Please turn on your JavaScript for this page to function normally.
3CX
3CX supply chain attack: What do we know?

Five days have passed since the supply chain attack targeting 3CX customers gained wider public attention, but the software’s manufacturer is yet to confirm how the …

network
Known unknowns: Refining your approach to uncategorized web traffic

Cybersecurity is such a complex field that even the best-trained, best-equipped, and most experienced security managers will sometimes struggle to decide which of several …

hand
Enhance security while lowering IT overhead in times of recession

“Is cybersecurity recession-proof?” That’s the question on the minds of many security professionals and executives as a possible economic downturn of indeterminate length and …

Acquisitions
Zscaler acquires Canonic Security to accelerate how enterprises address SaaS-native threats

Zscaler acquires Canonic Security to prevent organizations’ growing risks of SaaS supply chain attacks. With the massive migration to the cloud, as organizations are …

security platform
Zscaler Resilience prepares businesses for unpredictable events

Zscaler has unveiled Zscaler Resilience, incorporating a new set of capabilities that extend the resilience of Zscaler’s architecture and operations and maintain …

search
Getting data loss prevention right

When a CISO takes the wrong approach to data loss prevention (DLP), it can quickly compound into a triple loss. First, they lose their organization’s money by investing in an …

binary
85% of attacks now use encrypted channels

Malware continues to pose the greatest threat to individuals and businesses across nine key industries, with manufacturing, education and healthcare being the most commonly …

zero trust
Leveraging the full potential of zero trust

More than 90% of IT leaders who have started migrating to the cloud have implemented, are implementing, or are planning to implement a zero-trust security architecture, …

Handshake
Beyond Identity and Zscaler join forces to strengthen zero trust security strategies

Beyond Identity and Zscaler joint solution strengthens a zero trust architecture and reduces the attack surface by continuously validating the user and device and enabling …

bomb
Will cyber saber-rattling drive us to destruction?

As cyberattacks have grown increasingly destructive, nations are entertaining the idea of responding to them with conventional military forces. It is difficult to determine …

security platform
Zscaler unveils data protection innovations to help organizations mitigate security risks

Zscaler announced new data protection innovations that build upon a rich heritage of securing data across all cloud apps for data in motion, data at rest, and BYOD assets with …

Acquisitions
Zscaler acquires ShiftRight to tackle numerous security challenges

Zscaler announced it has completed its acquisition of ShiftRight, a provider of closed loop security workflow automation. ShiftRight’s workflow automation technology is …

Don't miss

Cybersecurity news