulnerabilities will lead to ransomware attacks. These combined risks have culminated in a profound shift in thinking around enterprise VPNs with 65% of organizations planning to replace their VPNs within the year — while 81% plan to implement a zero trust everywhere strategy.Initially built for remote access, VPNs have become a liability for corporate networks, exposing IT assets and sensitive data due to over-privileged access, vulnerabilities, and an ever-growing attack surface. VPN, both physical and virtual, is opposite of Zero Trust as by architecture it brings the remote users as well as attackers on the network. Additionally, VPNs hinder operational efficiency with slow performance, frequent connection issues, and complex maintenance, burdening IT teams and disrupting employee productivity. The report aims to shed light on these concerns with trusted insights from industry peers, while arming enterprises with guidance to enable secure access across today's hybrid work environments.Security and usability concernsSecurity and compliance risks ranked as the top VPN challenges at 54%, highlighting growing concerns that VPNs are inadequate and obsolete for defending against today’s evolving cyber threats. Cybercriminals are now leveraging AI to pinpoint vulnerabilities by using GPT models to run queries focused on identifying weaknesses in VPNs — for instance, performing reconnaissance by simply asking a generative AI chatbot to return all current CVEs for VPN products in use by an enterprise. Tasks that once required weeks or even months can now be accomplished in just minutes.Recently, a foreign cyberespionage group exploited vulnerabilities in a popular VPN, gaining unauthorized access to corporate networks. This incident, one of several in recent months, reinforces how VPN vulnerabilities continue to be a key target in cyberattacks, underscoring the urgent need to transition from legacy security models to a Zero Trust architecture. A staggering 92% of survey respondents said they are concerned about being targeted by ransomware attacks due to unpatched VPN vulnerabilities.“Attackers will increasingly leverage AI for automated reconnaissance, intelligent password spraying, and rapid exploit development, allowing them to compromise VPNs at scale,” said Deepen Desai, CSO at Zscaler. "To address these risks, organizations should shift to a Zero Trust everywhere approach. This approach eliminates the need for internet-exposed assets like VPNs (physical and virtual), while drastically reducing the attack surface and potential impact of breaches. It’s encouraging to see that 81% of organizations are planning to implement Zero Trust within the next year—a critical step in mitigating the security risks posed by legacy technologies like VPNs."The rise of critical, scannable VPN vulnerabilitiesTo understand how attackers exploit vulnerabilities in internet-connected VPN infrastructure, ThreatLabz also analyzed VPN Common Vulnerabilities and Exposures (CVEs) from 2020-2025, based on data from the MITRE CVE Program. In general, vulnerability reporting is a good thing, as rapid vulnerability disclosure and patching helps the entire ecosystem improve cyber hygiene, foster community collaboration, and quickly respond to new vectors of attack. No type of software is immune from vulnerabilities, nor should it be expected to be.Over the sample period, VPN CVEs grew by 82.5% (note that early 2025 data has been removed for this portion of the analysis). In the past year, roughly 60% of the vulnerabilities indicated a high or critical CVSS score — indicating a potentially serious risk to impacted organizations. Moreover, ThreatLabz found that vulnerabilities enabling remote code execution (RCE) were the most prevalent kind, in terms of the impact or capabilities they can grant to attackers. These types of vulnerabilities are typically serious, as they can grant attackers the ability to execute arbitrary code on the system. Put another way, far from being innocuous, the bulk of VPN CVEs are leaving their customers vulnerable to critical exploits that attackers can, and often do, exploit.&nbsp;Unwelcome party guestsVPNs provide broad access following authentication, extending user access to contractors, external partners and vendors. While great in theory connectivity tools, attackers can easily exploit weak or stolen credentials, misconfigurations, and unpatched vulnerabilities to compromise these trusted connections. The report shows, 93% of organizations now worry about backdoor vulnerabilities stemming from third-party access. In February 2024, a financial services company suffered a data breach exposing nearly 20,000 clients' personal information, caused by vulnerabilities in their VPN. This incident highlights how VPNs create exploitable entry points into corporate networks.&nbsp;Out with the old, in with the new - Zero Trust EverywhereLegacy or traditional vendors are attempting to adapt to the evolving landscape by deploying virtual machines in the cloud and labeling them as Zero Trust solutions. Unfortunately, a VPN hosted in the cloud remains, at its core, a VPN and does not adhere to true Zero Trust principles. Illustrating this point, the industry has recently witnessed massive spikes in scanning activity targeting tens of thousands of publicly searchable VPN IP addresses hosted by at least one of the largest security vendors. Historically, this kind of activity has indicated some likelihood that attackers may be preparing to exploit yet-to-be-disclosed vulnerabilities in targeted VPN assets. Case in point: if you are reachable, you are breachable — which is why, from an architectural perspective, cloud-based VPN technology can never achieve true zero trust principles, no matter the branding.The switch to a holistic Zero Trust architecture is rapidly gaining momentum and replacing outdated legacy security tools due to the proven security benefits and efficiency gains for adopting organizations. The report found 81% of organizations are adopting, or planning to adopt, a Zero Trust architecture within the next year and by extending this architecture to users, applications and workloads, enterprises are ensuring that Zero Trust is truly everywhere enabling VPN-free resilient security that:Minimizes the Attack Surface: Replaces network-based access with Zero Trust policies and identity-based controls to secure users and third parties.Blocks Threats: Prevents initial compromise through robust authentication, identity security, and least-privileged Zero Trust Access.Prevents Lateral Movement: Uses Zero Trust segmentation to contain threats and stop unauthorized spread within networks.Enhances Data Security: Enforces context-aware, integrated Zero Trust policies to protect sensitive information.Simplifies Operations: Replaces VPNs with AI-driven security, continuous monitoring, and automated policy enforcement, in addition to uninterrupted access with business continuity.By adopting these best practices, organizations can replace VPN security risks with a robust Zero Trust framework, enabling continuous verification, least-privileged access, and proactive threat prevention.Download the ThreatLabz 2025 VPN Risk ReportDownload the full version of the 2025 VPN Risk Report here for more information about security inefficiencies that highlight the inherent flaws of traditional VPNs, and the need for Zero Trust.Research MethodologyThis report is based on a comprehensive survey of 632 IT and cybersecurity professionals conducted by Cybersecurity Insiders. The study examines VPN security risks, enterprise access trends, and the adoption of zero trust architectures. Respondents include executives, IT security practitioners, and network infrastructure leaders across various industries. The findings provide a data-driven perspective on the decline of VPNs and the shift to zero trust, offering critical insights for organizations modernizing their access security strategies.About ThreatLabzThreatLabz is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the thousands of organizations using the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabz regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Zero Trust Exchange Platform Deployed Across T-Mobile Operations]]></title>
            <link>https://www.zscaler.com/press/zscaler-zero-trust-exchange-platform-deployed-across-t-mobile-operations</link>
            <guid>https://www.zscaler.com/press/zscaler-zero-trust-exchange-platform-deployed-across-t-mobile-operations</guid>
            <pubDate>Tue, 01 Apr 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, collaborated with T-Mobile in late 2023 to rapidly deploy hybrid zero trust throughout its operations. In just three months, T-Mobile implemented the Zscaler Zero Trust Exchange™ AI-powered cloud security platform, which is designed to secure access to applications and the internet, regardless of user location or device. Now, one year later, the roll-out has further secured the Un-carrier’s infrastructure against potential cyber threats and over that time, T-Mobile is retiring its traditional VPNs. By reducing the need for traditional VPNs and providing secure and direct access to applications, T-Mobile’s employees and other team members can access needed resources efficiently and effectively, whether they are in the office, at home or on the go.“As T-Mobile is continually focused on making enhancements to our cybersecurity approach to stay ahead of bad actors, working with Zscaler to roll out these tools is another positive step forward in that mission,” said Jeff Simon, senior vice president and chief security officer, T-Mobile. “Zscaler’s tools help us ensure that only verified and authorized users and devices can securely access the systems they need to do their job — and nothing more. This is critical to significantly reducing the risk of cyber threats.”Modernizing Security with the Zscaler Zero Trust Exchange&nbsp;The Zscaler Zero Trust Exchange platform is designed to secure access to applications and the internet, regardless of user location or device. T-Mobile’s deployment includes:Secure internet access with Zscaler Internet Access™ (ZIA™) to eliminate the need for backhauling, delivering full TLS/SSL traffic inspection and zero-trust access for internet and SaaS applications.Secure private access with Zscaler Private Access™ (ZPA™) to replace traditional VPNs and provide direct access to applications from any location.Advanced threat detection with Zscaler Deception technology to detect and neutralize threats by using decoys and false user paths to lure bad actors away from resources.Optimized User Experience with Zscaler Digital Experience™ (ZDX™) that detects and resolves issues with application connectivity and performance issues that could impact productivity.“The Zscaler Zero Trust Exchange is a cloud native cybersecurity platform built on the concept of zero trust. Following the principle of least-privileged access, the platform establishes trust based on user identity and context — including location, device, application and content — and creates secure, direct user-to-app, app-to-app and machine-to-machine connections,” said Mike Rich, chief revenue officer and president of global sales at Zscaler. “We’re proud that Zscaler reduced T-Mobile’s use of legacy firewalls and VPNs to enhance secure and efficient access to applications and information.”Watch a video from Zscaler and T-Mobile here. For more on the Zscaler Zero Trust Exchange, visit zscaler.com.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[New Zscaler AI Security Report Reveals an Over 3,000% Surge in Enterprise Use of AI/ML Tools]]></title>
            <link>https://www.zscaler.com/press/new-zscaler-ai-security-report-reveals-over-3000-surge-enterprise-use-ai-ml-tools</link>
            <guid>https://www.zscaler.com/press/new-zscaler-ai-security-report-reveals-over-3000-surge-enterprise-use-ai-ml-tools</guid>
            <pubDate>Thu, 20 Mar 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[ChatGPT is the most popular AI/ML application, accounting for nearly half of all AI/ML transactions (45.2%) and is also the most-blocked AI application, followed by Grammarly, and Microsoft Copilot as the second and third most-blocked applications, respectivelyAgentic AI and open-source model DeepSeek are creating new opportunities for threat actors to weaponize AI and automate and scale their attackThe top five countries generating the most AI/ML transactions are the United States, India, United Kingdom, Germany, and JapanThe Finance &amp; Insurance and Manufacturing industries generate the most AI/ML traffic, with 28.4% and 21.6% share of all AI/ML transactions in the Zscaler cloud, respectively, followed by Services (18.5%), Technology (10.1%), Healthcare (9.6%), and Government (4.2%)&nbsp;Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today released the ThreatLabz 2025 AI Security Report, based on insights from more than 536 billion AI transactions processed between February 2024 to December 2024 in the Zscaler Zero Trust Exchange™platform, the largest in-line security cloud,which discovered real-world threat scenarios ranging from AI-enhanced phishing to fake AI platforms. This report also explores recent developments in areas that will undoubtedly influence AI in 2025 and beyond, including agentic AI, the emergence of DeepSeek, and the evolving regulatory landscape.&nbsp;The report reveals a 3,000+% year-over-year growth in enterprise use of AI/ML tools, highlighting the rapid adoption of AI technologies across industries to unlock new levels of productivity, efficiency, and innovation. Enterprises are sending significant volumes of data to AI tools, totaling 3,624 TB, underscoring the extent to which these technologies are integrated into operations. However, this surge in adoption also brings heightened security concerns. Enterprises blocked 59.9% of all AI/ML transactions, signaling enterprise awareness around the potential risks associated with AI/ML tools, including data leakage, unauthorized access, and compliance violations. Threat actors are also increasingly leveraging AI to amplify the sophistication, speed, and impact of attacks—forcing enterprises to rethink their security strategies.&nbsp;“As AI transforms industries, it also creates new and unforeseen security challenges,” said Deepen Desai, Chief Security Officer at Zscaler. “Data is the gold for AI innovation, but it must be handled securely. The Zscaler Zero Trust Exchange platform, powered by AI with over 500 trillion daily signals, provides real-time insights into threats, data, and access patterns—ensuring organizations can harness AI’s transformative capabilities while mitigating its risks. Zero Trust Everywhere is the key to staying ahead in the rapidly evolving threat landscape as cybercriminals look to leverage AI in scaling their attacks.”Key Insights from the ThreatLabz 2025 AI Security ReportChatGPT Dominates AI/ML Transactions, But Security Concerns RemainChatGPT emerged as the most widely used AI/ML application, driving 45.2% of identified global AI/ML transactions in the Zscaler Zero Trust Exchange. However, it was also the most-blocked tool due to enterprises' growing concerns over sensitive data exposure and unsanctioned use. Other most-blocked applications include Grammarly, Microsoft Copilot, QuillBot, and Wordtune, showing broad usage patterns for AI-enhanced content creation and productivity improvements.“We had no visibility into [ChatGPT]. Zscaler was our key solution initially to help us understand who was going to it and what they were uploading.”—Jason Koler, CISO, Eaton Corporation | See the video case studyDeepSeek and Agentic AI: Innovation Meets Escalating ThreatsAI is amplifying cyber risks, with usage of agentic AI and China’s open-source DeepSeek enabling threat actors to scale attacks. So far in 2025, we’ve seen DeepSeek challenge American giants like OpenAI, Anthropic, and Meta, disrupting AI development with strong performance, open access, and low costs. However, such advancements also introduce significant security risks.Geographies Leading AI Adoption: US and India&nbsp;The United States and India generated the highest AI/ML transaction volumes, representing the global shift toward AI-driven innovation. However, these changes aren’t occurring in a vacuum, and organizations in these and other geographies are grappling with increasing challenges like stringent compliance requirements, high implementation costs, and shortage of skilled talent.Finance &amp; Insurance Lead Enterprise AI Traffic by IndustryThe Finance &amp; Insurance sector accounted for 28.4% of all enterprise AI/ML activity, reflecting its &nbsp;widespread adoption, and indicative of the critical functions supported by the industry, such as fraud detection, risk modeling, and customer service automation. Manufacturing was second, accounting for 21.6% of transactions, likely driven by innovations in supply chain optimization and robotics automation. Additional sectors, including Services (18.5%), Technology (10.1%), and Healthcare (9.6%), are also increasing their reliance on AI, while each industry also faces unique security and regulatory challenges posing new risks and possibly impacting the overall rate of adoption.The Zscaler AI Advantage&nbsp;Built on a true zero trust architecture, Zscaler delivers Zero Trust Everywhere, securing user, workload, IoT/OT communication using business policies, not network policies. Zscaler mitigates AI-powered threats by hiding applications and IP addresses from attackers, inspecting all traffic for threats, and ensuring users access only authorized applications—never full networks. This approach minimizes the attack surface, prevents lateral movement, and stops threats before they can cause harm. &nbsp;Zscaler protects its users against today's most sophisticated AI-driven threats by implementing the following:Zero Trust Foundation: Minimize the external attack surface through continuous verification and least-privilege access.&nbsp;Real-time AI Insights: Employ predictive and generative AI &nbsp;to deliver actionable insights that enhance security operations and digital performance.&nbsp;Data Classification: Leverage AI-driven classification to seamlessly detect and safeguard sensitive data across Zscaler’s Data Fabric.Threat Protection: Block AI-enhanced threats through continuous monitoring and response powered by the Zscaler Zero Trust Exchange.App Segmentation: Restrict lateral movement and reduce the internal attack surface with AI-driven, automatic app segmentation.Breach Prediction: Harness the power of Zscaler Breach Predictor that combines the power of generative AI and multi-dimensional predictive models.Cyber Risk Assessments: Leverages AI-generated security reports to continuously optimize your zero trust implementation.Download the Full ThreatLabz 2025 AI Security ReportDownload the full version of the 2025 AI Security Report here for more information about real-world threat scenarios, AI predictions, insights into AI regulations, and AI best practices.&nbsp;MethodologyAnalysis of 536.5 billion total AI and ML transactions in the Zscaler cloud from February 2024 to December 2024. The Zscaler global security cloud processes over 500 trillion daily signals and blocks 9 billion threats and policy violations per day, delivering over 250,000 daily security updates.About ThreatLabzThreatLabz is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the thousands of organizations using the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabz regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Unveils Asset Exposure Management for Faster, More Effective Cyber Risk Reduction]]></title>
            <link>https://www.zscaler.com/press/zscaler-unveils-asset-exposure-management-faster-more-effective-cyber-risk-reduction</link>
            <guid>https://www.zscaler.com/press/zscaler-unveils-asset-exposure-management-faster-more-effective-cyber-risk-reduction</guid>
            <pubDate>Tue, 25 Feb 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the introduction of Zscaler Asset Exposure Management, designed to advance how organizations manage their asset risk, commonly referred to as Cyber Asset Attack Surface Management (CAASM). Serving as a critical foundation for Zscaler's broader Continuous Threat Exposure Management (CTEM) offerings, this innovative solution consolidates and correlates data from a vast array of sources to deliver to organizations a precise inventory of assets and visibility into their security gaps to mitigate cyber risk.Organizations often struggle to maintain an accurate inventory of their assets. As a result, IT and security teams resort to spending hours using spreadsheets to track assets, making it difficult to assess the risks these assets pose and to prioritize remediation efforts. This issue is particularly pressing in regulated industries, such as healthcare and financial services, where non-compliance can result in significant fines.Built on Zscaler's powerful Data Fabric for Security, Zscaler Asset Exposure Management integrates and correlates data from hundreds of sources, including Zscaler’s cloud security platform providing organizations with a comprehensive and accurate inventory of their assets and their risk. Zscaler's Zero Trust Exchange platform processes over 500 billion security transactions daily, offering a comprehensive view of customer assets and associated risks. With more than 50 million devices using Zscaler agents to collect and share telemetry, the platform provides in-depth visibility into assets operating in branches and factories through the Zero Trust Branch solution. Additionally, it delivers insights into workloads in multi-cloud environments via the Zero Trust Cloud solution. This breadth of data delivers more effective security outcomes.Zscaler Asset Exposure Management offers comprehensive asset risk management, enabling organizations to:Create an Accurate Asset Inventory: Aggregate and deduplicate data from multiple sources to provide a comprehensive view of assets and their associated software stacks.Identify Coverage Gaps: Detect assets lacking essential security measures, such as missing Endpoint Detection and Response (EDR) solutions or outdated software versions.Enhance Data Accuracy: Improve data hygiene by automatically updating Configuration Management Databases (CMDB) and resolving data discrepancies across systems.Mitigate Risks: Trigger automated remediation workflows and policy adjustments to restrict access for users associated with risky assets, thereby immediately lowering enterprise risk.Together with Zscaler Risk360 and Unified Vulnerability Management, this new CAASM offering provides customers with a comprehensive solution for more effective exposure management.“Managing the security stack on our endpoints has been a labor-intensive task for our team,” said Mike Melo, CISO of LifeLabs. “Previous CAASM tools lacked the policy management features we needed to pinpoint risky or non-compliant assets. With this new software, we expect to save hundreds of hours of manual work, and because it’s built on the Zscaler Data Fabric for Security, which is already serving our exposure management program, we’ll see value in just a week, with no extra effort required.”“Companies have struggled for decades with the fundamental question of how many assets they actually have and what risk they pose to the business," said Adam Geller, Chief Product Officer, Zscaler. “The unmatched data set of 500 billion daily transactions from the Zscaler platform, combined with data from third-party sources, provides our customers with a unique advantage in identifying asset risk. By aggregating and synthesizing this data for additional context, we deliver more complete insights and empower our customers to make better decisions.”“Zscaler is integrating its own unique telemetry alongside the data aggregated from third-party sources,” said Michelle Abraham, senior research director, Security and Trust at IDC. “The Data Fabric for Security’s ability to synthesize, normalize, and enrich this data brings depth to asset visibility and security insights providing Zscaler with a foundational product for improving organizational cyber hygiene.”To learn more about Zscaler Asset Exposure Management, please visit zscaler.com/ctemlaunch.&nbsp;Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits of the new Zscaler Asset Exposure Management solution to Zscaler’s customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully implement and deploy the Zscaler Asset Exposure Management solution across platforms and to improve efficiency and cost savings for our customers. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on December 5, 2024, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[With 60% of Businesses Anticipating a Cyber Breach in 2025, Organizations  Must Prioritize Resilience Strategies with a Zero Trust Architecture]]></title>
            <link>https://www.zscaler.com/press/60-businesses-anticipating-cyber-breach-2025-organizations-must-prioritize-resilience</link>
            <guid>https://www.zscaler.com/press/60-businesses-anticipating-cyber-breach-2025-organizations-must-prioritize-resilience</guid>
            <pubDate>Tue, 11 Feb 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[60% of organizations expect to experience a significant failure scenario in the next year.94% of IT leaders ‘believe’ their current cyber resilience measures are effective, yet ransomware attacks continue to rise and cost organizations billions of dollars per year.&nbsp;But only 45% say their cyber resilience strategy is up-to-date in preparation for modern attacks in response to the rise of AI.Organizations must more closely examine their ability to respond to advanced cyber breaches, which allow threat actors to access systems, move laterally, and steal sensitive data.A global survey from Zscaler, the leader in cloud security, has revealed a critical disconnect between IT leader confidence in their organization’s ability to weather upcoming failure scenarios like cyberattacks and the effectiveness of current security approaches. According to the survey conducted by Sapio, which incorporated responses from 1,700 IT decision makers across 12 countries, almost half (49%) of IT decision makers believe their IT infrastructure is highly resilient and 94% think their current cyber resilience measures are effective. Contradicting this confidence, two-fifths (40%) of IT leaders haven’t reviewed their cyber resilience strategy in over six months, and only 45% report their strategy is up-to-date in preparation for modern attacks in response to the rise of AI–showing a disconnect between the level of confidence and taking action. With the threat landscape evolving and the devastating impact of ransomware attacks on businesses, organizations must evaluate their ability to respond to and plan for attacks– making it crucial to transition to a zero trust architecture.Cyber resilience requires greater prioritization and urgency from leadership&nbsp;Examining the disconnect between confidence levels and current strategies highlights a lack of investment from organizational leadership as a key friction point. Respondents indicate that a majority of leaders understand the growing importance of having a robust cyber resilience approach, but only a minority (39%) believe it is one of their leaders’ ‘top priorities’. This prioritization is reflected in the amount of budget assigned to cyber resilience strategies, with half of the respondents (49%) agreeing that the level of investment doesn’t meet the escalating need. From a total cost of ownership perspective, this suggests that spending additional funds on a legacy security model that isn’t working requires a new approach which can be accomplished with zero trust.It is also evidenced by the lack of cyber resilience involvement from leadership. For most organizations, the burden of cyber resilience planning falls to IT leaders and their teams. Fewer than half (44%) of IT leaders say they have the CISO, for example, actively participating in any resilience planning. Further evidence of cyber resilience being siloed is the fact that only 36% of IT leaders say their cyber resilience strategy is included within their organization’s overall resilience strategy.“The possibility of a major failure scenario for organizations is not an ‘if’ but ‘when’, as the statistics in our report show,” said Jay Chaudhry, CEO, Chairman and Founder, Zscaler. “It proves the need for proactive resilience to combat and mitigate inevitable incidents before they become a significant issue for business continuity. Proactive resilience is essential to address incidents before they threaten business continuity. Cyber resilience is foundational to overall business resilience, and outdated firewalls and VPNs allow persistent attacks, making a zero trust architecture crucial for defending against advanced threats. Leadership must collaborate with IT teams to develop a strong cyber resilience strategy based on Zero Trust, preparing for and mitigating the impact of sophisticated AI-driven attacks. &nbsp;We call this becoming ‘Resilient by Design’.”Prevention is overprioritized compared to response &amp; recoveryThe majority (60%) of IT leaders believe their organization overly prioritizes prevention – with splits showing that over two fifths (43%) of cyber security strategies and budgets are focused on prevention, at the expense of response or recovery. This suggests that most organizations are not prepared for what would happen if a failure occurred and would struggle to recover business operations as quickly as needed. Even among those organizations focusing their efforts on prevention, fewer than half are deploying each of the following proactive security tools to contain the blast radius of cyberattacks and mitigate further damage: risk hunting (44%), Zero Trust micro segmentation (42%,) and deception technologies (35%).“With the growing threat landscape including AI-based attacks and continued pressure to digitize not likely to abate any time soon, our attack surfaces are still expanding beyond our control. A robust and proactive resilience strategy, underpinned by a zero trust architecture, ensures a foundation that won’t crumble even in the wake of a successful attack, that can be remediated faster”, said James Tucker, Head of EMEA CISOs in Residence at Zscaler. “Therefore organizations need to transform their network and security architecture and adopt a zero trust ‘Resilient by Design’ approach to weather the dangers of a digital future.”A Zero Trust architecture enables a ‘Resilient by Design’ approachTo mitigate cyber resilience risk, organizations should embed visibility and control into their security strategy. Understanding failure scenarios more quickly and thoroughly based on the insights from an AI-powered cloud security platform to mitigate the blast radius of an incident strengthens the resilience posture. This outcome is what Zscaler enables with a ‘Resilient by Design’ approach. Because cyber threats evolve and advance so quickly, Zscaler leverages AI to dynamically adjust access based on changing risk. The Zscaler Zero Trust Exchange reduces risk across all four stages of the attack chain and supports a ‘Resilient by Design’ approach:Minimize the attack surfacePrevent initial compromiseEliminate lateral movementStop data lossThe full survey report &nbsp;‘Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative’ can be downloaded via this link.Zscaler Cyber Resilience Report MethodologyIn December 2024, Zscaler commissioned Sapio Research to conduct a survey of 1,700 IT decision makers (IT leaders) across 12 markets (Australia, France, Germany, India, Italy, Japan, Netherlands, Singapore, Spain, Sweden, UK &amp; Ireland, US). These IT leaders work at companies with 500+ employees and across industries.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Now Offers Natively Integrated Zero Trust Solution for RISE with SAP]]></title>
            <link>https://www.zscaler.com/press/zscaler-now-offers-natively-integrated-zero-trust-solution-rise-sap</link>
            <guid>https://www.zscaler.com/press/zscaler-now-offers-natively-integrated-zero-trust-solution-rise-sap</guid>
            <pubDate>Tue, 28 Jan 2025 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security and an SAP partner, is now offering customers its Zero Trust Network Access (ZTNA) service, natively integrated within RISE with SAP. Zscaler Private Access™ (ZPA™) for SAP, delivered through the Zscaler Zero Trust Exchange™ platform, helps enable SAP customers with on-prem ERP workloads to simplify and de-risk their cloud migration, without the complexity and risk associated with traditional VPNs.As per Zscaler’s 2024 VPN Risk report, 56% of organizations have been targets of cyberattacks exploiting VPN security vulnerabilities in the last year. These incidents underscore the growing imperative to move away from traditional perimeter-based defenses towards a more robust Zero Trust architecture to enable secure access to an organization’s most critical ERP infrastructure.By running ZPA within customers' containerized RISE with SAP cloud environments, Zscaler can deliver native zero trust connectivity to SAP S/4HANA Cloud applications across deployment models, including multi-cloud or hybrid cloud. With this foundation, Zscaler also empowers customers with Zscaler Data Protection for compliance and Digital Experience Monitoring (DEM) with Zscaler Digital Experience™ (ZDX™) for an improved user experience.Businesses that use RISE with SAP can leverage ZPA to benefit from:Secure, Agile Cloud Access: RISE with SAP combines all the components that businesses need to pursue their business transformation strategies securely. With the integration of ZPA within RISE with SAP, customers can eliminate traditional firewalls and VPNs which unlocks cloud agility and improves security and compliance.Natively supported Zero Trust protection: By provisioning Zscaler connectors natively, Zero Trust access is enabled within the RISE with SAP environment, without the need for traditional VPNs. This ensures that customers can run their technology operations in a managed, secure cloud infrastructure with built-in security and data protection.Secure access for workforce and business partners: ZPA delivers seamless client-based and client-less Zero Trust connectivity, ensuring secure, direct access for employees and third parties from anywhere to RISE with SAP applications and resources.&nbsp;Corporate, Customer and GSI Quotes“Customers have been using the Zscaler Zero Trust Exchange to protect their SAP workloads across a large range of SAP applications for years,” said Punit Minocha, EVP, Business Development &amp; Corporate Strategy at Zscaler. “Now, we are launching a solution that natively integrates within RISE with SAP to facilitate the secure migration of workloads to a managed service and provides improved user-friendliness by eliminating the burden of traditional firewalls and VPNs. Customers achieve application modernization while also securing remote access to business-critical applications and therefore facilitating the ‘working from anywhere’ culture that is so important to today’s workforce.”“The integration of Zscaler Private Access with RISE with SAP enables streamlined Zero Trust security across SAP applications, providing secure access for users and partners while supporting compliance and performance, no matter where their workforce, apps or data resides," said Roland Costea, Chief Information Security Office, SAP Enterprise Cloud Services.“Using Zscaler Private Access platform, we can confidently enable secure, remote access to SAP resources while maintaining the flexibility and scalability needed”, said Tobias Thörmann, Network Security Architect, Volkswagen AG. “This new integrated solution that Zscaler and SAP have created is an important capability to support our digital transformation with secure cloud services.”Zscaler’s ZPA integration with RISE with SAP marks a significant step forward in securing and optimizing enterprise applications in the cloud”, said Georgios Billios, Group Service Manager, Siemens AG. “By seamlessly connecting users to SAP services while maintaining the highest standards of security and performance, this partnership empowers organizations to innovate and scale with confidence in today’s digital landscape, which we will evaluate in our own RISE with SAP implementations.”“This innovative solution will enable organizations like ours to enhance the security and reliability of our SAP applications”, said Nataliia Iskra, Head of IT Security Operations, Deutsche Börse. “By enabling secure, zero-trust access to critical systems without the need for traditional VPNs, Zscaler empowers our teams to work with confidence, no matter where they are. This innovative approach reduces risk, ensures regulatory compliance, and ultimately strengthens the foundation of our IT security strategy.”“Using Zscaler’s ZPA solution to securely access SAP applications is a strategic move for organizations aiming to fortify their enterprise security”, said Britta Simms, Managing Director, Accenture. “Moving beyond traditional perimeter defenses like VPNs allows organizations to ensure that every access request is validated based on identity, context, and risk. This continuous authentication model is essential for protecting SAP applications in the cloud, enabling organizations to embrace digital transformation while maintaining a robust security posture.”“Modern organizations operate SAP systems across a hybrid landscape and today’s distributed workers need access to these systems from different locations”, said Sachin Singh, Managing Director, Deloitte &amp; Touche LLP. “This new solution offered jointly by Zscaler and SAP simplifies migration of SAP applications to the cloud by allowing users to have a consistent, secure experience, no matter where these applications are hosted. With our deep technical cybersecurity knowledge and this new solution from Zscaler and SAP, we can help clients navigate data protection compliance while utilizing digital experience monitoring for optimizing user experience during the migration.”Join us for our exclusive virtual event featuring leaders from SAP, Siemens, Volkswagen, Deutsche Börs &nbsp; e, Deloitte, Accenture, and Capgemini, in which they will discuss the partnership in detail. Register here.For more information on the latest Zscaler and SAP integration, please visit - https://www.zscaler.com/partners/sap.SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE in Germany and other countries. Please see https://www.sap.com/copyright for additional trademark information and notices. All other product and service names mentioned are the trademarks of their respective companies.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Nokia Turns to Zscaler to Modernize Security Architecture and Accelerate Cloud Transformation Initiatives]]></title>
            <link>https://www.zscaler.com/press/nokia-turns-zscaler-modernize-security-architecture-and-accelerate-cloud-transformation</link>
            <guid>https://www.zscaler.com/press/nokia-turns-zscaler-modernize-security-architecture-and-accelerate-cloud-transformation</guid>
            <pubDate>Tue, 17 Dec 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that Nokia, a multinational technology leader in pioneering networks, digital services and applications, is deploying the Zscaler Zero Trust Exchange™ platform to enhance its security, operational efficiency, and cloud capabilities.&nbsp;The Zscaler platform is a cloud-native security solution that connects users directly to applications and workloads without exposing the corporate network, thereby reducing the attack surface and enhancing overall cybersecurity and compliance posture. Zscaler’s platform is built to provide secure, fast connections from any device, anywhere, at any time.Legacy Challenges Lead to Strategic ModernizationNokia previously relied on a combination of traditional hardware and virtual firewalls across data centers, offices, and cloud environments. With the traditional IP-based security approach, maintaining uniform security control across all branch offices and across all applications and platforms was complex. “Now we are moving towards identity-based, location-independent, application access, with a zero trust security approach without compromising on user experience”, said Nishant Batra, Chief Strategy &amp; Technology Officer at Nokia. “With our push towards a cloud-first model, it became evident that we needed a security architecture capable of supporting this evolution efficiently and securely.”Traditional firewall solutions lack the agility to deliver true zero-trust security, impacting the optimization of digital and cloud transformation initiatives. Nokia’s adoption of Zscaler’s Secure Access Service Edge (SASE) solution aligns with its goal to streamline operations, reduce latency, and elevate security without the limitations of traditional solutions.A Future-Focused Approach with Zscaler’s Zero Trust Exchange PlatformNokia has selected Zscaler due to Zscaler’s robust, multi-cloud SaaS platform, which provides extensive public edge coverage and an application-centric approach to zero-trust. Zscaler’s platform includes more than 160 globally distributed data centers to optimize performance and ensure highly available, seamless and secure access for Nokia’s global workforce.Key components of Nokia’s deployment include:Zscaler Internet Access™ (ZIA™): Delivering secure, zero-trust access directly to the internet and SaaS applications through an AI-powered secure web gateway.Zscaler Private Access™ (ZPA™): Replacing VPNs with direct, secure access to private applications from any device or location.Zscaler Digital Experience™ (ZDX™): Enabling Nokia’s IT team to quickly detect and resolve user experience issues, ensuring seamless connectivity and productivity.Zscaler Data Protection: Securing sensitive data through advanced inspection and threat prevention capabilities.Transformative Benefits for Nokia’s Cloud-Centric InitiativesBy implementing the Zscaler platform as part of a phased journey, Nokia expects to realize substantial benefits from both an operational and a security perspective. The platform’s ability to integrate seamlessly with Nokia’s cloud solutions allows for easy scalability and rapid adaptation to Nokia’s evolving security needs.Nokia has already witnessed the potential for a significantly improved end-user connectivity experience in the initial rollout phase. “Our team was particularly impressed with the seamless user experience provided by Zscaler, which advanced our performance and productivity from day one,” said Batra.With Zscaler, Nokia is planning to streamline security infrastructure, reduce operational costs, and provide a foundation for further digital transformation."As the leader in cloud security, Zscaler is thrilled to partner with Nokia on their journey towards a Zero Trust architecture," said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. " Zscaler’s AI-powered cloud security platform is helping Nokia accelerate their implementation of a modern security model that will deliver superior threat detection and response while significantly reducing costs and providing improved user experiences. Nokia’s commitment to security and cloud transformation, combined with Zscaler’s dedication to delivering unparalleled customer value, we will help ensure industry-leading security, performance, and productivity for its employees, partners and customers.”To learn more about Zscaler’s Zero Trust Exchange and how it supports digital transformation, visit zscaler.com.Forward-Looking Statements&nbsp;This press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits of Nokia’s Zscaler deployment. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully implement and deploy our solutions to promote Nokia’s cloud security transformation initiatives. Additional risks and uncertainties are set forth in our most recent Quarterly Report on Form 10-Q filed with the Securities and Exchange Commission (“SEC”) on December 5, 2024, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.About NokiaAt Nokia, we create technology that helps the world act together.As a B2B technology innovation leader, we are pioneering networks that sense, think and act by leveraging our work across mobile, fixed and cloud networks. In addition, we create value with intellectual property and long-term research, led by the award-winning Nokia Bell Labs.With truly open architectures that seamlessly integrate into any ecosystem, our high-performance networks create new opportunities for monetization and scale. Service providers, enterprises and partners worldwide trust Nokia to deliver secure, reliable and sustainable networks today—and work with us to create the digital services and applications of the future.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Finds Over 87% of Cyberthreats Hide in Encrypted Traffic, Reinforcing Need For Zero Trust]]></title>
            <link>https://www.zscaler.com/press/zscaler-finds-over-87-cyberthreats-hide-encrypted-traffic-reinforcing-need-zero-trust</link>
            <guid>https://www.zscaler.com/press/zscaler-finds-over-87-cyberthreats-hide-encrypted-traffic-reinforcing-need-zero-trust</guid>
            <pubDate>Thu, 05 Dec 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:Malware, phishing and cryptominers account for nearly 90% of all encrypted threats observed in ThreatLabz analysisManufacturing was the target of 42% of encrypted attacks, making it the most- targeted industry&nbsp;The United States and India are the top targets of encrypted attacksZscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published its Zscaler ThreatLabz 2024 Encrypted Attacks Report, which explores the latest threats blocked by the Zscaler security cloud and provides critical insights into how encryption has become a conduit for more sophisticated threats, further compounded by the rise of artificial intelligence (AI). ThreatLabz found that over 87% of all threats were delivered over encrypted channels between October 2023 and September 2024—a 10% increase year-over-year. The report offers strategies and best practices to help organizations tackle these covert threats.&nbsp;"The rise in encrypted attacks is a real concern as a significant share of threats are now delivered over HTTPS," said Deepen Desai, Chief Security Officer, Zscaler. "With threat actors focused on exploiting encrypted channels to deliver advanced threats and exfiltrate data, organizations must implement a zero trust architecture with TLS/SSL inspection at scale. This approach helps to ensure that threats are detected and blocked effectively, while safeguarding data without compromising performance."Encrypted malware continues to dominate&nbsp;Malware accounted for 86% of encrypted attacks, totaling 27.8 billion hits—a 19% year-over-year increase. Encrypted malware includes malicious web content, malware payloads, macro-based malware, etc. This growing prevalence of malware reflects a strategic shift by attackers adapting tactics to thrive within encrypted traffic, using encryption to conceal malicious payloads and content.&nbsp;&nbsp;&nbsp;According to ThreatLabz researchers, the most active malware families were:AsyncRAT&nbsp;Choziosi Loader/ChromeLoader&nbsp;AMOS/Atomic Stealer&nbsp;DucktailAgent TeslaKoi LoaderThe report also details notable year-over-year increases in web-based attacks, including cryptomining/cryptojacking (123%), cross-site scripting (110%) and phishing (34%), among other encrypted threats—surges that could be potentially fueled by the growing use of generative AI technologies by threat actors.Most targeted industry verticalsManufacturing was the most-targeted industry, accounting for &nbsp;42% of encrypted attacks—nearly three times more than the second-most targeted industry, technology and communications. Attacks on the manufacturing industry grew 44% year-over-year, likely driven by rapid Industry 4.0 advancements and the extensive use of interconnected systems, which have expanded the attack surface and heightened manufacturers’ vulnerability to cyber threats.The top five most targeted industries were:ManufacturingTechnology and communications&nbsp;ServicesEducationRetail and wholesaleCountries that experience the most encrypted attacksThreatLabz found that the United States, India and France are the most frequently targeted nations by encrypted attacks. The U.S. and India are consistently the top two most frequently targeted, highlighting their significance as high-value targets for cybercriminals. The top five most targeted countries by encrypted attacks were:United States - 11BIndia - 5.4BFrance - 854MUnited Kingdom - 741MAustralia - 672MStopping encrypted attacks with zero trustUnderstanding how zero trust disrupts encrypted threats requires looking at a typical attack sequence. Advanced attacks often unfold in four stages:First, attackers conduct reconnaissance to find a way into the targeted network.Next, they breach the network, often via exploits, brute-force attacks or stolen credentials.Once inside, they move laterally, escalate privileges and establish persistence.Finally, they carry out their objectives, typically conducting data exfiltration to extract valuable information that can be leveraged for further extortion or attacks.&nbsp;The Zscaler Zero Trust Exchange™ platform provides security controls at each stage to mitigate risk and stop encrypted threats.A key component of the Zscaler platform’s approach is its full TLS/SSL inspection capabilities, based on an advanced proxy architecture. Zscaler advises inspecting 100% of traffic to protect users and organizations from threats concealed within encrypted channels.Organizations can bolster their ability to protect their devices, apps and data from encrypted attacks by following these recommendations:Understand that any internet-facing service can be found and attacked or abusedInspect incoming encrypted traffic to detect and block threatsUse a zero trust architecture to secure all connectivity holistically between users and applications, between devices like IoT and OT systems, between all locations and branch offices, between cloud workloads and more.Implement microsegmentation to reduce access, even for authenticated users.&nbsp;Leverage an AI-driven cloud sandbox to isolate and quarantine unknown attacks and stop patient-zero malware before it touches users.Reduce the number of entry points into an environment.&nbsp;Inspect outgoing northbound traffic along with incoming southbound traffic to disrupt C2 communications and protect sensitive data.The ThreatLabz 2024 Encrypted Attacks Report provides additional insights and best practices to help organizations effectively prevent encrypted attacks. Download your copy here today.Research MethodologyAnalysis of 32.1 billion blocked threats from October 2023 to September 2024 in the Zscaler cloud shows that all blocked threats came via encrypted channels.&nbsp;About ThreatLabzThreatLabz is the security research arm of Zscaler. This world-class team is responsible for hunting new threats and ensuring that the thousands of organizations using the global Zscaler platform are always protected. In addition to malware research and behavioral analysis, team&nbsp;members are involved in the research and development of new prototype modules for advanced threat protection on the Zscaler platform, and regularly conduct internal security audits to ensure that Zscaler products and infrastructure meet security compliance standards. ThreatLabz regularly publishes in-depth analyses of new and emerging threats on its portal, research.zscaler.com.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Introduces Innovations in Intelligent Segmentation to Extend Zero Trust to Branches, Factories and Clouds]]></title>
            <link>https://www.zscaler.com/press/zscaler-introduces-innovations-intelligent-segmentation-extend-zero-trust-branches-factories</link>
            <guid>https://www.zscaler.com/press/zscaler-introduces-innovations-intelligent-segmentation-extend-zero-trust-branches-factories</guid>
            <pubDate>Tue, 12 Nov 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the industry’s first Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clouds.&nbsp;While traditional networks, including SD-WAN and site-to-site VPN, have extended enterprise connectivity to branches and clouds, they have also inadvertently accelerated the spread of ransomware. Although firewalls are used to do segmentation on networks, they add complexity, increase costs, and fail to provide adequate security. Zero Trust Segmentation for branch and cloud is an innovative solution that prevents ransomware attacks, turns branches into simplified café-like environments and in the process eliminates the need for firewalls, network access control (NAC), SD-WAN and site-to-site VPNs.With a Zero Trust architecture, organizations are no longer required to extend the corporate network from the data center to distributed locations and public clouds. Each branch, factory and public cloud becomes a virtual island that communicates directly with the Zscaler cloud security platform over any broadband connection. The Zscaler Zero Trust Exchange™ platform then applies business policies to securely connect users, workloads and devices. As a result, Zscaler minimizes the attack surface associated with public IPs, prevents ransomware from spreading between locations, and eliminates firewalls, SD-WAN and the reliance on Direct Connect and ExpressRoute.“Traditional network and security architectures enable the spread of ransomware," said Dhawal Sharma, EVP of Product Management at Zscaler. "Using firewalls to segment business networks is extremely complex, turning into a never-ending initiative for many organizations. Integrating advanced technology from the recent AirGap acquisition, Zscaler Zero Trust Segmentation now offers the most advanced, robust protection against ransomware attacks, which can be implemented in days. Additionally, it delivers up to 50% cost savings by eliminating the need for legacy firewalls and complex infrastructures.”Zero Trust Segmentation for Branches and FactoriesWith the increasing prevalence of IoT devices and operational technology (OT) systems in today's branch offices and factories, security leaders are urgently working to protect their environments from sophisticated attacks. A recent Zscaler ThreatLabz report revealed that over 50% of OT devices rely on legacy, end-of-life operating systems with known vulnerabilities, leaving them highly susceptible to attacks. Zscaler's solution securely segments every device—including legacy OT— within hours, without north-south firewalls.“As OT devices are becoming increasingly common in our environment, ensuring their security is a top priority,” said Brian Morris, Vice President, Chief Information Security Officer, Gray Television. “Zscaler Zero Trust Branch has been nothing short of transformative. It has not only helped us reduce network costs, but has significantly reduced cyber risk and helped accelerate M&amp;A integration.”Zero Trust Segmentation for Data Center and Public CloudsRelying on firewalls to secure workload communications in hybrid and multi-cloud environments increases business risk and complexity. Each internet-facing firewall presents a discoverable attack surface and can lead to inconsistent cyber threat and data protection, as each public cloud service provider operates differently. Zscaler Zero Trust Segmentation standardizes multi-cloud workload security for internet-bound traffic, communication between clouds and data centers, between Virtual Private Clouds (VPCs), and between workloads and processes. This scalable approach eliminates the need for firewalls, site-to-site VPNs, Direct Connect, or ExpressRoute, simplifying and strengthening security across diverse cloud environments.“Cloud is a critical component of our infrastructure, and we depend on Zscaler’s Zero Trust architecture to secure our cloud workloads,” said Shanker Ramrakhiani, CISO at IIFL. “Zscaler’s Zero Trust Cloud has empowered us to enforce consistent security across our data centers and multiple clouds, simplifying operations and significantly reducing the risk of lateral threat movement.”Zero Trust Segmentation currently supports AWS and Azure, with GCP support slated for February 2025.&nbsp;To learn more about Zero Trust Segmentation, please visit https://zscaler.com/ztsegmentation.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits of the new Zero Trust Segmentation solution to Zscaler’s customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully implement and deploy our Zero Trust Segmentation solution across platforms and we believe this will result in improved efficiency and cost savings for our customers. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 12, 2024, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[New Zscaler Business Continuity Services Enables Customers to Continue Secure Operations, Even During a Catastrophic Event]]></title>
            <link>https://www.zscaler.com/press/new-zscaler-business-continuity-services-enables-customers-continue-secure-operations-even</link>
            <guid>https://www.zscaler.com/press/new-zscaler-business-continuity-services-enables-customers-continue-secure-operations-even</guid>
            <pubDate>Tue, 22 Oct 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, the leader in cloud security, today announced it is expanding its business continuity solutions for cloud and endpoints that enable customers to prepare for and quickly recover from catastrophic events that can significantly disrupt business operations. These solutions build on Zscaler’s existing and widely adopted Business Continuity Standard offering.Recent major IT outages have refocused attention on how organizations can improve business continuity planning to minimize impact during a catastrophic, widespread event. Many business-critical organizations require always-on operations, and they cannot afford interruptions, which can be costly in financial and reputational terms.New Private Business Continuity Cloud solutions provide ongoing full inspection and enforcement of Zero Trust policies for web, SaaS, and private applications, with synchronization of configuration and policies, when the Zscaler public cloud is unreachable or unavailable.Additionally, new regulatory requirements in many industries and regions are compelling more organizations to develop business continuity plans that extend to their IT solutions.Zscaler Private Cloud Business Continuity Services provide:Continued access to all web, SaaS, and private applications in the event of a catastrophic event when the Zscaler cloud is unreachable or unavailableA full Zero Trust security posture with consistent policies and inspectionPrivate clouds maintain synchronization with Zscaler’s Zero Trust ExchangeA customer-hosted solution is available now, with a fully managed offering coming soonFor a deeper dive into the new Zscaler Private Cloud Business Continuity Services, as well as our solution for unavailable endpoints, like laptops, please visit this blog.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and Okta Enhance Enterprise Cybersecurity with New Zero Trust Integrations]]></title>
            <link>https://www.zscaler.com/press/zscaler-and-okta-enhance-enterprise-cybersecurity-new-zero-trust-integrations</link>
            <guid>https://www.zscaler.com/press/zscaler-and-okta-enhance-enterprise-cybersecurity-new-zero-trust-integrations</guid>
            <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Today at Oktane2024, Zscaler and Okta announced four new integrations designed to accelerate their mutual customers' zero trust transformation. By delivering end-to-end, context-aware security, Okta and Zscaler are helping customers reduce risk, improve the user experience, and enable cross-domain response through shared telemetry and threat intelligence.“The integrations announced today significantly deepen our collaboration &nbsp;with Okta and our commitment to keeping our customers secure,” said Amit Raikar, Vice President, Technology Alliances and Business Development, Zscaler. “Together, we are focused on helping customers strengthen their zero trust security posture in an increasingly complex risk environment, where rigorously managing user identities and enforcing adaptive access controls is more crucial than ever.”“In the AI era, the only way to effectively protect customers is by rallying the security ecosystem. Point security solutions address individual areas but don’t integrate with one another, which increases complexity,” said Stephen Lee, vice president of Technical Strategy and Partnerships at Okta. “That’s why Okta and Zscaler have invested in deep integrations that accelerate the zero trust journey and elevate the security posture of our mutual customers worldwide.”Organizations continue to navigate the complexities of securing the growing number of remote users, cloud applications, and hybrid IT environments. Both Zscaler and Okta are committed to delivering deep integrations that enhance secure access to cloud and web applications while minimizing user disruptions. Our newest integrations deliver:Adaptive Access Policy Enforcement: The Zscaler Adaptive Access and Okta integration allows organizations to enforce context-based access policies that dynamically adjust based on the changing risk context of the user. These include password expiration, credential compromise, account recovery, or high-risk user behavior. Zscaler’s ingestion of Okta’s user risk telemetry expands upon an earlier integration, where Identity Threat Protection with Okta AI &nbsp;ingests risk telemetry from Zscaler Deception to respond to credential compromise or insider attacks. With the new integration, risk telemetry is exchanged bidirectionally between Okta and Zscaler, &nbsp;enhancing threat detection and response.Dynamic Step-Up Authentication: The Zscaler Adaptive Access can trigger step-up authentication with Okta Workforce Identity Cloud &nbsp;(WIC) to add an extra layer of security when Zscaler detects higher-than-usual risky user behavior. In such scenarios, step-up authentication dynamically requires the user to comply with stronger forms of authentication before access to sensitive resources, such as Salesforce, is granted.Security Data Contextualization and Unified Vulnerability Management: Zscaler's Data Fabric for Security enriches and aggregates data from Okta logs with concurrent data streams to provide contextualized, real-time insights into vulnerabilities and exposures across the enterprise ecosystem. Easy to set up and configure, this solution provides a dynamic risk assessment of an organization via a simple dashboard to accelerate security remediation.Zero Trust Partner Access: Zscaler’s Zero Trust Exchange cloud security platform, with natively integrated cloud browser isolation (CBI), enables secure, agentless access to web applications. It allows external third-party users and partners to instantly access corporate resources from their devices, while protecting enterprise applications and preventing data loss. Okta complements this by streamlining identity and access management (IAM) for IT administrators with Okta Universal Directory. This enables them to manage users and policies, automate app assignments, and onboard more securely and quickly.For more information about this integration, please get a copy of the solution brief.Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits of the new integrations to Zscaler’s product offerings and to our customers. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate these enhancements. Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 12, 2024, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.About OktaOkta is the World’s Identity Company. As the leading independent Identity partner, we free everyone to safely use any technology—anywhere, on any device or app. The most trusted brands trust Okta to enable secure access, authentication, and automation. With flexibility and neutrality at the core of our Okta Workforce Identity and Customer Identity Clouds, business leaders and developers can focus on innovation and accelerate digital transformation, thanks to customizable solutions and more than 7,000 pre-built integrations. We’re building a world where Identity belongs to you. Learn more at okta.com.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Identifies More Than 200 Malicious Apps in the Google Play Store, with Over 8 Million Installs]]></title>
            <link>https://www.zscaler.com/press/zscaler-identifies-more-200-malicious-apps-google-play-store-over-8-million-installs</link>
            <guid>https://www.zscaler.com/press/zscaler-identifies-more-200-malicious-apps-google-play-store-over-8-million-installs</guid>
            <pubDate>Tue, 15 Oct 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:Mobile remains a top threat vector, with 111% growth in spyware and 29% growth in banking malwareTechnology, education, and manufacturing sectors continue to be most susceptible to attacksThe United States remains the top target for IoT, OT, and mobile cybersecurity attacksZscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published its Zscaler ThreatLabz 2024 Mobile, IoT, and OT Threat Report, which offers an overview of the mobile and IoT/OT cyber threat landscape from June 2023 through May 2024. The findings in this report stress the urgency for organizations to reevaluate and secure mobile devices, IoT devices and OT systems. ThreatLabz identified more than 200 malicious apps in the Google Play Store, with more than 8 million collective installs, and the Zscaler cloud blocked 45% more IoT malware transactions than last year–indicative of botnets continuing to proliferate across IoT devices."Cybercriminals are increasingly targeting legacy exposed assets which often act as a beachhead to IoT &amp; OT environments, resulting in data breaches and ransomware attacks," said Deepen Desai, Chief Security Officer at Zscaler. "Mobile malware and AI driven vishing attacks adds to that list making it critical for CISOs and CIOs to prioritize an AI powered zero trust solution to shut down attack vectors of all kinds safeguarding against these attacks."Financially motivated mobile attacks remain a top threat vectorWith 29% growth in banking malware attacks and a 111% rise in spyware year over year, cyberattacks have never been more profitable for threat actors, either through monetary gain via direct extortion or passthrough use of stolen personally identifiable information (PII) and user credentials that can be sold and leveraged in future attacks.Anatsa, a known Android banking malware that uses PDF and QR code readers to distribute malware, has targeted more than 650 financial institutions, and more specifically, users in Germany, Spain, Finland, South Korea and Singapore.Verticals most targeted by bad actorsThe technology (18%), education (18%) and manufacturing (14%) sectors are the most frequent targets of mobile malware. Education in particular saw a dramatic 136% increase in blocked transactions compared to the previous year.Additionally, for the second year in a row, manufacturing experienced the highest volume of IoT malware attacks, accounting for 36% of all IoT malware blocks observed on the Zscaler Zero Trust Exchange™ platform. When analyzing unique devices across different verticals, this sector stands out with the highest implementation of IoT devices due to its extensive use of IoT applications, ranging from automation and process monitoring to supply chain management.The United States remains the top target for IoT cyberattacksWith its central role in global communication and data processes, the US also stands out as the primary destination for IoT device traffic, accounting for 81% of IoT cyberattacks. The top five countries that receive the most IoT traffic are:United StatesJapanChinaSingaporeGermanyThe report also revealed that India (28%) is now the country most targeted by mobile malware. The other four are:United StatesCanadaSouth AfricaThe NetherlandsLegacy and end-of-life operation systems leave OT systems vulnerableOnce air-gapped and isolated from the internet, OT and cyber-physical systems have rapidly become integrated into enterprise networks, enabling threats to proliferate. OT deployments can involve thousands of connected devices spread across dozens of sites, creating a substantial attack surface for external threats, such as those that exploit known zero-day vulnerabilities. Additionally, this also creates a large attack surface between internal (east-west) OT traffic, increasing the risk of lateral movement and the potential blast radius of a successful attack.How to secure mobile, IoT and OT&nbsp;With today’s hybrid-work environments, users can work from anywhere with internet access, SaaS apps and private applications, whether in the cloud or the data center. To enable secure hybrid work and provide seamless access to any application, enterprises need to retire network-centric approaches, which hamper productivity and leave them vulnerable to lateral movement. Instead, organizations must adopt a zero trust architecture that enables secure remote access from any user device to any application, from any location.Zscaler for IoT and OT enables enterprises to reduce cyber risk while embracing IoT and OT connectivity to drive business agility and increase productivity. Powered by the Zero Trust Exchange, these capabilities protect IoT devices against compromise and prevent lateral movement with device segmentation and deception–all while allowing for remote access to OT systems without risky VPN connectivity.The findings of the 2024 Mobile, IoT, and OT Threat Report stress the need for organizations to better secure their mobile endpoints, IoT devices, and OT systems. Download the full report here.Research MethodologyThe Zscaler ThreatLabz team analyzed a data set collected from the Zscaler Security Cloud between June 2023 and May 2024, comprising more than 20 billion threat-related mobile transactions and associated cyberthreats.&nbsp;&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Zero Trust Exchange™ Extends Cybersecurity Market Leadership by Surpassing Half a Trillion Daily Transactions]]></title>
            <link>https://www.zscaler.com/press/zscaler-zero-trust-exchange-tm-extends-cybersecurity-market-leadership-surpassing-half</link>
            <guid>https://www.zscaler.com/press/zscaler-zero-trust-exchange-tm-extends-cybersecurity-market-leadership-surpassing-half</guid>
            <pubDate>Wed, 09 Oct 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced that the Zscaler Zero Trust Exchange™ cloud security platform has surpassed half a trillion daily transactions which is nearly 60 times greater than the total number of Google searches per day. This milestone underscores the unparalleled scalability, resilience, and trust customers have placed in the Zscaler platform, which enables organizations to secure users and applications, simplify operations, and advance their business. By extracting security signals from the half a trillion daily transactions and analyzing them with advanced AI models in real-time, Zscaler has the ability to gain a comprehensive understanding of the evolving threat landscape. This advancement delivers customers superior threat detection, prevention, and response capabilities.Scalable and Resilient Security Cloud for Mission-Critical RequirementsThe Zscaler Zero Trust Exchange is the world’s largest security cloud that delivers comprehensive security for users, devices, workloads and applications. The platform is built on the principle of least-privileged access to establish trust based on user identity and context—including location, device, application, and content—and then creates secure, direct user-to-app, app-to-app, and machine-to-machine connections. Zscaler services 8,600+ customers and 47+ million users, processing over half a trillion daily transactions and health performance and security metrics. Building a cloud of this magnitude and capacity takes deep experience and investment across four key areas: Scale, Resilience, Performance, and Zero Trust Connectivity.&nbsp;Scale: Enterprises need enough scale and capacity to dynamically and effortlessly handle large-scale events. Zscaler’s ability to effortlessly scale with the exponential rise in customer security transactions reinforces its strength to handle evolving and escalating enterprise demands.&nbsp;Resilience: It is critical to maintain the highest availability and interconnections between users and devices to critical cloud-based applications. Zscaler’s architecture helps ensure business continuity by helping customers prepare for and quickly recover from black swan events that could otherwise disrupt or stop business operations by automatically finding the optimal path from users and devices to application.Zero Trust Connectivity: Zscaler’s proxy-based cloud native Zero Trust platform securely connects users, applications, and devices—using business policies—over any network, in any location. By only granting access to the resources they need to perform their tasks, customers greatly reduce the risk of data breaches while simplifying operations for security and IT teams.Performance: An exceptional customer user experience—the ultimate measure of performance—is achieved by Zscaler’s platform scalability with over 160 hosted Zero Trust Exchange edges close to population centers around the world. This ensures that modern digital-first enterprises can operate effectively, around the globe, without trading off speed for unmatched security.&nbsp;"The growth in adoption and proliferation of our services continue to accelerate over the past 16 years," said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. "Zscaler consistently invests in its cloud security operations to ensure we have ample capacity to rapidly scale with user growth, and we built in resilience at its heart to ensure non-stop operations for our customers. As an innovator and a market leader, we also became the first cloud security company to introduce a Business Continuity service that enables customers to continue their operations, even during catastrophic events."Half a Trillion Daily Transactions Fuel New AI Security Controls for Security and IT ProfessionalsDelivering impactful AI-powered outcomes for customers requires large volumes of diverse, high-quality data, and a sophisticated AI engine to deliver meaningful and accurate results. Zscaler’s AI advantage is the result of 16 years of expertise and technology leadership. Zscaler processes the most daily transactions in the industry allowing Zscaler to extract security signals that are constantly analyzed by AI models to better understand the evolving threat landscape to offer the best protection to our customer base. By leveraging its massive data foundation, Zscaler is poised to transform the AI capabilities for the cybersecurity industry to not only enable organizations to mitigate risks and optimize performance, but also pave the way for zero-touch operations.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[TOYOTA GAZOO Partners with Zscaler to Safeguard Data and Users in  Extreme Remote Environments]]></title>
            <link>https://www.zscaler.com/press/toyota-gazoo-partners-zscaler-safeguard-data-and-users-extreme-remote-environments</link>
            <guid>https://www.zscaler.com/press/toyota-gazoo-partners-zscaler-safeguard-data-and-users-extreme-remote-environments</guid>
            <pubDate>Tue, 08 Oct 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, announced today that TOYOTA GAZOO Racing World Rally Team Oy (TGR-WRT) is using the Zscaler Zero Trust Exchange™ cloud native security platform to protect users, applications, and data across its global operations and rally stages all over the world. Based in Jyväskylä, Finland, the high-performance, competition-oriented company constantly evolves technologies beyond world-level rallying for innovations for the automotive industry.TGR-WRT runs major programs for the World Rally Championship, Customer Motorsport, and Young Driver Development. As the organization operates in extreme and often remote locations across the globe, enabling secure, high-performance access to the internet and private applications was a major challenge for the IT team. TGR-WRT connects to a combined 100 services, encompassing file storage, SaaS applications, private custom applications for their sensitive engineering and testing data. The fast-growing organization realized that its traditional security infrastructure, consisting of VPNs and firewalls, was neither agile nor secure enough to serve its needs. When TGR-WRT adopted a cloud-first strategy as part of its push for modernization, the organization was also looking for more efficient connectivity for its users on the rally stages and in branch offices, with an improved security posture through a zero trust approach.The security team began its zero trust journey by collaborating with Mintly, a Finnish technology integrator, who recommended Zscaler to meet TGR-WRT’s unique requirements. After a successful proof of concept, TGR-WRT worked closely with Mintly to deploy the Zscaler Zero Trust Exchange platform on a tight schedule. The comprehensive cloud-native zero trust security platform now enables fast, secure connections between users, branches, applications, and workloads, anywhere and on any device. &nbsp;It acts as a switchboard, connecting users directly to applications and other resources—not to the network—thereby reducing the attack surface and eliminating the risk of lateral movement.“Zscaler is one of the best decisions we have made,” said Riku Nykänen, Information Security Officer at TGR-WRT. “The Zscaler Zero Trust Exchange simplifies our security architecture. It’s at the core of our protection for all network traffic from our on-premises and cloud servers and the laptops and mobile devices that our teams use at rallies, test events, airports, and homes around the world. This comprehensive security platform makes our users happy because it is easy to use and gives them seamless, uninterrupted connectivity. It makes a difference in our races where every tenth of a second counts.”During a rally, it is critical to get data packages as quickly as possible from cars to all relevant persons so it can be analyzed for optimizing the performance and reliability of the vehicles. With the help of Zscaler, TGR-WRT built an environment where this highly sensitive data can be sent seamlessly and securely across these different locations.&nbsp;TGR-WRT deployed Zscaler for Users with Zscaler Internet Access™ (ZIA™) to grant users zero trust access to the internet and SaaS applications from anywhere and on any device. ZIA brokers secure connections between users and applications based on identity, context, and business policies. With TLS/SSL traffic inspection and AI-powered defenses, it protects all users across various stages of the attack chain to prevent compromise, eliminate lateral movement of threats, and prevent data loss. Additionally, TGR-WRT replaced its unreliable VPN with Zscaler Private Access™ (ZPA™) for seamless and secure access to private applications from any device and location. Zscaler Digital Experience™ (ZDX™) enables the TGR-WRT help-desk team to detect usability issues, pinpoint root causes, and act swiftly to remediate problems to ensure a superior user experience.The organization also relies on Zscaler Zero Trust SD-WAN’s direct-to-cloud architecture to forward traffic from service parks and headquarters via a branch connector directly to the Zscaler Zero Trust Exchange platform for secure access to applications and the internet. This further reduces complexity of the architecture and adds another layer of data protection by eliminating site-to-site VPNs. In the near future, TGR-WRT plans to implement the Zscaler Client Connector™ app to provide consistent security and faster connectivity for users at rally locations who depend on mobile phones and tablets.TOYOTA GAZOO Racing World Rally Team has realized significant gains with the Zscaler solution. From April to June this year, the &nbsp;security platform helped them to process 262.1 million transactions and 13.7 TB of traffic—a dramatic increase in traffic of more than 1400% from the year before. During this timespan, Zscaler detected and prevented approximately 3 million policy violations.“Zscaler blew our minds,” said Jussi Luopajärvi, IT Manager at TOYOTA GAZOO Racing World Rally Team. “User productivity has greatly improved. The time it takes for users to turn on their laptops and start doing productive work has dropped from five minutes to just a few seconds. Network stability and performance in remote locations has also improved, and false positives associated with URL filtering have gone down significantly. Additionally, the firewall issues we had previously have been eliminated.”About TOYOTA GAZOO Racing World Rally TeamThe TOYOTA GAZOO Racing World Rally Team is based in Finland and a competitor in the World Rally Championship (WRC), serving as the entry for the car manufacturer, Toyota. The team is a separate operational unit of the TOYOTA GAZOO Racing team that competes in the World Endurance Championship, but both are a part of TOYOTA GAZOO Racing Europe. The team has delivered championship titles for drivers and co-drivers every year since 2019.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Appoints Security Industry Veteran Adam Geller as Chief Product Officer to Scale Cloud Security Leader to $5 Billion ARR and Beyond]]></title>
            <link>https://www.zscaler.com/press/zscaler-appoints-security-industry-veteran-adam-geller-chief-product-officer-scale-cloud</link>
            <guid>https://www.zscaler.com/press/zscaler-appoints-security-industry-veteran-adam-geller-chief-product-officer-scale-cloud</guid>
            <pubDate>Mon, 30 Sep 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today announced the appointment of Adam Geller as Chief Product Officer to scale and accelerate the company’s next phase of innovation and growth.“I am truly excited to have Adam join us as we expand Zscaler’s product suite to support our rapidly growing business and customer base,” said Jay Chaudhry, CEO, Chairman, and Founder of Zscaler. “Adam was an integral part of the growth at Exabeam as CEO and prior to that as the Chief Product Officer he drove the development of their cloud-scale security operations platform. His extensive and proven security product and engineering experience will be invaluable to Zscaler as we build our AI-driven security operations platform. Adam brings deep product experience supported by strong customer engagement with enterprises, key for our next phase of growth."Mr. Geller has over 25 years of product and engineering experience across multiple domains of cybersecurity. Prior to his time focusing on SIEM and security operations at Exabeam, he launched and grew multiple product lines for Palo Alto Networks focusing on virtualization and cloud. Earlier, Mr. Geller built managed security services for global IT provider NTT Communications and focused on identity and authentication for VeriSign/Symantec. His deep commitment to understanding customer challenges and delivering innovative solutions has its roots in his earliest jobs delivering pre-sales and post-sales security assessments, product implementation, and managed security services.“Zscaler has consistently proven that it secures, simplifies, and transforms businesses who adopt its amazing platform," said Mr. Geller. “I am thrilled to take on the opportunity to grow Zscaler beyond $5B in ARR through our current and future product offerings powered by AI &amp; ML. Zscaler sits at the confluence of users, devices, and applications and this offers unparalleled insights into identity, behavior, and intent. With access to one of the largest and richest datasets from billions of transactions, alerts, and context per day, we are able to deliver services that solve our customer’s IT challenges and give them the confidence they need to digitally transform their businesses.”Forward-Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the potential impact of the executive appointments to Zscaler's future recurring revenue and ability to grow and scale. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release.Additional risks and uncertainties are set forth in our most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 14, 2023, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler and CrowdStrike Announce New AI and Zero Trust Cyber Security Integrations]]></title>
            <link>https://www.zscaler.com/press/zscaler-and-crowdstrike-announce-new-ai-and-zero-trust-cyber-security-integrations</link>
            <guid>https://www.zscaler.com/press/zscaler-and-crowdstrike-announce-new-ai-and-zero-trust-cyber-security-integrations</guid>
            <pubDate>Tue, 17 Sep 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc. (NASDAQ: ZS) the leader in cloud security, today announced a new set of AI and Zero Trust integrations with the CrowdStrike Falcon® cybersecurity platform to advance security operations. The latest integrations with Zscaler Zero Trust Exchange™ Platform, Zscaler Data Fabric for Security, and CrowdStrike Falcon® Next-Gen SIEM modernize security operations to provide advanced threat detection, response, and risk management.Security operations center (SOC) teams are under constant pressure to assess and manage risks, detect threats early, and respond swiftly to security incidents–all while facing an increasingly complex threat landscape. Siloed security data streams from disparate sources and arbitrary risk assessment mechanisms across diverse environments create operational inefficiencies and delay response times that increase an organization’s cybersecurity risks and possibility of a breach.&nbsp;“Zscaler’s latest integrations with CrowdStrike represent a significant step forward in our collective mission to ease day-to-day work streams for IT security and SOC teams,” said Punit Minocha, EVP of Business Development and Corporate Strategy, Zscaler. “Together, we can deliver a synergistic approach to risk management, threat detection, and policy enforcement.”“To defeat today’s threats, organizations must transform the SOC by harnessing the power of AI and automation to eliminate blind spots and stop adversaries,” said Daniel Bernard, chief business officer at CrowdStrike. “CrowdStrike’s partnership with Zscaler is a critical step in advancing zero trust enforcement, empowering organizations to transform their SOC, closing the gap between security and IT operations.”The latest collaboration between Zscaler and CrowdStrike delivers:Coordinated Threat Sharing, Detection and Response: Through the Falcon Foundry for Zscaler app, which serves as a foundation for Zscaler’s integration with CrowdStrike Falcon® Next-Gen SIEM, mutual customers can leverage pre-built scripts for threat intel sharing and quickly build custom SOAR workflows.&nbsp;Holistic Cyber Risk Quantification and Visualization: Zscaler Risk360’s integration with the Falcon platform provides security teams deep insights into the contributing factors of an organization's risk, by pulling in rich incident, asset, and vulnerability data from Crowdstrike.Security Data Contextualization and Unified Vulnerability Management: Zscaler’s Data Fabric for Security enriches and correlates CVE (common vulnerabilities and exposure) data from the Falcon platform with concurrent data streams to provide contextualized, real-time insights into vulnerabilities and exposures across the enterprise ecosystem.Adaptive Access Policy Enforcement: CrowdStrike enhances Zscaler's Adaptive Access Engine by providing active security incident signals from the Falcon platform. The integration adds a rich layer of context to policy enforcement, making device posture-driven zero trust access control even more robust.For detailed information about this integration and benefits provided, please visit us here.Forward Looking StatementsThis press release contains forward-looking statements that are based on our management's beliefs and assumptions and on information currently available to our management. These forward-looking statements include the expected benefits to customers from the Zscaler and CrowdStrike partnership. These forward-looking statements are subject to the safe harbor provisions created by the Private Securities Litigation Reform Act of 1995. A significant number of factors could cause actual results to differ materially from statements made in this press release, including those factors related to our ability to successfully integrate technologies. Additional risks and uncertainties are set forth in Zscaler’s most recent Annual Report on Form 10-K filed with the Securities and Exchange Commission (“SEC”) on September 12, 2024, which is available on our website at ir.zscaler.com and on the SEC's website at www.sec.gov. Any forward-looking statements in this release are based on the limited information currently available to Zscaler as of the date hereof, which is subject to change, and Zscaler will not necessarily update the information, even if new information becomes available in the future.&nbsp;About CrowdStrikeCrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.CrowdStrike: We stop breaches.Learn more: https://www.crowdstrike.com/Follow us: Blog | Twitter | LinkedIn | Facebook | InstagramStart a free trial today: https://www.crowdstrike.com/free-trial-guide/© 2024 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.CrowdStrike Corporate Communicationspress@crowdstrike.com&nbsp;&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Doubles Down on Investments in Australia With New Co-located Data Center]]></title>
            <link>https://www.zscaler.com/press/zscaler-doubles-down-investments-australia-new-co-located-data-center</link>
            <guid>https://www.zscaler.com/press/zscaler-doubles-down-investments-australia-new-co-located-data-center</guid>
            <pubDate>Wed, 11 Sep 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, the leader in cloud security, today announced the launch of a new co-located data center in Perth to extend greater support to customers in the region to further fortify their organization’s Zero Trust cybersecurity postures. As part of Zscaler’s continued investment in the Australia and New Zealand markets, the new site will complement the existing Zscaler data center infrastructures in Sydney, Melbourne and Canberra – all of which are co-located within Equinix data centers.&nbsp;As Australian entities continue to battle the rising volume and sophistication of cyber threats, there is a growing impetus from both the public and private sectors to double down on Zero Trust adoption. In fact, the&nbsp;Zscaler ThreatLabz found over 29 million phishing attempts in Australia alone – with a 479% surge in volume of phishing content hosted in the country year-over-year. In line with the Australian Federal Government’s goal of becoming the&nbsp;most cyber secure nation in the world by 2030, the launch of this new site will provide customers with improved capacity and performance and prevent malicious activities from impacting their operations.&nbsp;The new data centers will&nbsp;support the&nbsp;Zscaler Zero Trust Exchange™ platform, including solutions such as&nbsp;Zscaler Private Access™ (ZPA) and&nbsp;Zscaler Internet Access™ (ZIA), to optimize digital experiences and support security for modern, dynamic applications. The Zscaler Zero Trust Exchange platform was the first cloud security vendor to achieve IRAP assessed to ‘Protected’. Furthermore, as part of our commitment to becoming&nbsp;carbon neutral by 2025,&nbsp;the new site adds to Zscaler’s&nbsp;more than 150 data centres – all of which are fully powered by renewable energy.&nbsp;“With the advent of new technologies like GenAI tools, the threat landscape is advancing in volume and sophistication, making it all the more critical to adopt a Zero Trust approach to cybersecurity&nbsp;– especially as more organizations move beyond legacy private network to connect in a cloud-enabled, mobile world,”&nbsp;said Eric Swift, Area Vice President, Australia &amp; New Zealand at Zscaler. “Australia is setting the benchmark on the global stage when it comes to being cybersecurity-first and we are proud to partner with both public and private enterprises across the region to implement a Zero Trust strategy. We are deeply committed to helping all organizations to secure, simplify and transform their operations.”Some of Zscaler's customers in Australia include&nbsp;John Holland,&nbsp;Probe CX,&nbsp;Northern Beaches Council and&nbsp;Ramsay Healthcare.&nbsp;“We’re delighted Zscaler continues to choose Equinix as its preferred data center partner, adding a point of presence in Perth to complement existing sites in Sydney, Melbourne, and Canberra,” said Guy Danskine, Managing Director, Equinix Australia. “This expanded partnership illustrates the role Equinix plays in enabling the critical infrastructure that powers a safe and prosperous digital economy, giving customers and partners unbridled access to a dense ecosystem of technologies and networks. With continued investments in Western Australia, Perth is becoming a major data hub in Australia and together, Equinix and Zscaler provide the resilient infrastructure organisations need to strengthen their cybersecurity posture and maximize the benefits of a digital-first strategy.”Register&nbsp;here to learn more about the latest product innovations and industry trends and best practices on Zero Trust &amp; AI, join us at our annual Zenith Live roadshow in Sydney on 17 September 2024.&nbsp;]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Appoints Diplomat and Tech Executive Casper Klynge as New Vice President and Head of EMEA Government Partnerships]]></title>
            <link>https://www.zscaler.com/press/zscaler-appoints-diplomat-and-tech-executive-casper-klynge-new-vice-president-and-head-emea</link>
            <guid>https://www.zscaler.com/press/zscaler-appoints-diplomat-and-tech-executive-casper-klynge-new-vice-president-and-head-emea</guid>
            <pubDate>Mon, 12 Aug 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Zscaler, Inc., the leader in cloud security, today announced the appointment of Casper Klynge for the new role as Zscaler’s Vice President, Head of EMEA Government Partnerships.&nbsp; As part of the Global Government Partnership team, Ambassador (ret.) and tech executive Casper Klynge will lead the public policy work and the strategic relationships and alliances with governments, international and regional organizations, and senior leaders across Europe, the Middle East, and Africa. Casper will be responsible for helping countries, organizations and critical infrastructure operators mitigate cybersecurity risks, in line with European and national data privacy and regulatory requirements, and driving digital sovereignty initiatives and strategic autonomy aspirations.&nbsp;European governments and institutions are moving with an urgency to securely transform their infrastructures to digital and cloud based requirements, in line with the utmost priority for data privacy and protection as well as regulatory obligations. Zscaler, with its global cloud-based and AI-powered Zero Trust security platform, already enables organizations worldwide in their secure adoption of multi-cloud environments, Working from Anywhere, 5G and the digitization of OT infrastructures, AI/ML security to combat the growing cyber risks effectively and can expand the same expertise to the public sector. As data sovereignty has to go hand in hand with cyber security, the new Zscaler function will build strategic partnerships with governments across EMEA to elevate the benefits of the Zero Trust approach and address regulatory affairs.“I am thrilled to work directly with Casper after having the privilege of collaborating for years while he served as Denmark’s Cyber and Tech Ambassador, and in his various industry leadership roles,” said Ryan Gillis, Senior Vice President, Global Head of Government Partnerships at Zscaler. “Bringing in a European leader of Casper’s experience, seniority and expertise reflects Zscaler’s commitment to building strategic relationships with governments and regional organizations at a critical inflection point for cybersecurity and public policy.”“I am very proud to join Zscaler at a pivotal time where cybersecurity challenges and data protection concerns driven by the possibilities of AI are becoming top of mind for the private and public sectors alike,” said Casper&nbsp;Klynge, Vice President, Head of EMEA Government Partnerships at Zscaler. “Leveraging secure and future-proof technology has become a key geopolitical issue to achieve digital resilience. It is the very foundation for creating the trust that will be the driver for digital transformation, and thus essential for productivity, economic growth and job creation in the digital decade ahead. I look forward to working with Zscaler colleagues in advancing digital sovereignty and in line with cybersecurity, data protection and privacy requirements as well as sovereign cloud solutions for our partners in Europe, the Middle East and Africa.”About Casper KlyngePrior to joining Zscaler, Casper Klynge had a unique career working in the intersection between geopolitics, international affairs, security and technology. Casper has a background in foreign affairs spanning several roles in the EU, NATO, and in government with geographical and operational experience from Europe, Africa, Asia and North America. His experience includes serving as Denmark’ s (&amp; the world’s first) Ambassador to the global tech industry, Ambassador to Indonesia, Papua New Guinea, Timor Leste &amp; ASEAN, and Ambassador to the Republic of Cyprus. Casper was the Deputy Head of Mission of NATO’s Provincial Reconstruction Team in Helmand Province, Afghanistan as well as Head of Mission of the EU’s civilian crisis management planning mission in Kosovo.More recently, Casper was Microsoft’s VP for European Government Affairs with responsibility for government affairs across the European continent, and the SVP in the Danish Chamber of Commerce. Casper holds a M.Sc. in Political Science, supplemented by an executive education from Stanford University. He is a 2009 Marshall Memorial Fellow and was in 2018 named among the World’s 100 most influential people in digital government. He is a member of the ECFR Council and serves on the Advisory Board of Think Tank Europe. In 2021 he joined the GLOBSEC Future Security and Defense Council (FSDC), advising NATO on geopolitics as it developed its new Strategic Concept. From 2020-2023 he served on the Executive Board of Digital Europe in Brussels.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Annual Ransomware Report Uncovers Record-Breaking Ransom Payment of US$75 Million, Reinforcing the Need for Zero Trust]]></title>
            <link>https://www.zscaler.com/press/zscaler-s-annual-ransomware-report-uncovers-record-breaking-ransom-payment-us-75-million</link>
            <guid>https://www.zscaler.com/press/zscaler-s-annual-ransomware-report-uncovers-record-breaking-ransom-payment-us-75-million</guid>
            <pubDate>Tue, 30 Jul 2024 12:00:00 GMT</pubDate>
            <description><![CDATA[Key Findings:ThreatLabz tracked an 18% increase in ransomware attacks year-over-yearManufacturing, healthcare, and technology sectors were the top targets of ransomware attacksThe United States remains the top target of ransomware, experiencing nearly 50% of overall attacks, followed by the United Kingdom, Germany, Canada, and FranceThreatLabz identified 19 new ransomware families during the analysis period, bringing the total number to 391 since tracking startedZscaler, Inc. (NASDAQ: ZS), the leader in cloud security, today published its Zscaler ThreatLabz 2024 Ransomware Report, which analyzed the ransomware threat landscape from April 2023 through April 2024. The annual report details the latest ransomware attack trends and targets, ransomware families, and effective defense strategies. Findings in the report uncovered an 18% overall increase in ransomware attacks year-over-year, as well as a record-breaking ransom payment of US$75 million – nearly double the highest publicly known ransomware payout – to the Dark Angels ransomware group. ThreatLabz believes Dark Angels’ success will drive other ransomware groups to use similar tactics, reinforcing the need for organizations to prioritize protection against rising and ever-more costly ransomware attacks.“Ransomware defense remains a top priority for CISOs in 2024. The increasing use of ransomware-as-a-service models, along with numerous zero-day attacks on legacy systems, a rise in vishing attacks and the emergence of AI-powered attacks, has led to record breaking ransom payments,” said Deepen Desai, Chief Security Officer at Zscaler. “Organizations must prioritize Zero Trust architecture to strengthen their security posture against ransomware attacks. This is where an AI-powered Zero Trust platform like Zscaler helps organizations fast-track their segmentation journeys, reducing the blast radius as well as shutting down unknown vectors for future AI-driven attacks.”Top industries impacted by ransomware&nbsp;Ransomware attacks pose significant risks to businesses of all sizes and industries. The manufacturing industry was by far the most targeted according to the report, facing more than twice as many attacks as any other industry.Industries face unique ransomware challenges based on how they operate, handle data, and their technology infrastructure. Despite the variables, ransomware extortion attacks have consistently surged, with the number of victim companies listed on data leak sites increasing by nearly 58% since last year’s ransomware report.&nbsp;Most targeted industries in ransomware attacksManufacturingHealthcareTechnologyEducationFinancial ServicesUnited States remains top targetThe United States once again faced a higher volume of ransomware attacks than any other country, accounting for nearly half of all incidents globally.Most targeted countries for ransomware attacks:United States (49.95%)United Kingdom (5.92%)Germany (4.09%)Canada (3.51%)France (3.26%)When comparing year-over-year change in ransomware attacks, the US, Italy and Mexico saw the highest increase in ransomware attacks, with staggering rises of 93%, 78% and 58%, respectively.Most active ransomware familiesWhile ransomware and other cyberthreats continue to evolve in complexity and sophistication, staying informed about the most prevalent and dangerous ransomware families is crucial for maintaining an effective security posture.ThreatLabz identified the most active ransomware families:LockBit (22%)BlackCat (aka ALPHV) (9%)8Base (8%)Top five ransomware families to watch in 2024-2025:Dark AngelsLockBitBlackCatAkiraBlack BastaZscaler helps enterprises stop ransomware with zero trust securityFrom initial reconnaissance and compromise to lateral movement, data theft and payload execution, Zscaler helps organizations stop ransomware at every stage of the attack cycle:Minimize the attack surface: Zscaler effectively minimizes the attack surface by hiding users, applications and devices behind a cloud proxy, where they are not visible or discoverable from the internet.Prevent initial compromise: The Zscaler Zero Trust Exchange employs extensive TLS/SSL inspection, browser isolation, advanced inline sandboxing and policy-driven access controls to prevent users from accessing malicious websites as well as detect unknown threats before they reach your network.&nbsp;Eliminate lateral movement: Leverage user-to-app or app-to-app segmentation so that users connect directly to applications (and apps to other apps), not the network, eliminating the risk of lateral movement.&nbsp;Stop data loss: Inline data loss prevention measures, combined with full TLS/SSL inspection, effectively thwart data theft attempts. Zscaler ensures that data is secured both in transit and at rest.For a deeper dive into best practices for protecting your organization and the full findings, download the Zscaler ThreatLabz 2024 Ransomware Report.&nbsp;MethodologyThe research methodology for this report is a comprehensive process that uses multiple data sources to identify and track ransomware trends. The report team collected data from a variety of sources between April 2023 and April 2024.&nbsp;To identify and understand ransomware activity, Zscaler utilizes its global security cloud processing over 500 trillion daily signals, blocking 9 billion threats daily, and delivering 250,000+ security updates. The ThreatLabz Threat Intelligence team tracks ransomware families at scale through reverse engineering and automating malware analysis to develop effective response strategies. ThreatLabz also works closely with international law enforcement agencies and has played a significant role in recent actions, including Operation Duck Hunt and Operation Endgame.]]></description>
            <dc:creator>press@zscaler.com (zscaler.com)</dc:creator>
        </item>
    </channel>
</rss>