<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <title>News &amp; Announcements | Blog</title>
        <link>https://www.zscaler.com/blogs/feeds/company-news</link>
        <description>View for blog content type.</description>
        <lastBuildDate>Fri, 03 Apr 2026 20:20:10 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>RSS 2.0, JSON Feed 1.0, and Atom 1.0 generator for Node.js</generator>
        <language>en</language>
        <item>
            <title><![CDATA[AI Machine Speed is Breaking VPN Security ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/ai-machine-speed-breaking-vpn-security</link>
            <guid>https://www.zscaler.com/blogs/company-news/ai-machine-speed-breaking-vpn-security</guid>
            <pubDate>Mon, 23 Mar 2026 22:27:12 GMT</pubDate>
            <description><![CDATA[Key Findings from the Threatlabz 2026 VPN Risk Report&nbsp;Remote access isn’t a new problem. VPN risk isn’t a new conversation. What’s new, and what the Zscaler ThreatLabz 2026 VPN Risk Report makes unmistakably clear, is the speed at which the threat landscape is changing.Why this matters now:&nbsp;The #1 fear among defenders is AI speed, and it’s already showing up in the field. 79% fear AI exploitation speed. The same VPN controls that felt “good enough” even a year ago can become dangerously slow when attackers can iterate and adapt at machine speed.AI machine speed compresses the time from weakness to exploit, while VPN visibility and patch cycles often can’t keep up. Meanwhile, many organizations are still defending VPN-centric access with realities that move far slower: limited inspection coverage, and access models that can expand blast radius once a user is connected.This report is a snapshot of where the industry is right now, and a wake-up call that “good enough” remote access controls can become “not even close” when adversaries scale faster than defenders can respond.Below are the key findings from our survey of 822 IT and cybersecurity professionals. It is a real-world view of what teams are seeing and what they mean for CISOs, network/security ops, and IT leadership, followed by practical actions you can take to shrink the breach window.What the report reveals: AI is already here, and VPN visibility is laggingThe report shows AI-enabled attacks are no longer hypothetical:61% of organizations report encountering AI-enabled attacks in the last 12 months.But the bigger issue is what comes next: visibility and control. The report found:70% say they have limited or no visibility into AI-enabled threats moving over VPN. And there’s an additional layer to that visibility problem:One in five organizations cannot distinguish an AI-assisted intrusion from a conventional attack.Only one in four has managed to deploy AI-powered monitoring (24%).That combination is the perfect recipe for faster compromise. AI helps attackers iterate quickly on social engineering, reconnaissance, and targeting, while many teams still struggle to see enough of what’s happening inside VPN connections to catch abuse early.The breach window is widening because patch timelines don’t match exploit timelinesWhen critical VPN vulnerabilities emerge, the risk isn’t just the CVE. It’s the time it takes to remediate across upgrade cycles, change windows, and validation.&nbsp;The report highlights a difficult operational reality:54% of organizations say it takes a week or more to patch critical VPN vulnerabilities. It’s not just a technical problem. It’s an operational one.56% rank patching as their top operational challenge.A week may be a perfectly reasonable timeframe in traditional IT operations. In an AI-accelerated threat environment, it can be a lifetime. Attackers don’t need to “wait you out” anymore. They can identify targets, test attack paths, and operationalize new techniques quickly, often while defenders are still triaging impact, coordinating change windows, and validating fixes.Encrypted traffic is creating blind spots where attackers can operateEncryption is table stakes. But encryption without visibility can become a hiding place.The report found:1 in 3 organizations inspect 0% of encrypted VPN traffic.Even among organizations that do inspect, near-total visibility is rare.&nbsp;Only 8% can inspect virtually everything.This is a defining vulnerability in modern environments. If meaningful traffic flows are opaque, defenders lose detection opportunities and response confidence. In the AI era, adversaries can move quickly and quietly, reducing the dwell time required to be successful.Lateral movement is the multiplier once attackers get in&nbsp;Once an attacker gets a foothold, the real risk is how far they can move. The report shows that most VPN environments still grant network-level reach rather than app-level containment.&nbsp;Only 11% can restrict a compromised session to a single application.&nbsp;In other words, in the vast majority of organizations, a stolen credential can become a pathway to broader internal access. This is exactly the condition attackers exploit to move laterally and expand impact.User behavior is a risk signal, not a blame pointOne of the most actionable findings in the report is also one of the most human:63% say users bypass VPN controls to reach apps faster.The “why” behind bypass is most often about performance and reliability.Slow connections top the complaint list at 29%, followed by inconsistent device behavior (23%) and frequent disconnections (19%).This isn’t about users being careless. It’s about friction. When secure access feels slow, inconsistent, or cumbersome, people route around it to get work done. Those workarounds create “shadow access paths” that are harder to govern and easier to exploit.For IT leadership, this is a reliability and productivity warning: if access isn’t dependable, people will find alternatives.For security and network ops, it’s a control-plane warning: policy enforcement becomes fragmented across tools and paths.For CISOs, it becomes a risk governance issue: if “official access” isn’t the default, then your risk model is built on exceptions.What this means for leaders: it’s no longer “VPN secure vs not secure”The report’s headline, AI machine speed kills VPN security, is less about a single technology and more about a structural mismatch:AI accelerates attacker speed and variationVPN models often expand reach once connectedVisibility into what matters can be incomplete (especially with encryption)Patch and change timelines remain constrainedUser workarounds widen the attack surfaceThis is how breach windows open. And in 2026, breach windows don’t stay open because teams don’t care. They stay open because the architecture and operations weren’t built to close them fast enough.Containment-first access is becoming the mainstream directionThe report’s findings are pushing many organizations to evolve from network-based remote access toward app-based access principles by reducing broad connectivity, tightening access policies, and improving visibility and control without adding friction.That momentum is already mainstream:84% are planning or transitioning to zero trust, up from 78% two years ago.If you’re evaluating modernization, keep it outcome-driven:Shrink blast radius (limit what a session can reach)Improve meaningful visibility (especially around encrypted traffic patterns and sensitive apps)Enforce access using identity, context, and device postureDeliver a user experience that makes the secure path the easy pathThe hero's move isn’t “buying something.” It’s leading a shift from connectivity-first to containment-first access.The report is a benchmark—use it to take your next stepThe ThreatLabz 2026 VPN Risk Report offers more than stats. It offers a benchmark for how organizations are experiencing AI-driven pressure on VPN security visibility gaps, patch timelines, and user workarounds included.AI machine speed kills VPN security when defenders are forced to operate with broad reach, blind spots, and slow exposure windows. The way forward is measurable containment: smaller blast radius, faster detection, fewer bypass paths, and an access model built for how work happens now.&nbsp;Download the ThreatLabz 2026 VPN Risk Report to see the full data behind these findings.]]></description>
            <dc:creator>Olivia Vort (Senior Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Act Fast: RSA 2026]]></title>
            <link>https://www.zscaler.com/blogs/company-news/act-fast-rsa-2026</link>
            <guid>https://www.zscaler.com/blogs/company-news/act-fast-rsa-2026</guid>
            <pubDate>Fri, 20 Mar 2026 16:00:05 GMT</pubDate>
            <description><![CDATA[Next week, the cybersecurity industry gathers in San Francisco for the RSA Conference. While the scale of the event is always a spectacle, its true value lies in how it nurtures the realignment in our collective understanding of risk.This year, that understanding must undergo a fast and fundamental shift because the systems we are trying to secure no longer behave like bounded systems. They behave as networks of decisions which carry risk in every direction.&nbsp;From Static Systems to Dynamic Supply ChainsEnterprise security once relied on a comfortable assumption: systems were bounded and knowable. AI has rendered that assumption obsolete.A single interaction with an AI assistant can trigger a cascade of activity across external models, APIs, and autonomous agents. Data leaves, transforms, and returns. Decisions are delegated across components that often lack a unified security posture. We are no longer just managing applications; we are overseeing AI supply chains.Risk in these environments is not confined to a single breach point. It emerges from the relationships between components. Our research at ThreatLabz confirms the fragility of this new architecture: in controlled testing, 100% of enterprise AI systems analyzed exhibited exploitable vulnerabilities. Often, a full compromise required nothing more than a single interaction.We have also spent years optimizing detection and response, a model that assumes we have time to act. In the age of AI, that time has further evaporated to nothing.Findings from the ThreatLabz 2026 AI Security Report show that AI systems can fail in as little as one second, with a median time to compromise measured in mere minutes. There is no meaningful dwell time in this scenario. There is only the interaction.This implies a hard truth: security cannot be an afterthought. It must exist within the flow of transactions everywhere.Extending Zero Trust to the InteractionThe shift from bounded systems to distributed networks requires a fundamental evolution of our security principles. Zero Trust has traditionally focused on verifying users, devices, and networks. In the age of AI, we must extend this to the interaction.Continuous Evaluation: Trust cannot be granted at the point of entry and assumed thereafter. It must be reassessed at every step of the decision chain.Visibility Beyond the Edge: Security must be able to follow the data and context as they move across models and third-party services.Inline Control: Policies must operate at the point of interaction, where decisions are made, rather than after an outcome is produced.The gap in security today isn't a lack of tools, but a mismatch of models. The traditional perimeter has not just dissolved; it has been replaced by a complex web of AI supply chains and model interactions. While we have focused on securing the edges of environments that are no longer bounded, the true risk has moved to the interaction layer. Understanding and governing the AI supply chain is the only way to close that gap. At RSA, we need to move past the hype and discuss the practical architecture required to secure these dynamic high-velocity workflows.&nbsp;Complexity is a Gift to the AdversaryOne of the biggest challenges I regularly hear from CISOs is the exhaustion caused by tool sprawl. Over the last decade, organizations have layered point product upon point product. While each was intended to solve a specific problem, the collective result is a fragmented mess that creates fatal blind spots.Amongst the many other challenges, every siloed tool is an opportunity for a threat actor. This is why the industry is increasingly shifting toward platform-based security architectures that unify visibility across users, devices, applications, data, and now AI interactions.You will hear a lot of noise about end-to-end solutions next week. However, there is a fundamental difference between a suite of products stitched together and a platform built from the ground up to share intelligence. A cloud-native AI security platform doesn’t just reduce costs; it provides the inline context and automation needed to solve complexity and outpace threats. In a world of high-velocity attacks, simplification is a strategic imperative.Alignment at RSAThe industry does not lack awareness; it lacks alignment between how systems are built and how they are secured. At RSA, we will demonstrate how the Zscaler AI Security Platform applies Zero Trust to this new reality—securing the interactions that now define enterprise risk.We invite you to visit us at Booth #N-5269 and connect with the Zscaler team to discuss how to discover your AI supply chain, reduce risk fast, and stay secure.I look forward to seeing many of you in San Francisco.]]></description>
            <dc:creator>Sunil Frida (Chief Marketing Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[See You at RSA 2026]]></title>
            <link>https://www.zscaler.com/blogs/company-news/see-you-rsa-2026</link>
            <guid>https://www.zscaler.com/blogs/company-news/see-you-rsa-2026</guid>
            <pubDate>Fri, 13 Mar 2026 17:01:59 GMT</pubDate>
            <description><![CDATA[Every year, the cybersecurity industry gathers in San Francisco for one reason.RSA.For one week, Moscone becomes the center of the security world. Thousands of practitioners, builders, researchers, CISOs, and innovators come together to share ideas, debate the future, and challenge how security needs to evolve.The conversations start early. They spill out into the hallways, across the show floor, and late into the night.And every year, the drumbeat gets louder.This year feels different.AI is changing how every organization works, builds, and innovates. At the same time, it is expanding the attack surface and accelerating the pace of risk. Security leaders everywhere are asking the same question:How do we move faster without losing control?That is the conversation we are bringing to RSAC 2026.Meet with us | Learn more | Register for RSAC 2026What Zscaler Is Bringing to RSACAt Booth #N-5269, the Zscaler team will be showcasing the AI Security Platform built on Zero Trust.Not as a concept.As something you can see, experience, and challenge with your toughest questions.Throughout the week we will be demonstrating how organizations are applying security outcomes that matter:Zero Trust EverywhereSecure every user, every app, and every location.Secure AI EverywhereProtect AI adoption and govern how AI is used across your organization.Protect Data EverywhereDiscover sensitive data automatically, secure it across all channels including AI, and prevent exposure before it becomes a breach.Reduce Risk EverywhereUnify exposure and threat management and accelerate response with intelligent security operations.If you are navigating AI adoption, updating your architecture, or simply trying to reduce complexity in your environment, these are conversations worth having.Must See Sessions at RSARSA is always packed with great content, and this year the Zscaler team is bringing five different sessions to get excited about. These are conversations that get to the heart of what security leaders are navigating right now.March 23 | 10:15 – 10:45 AM: Join Jay Chaudry, CEO of Zscaler at the CSA Summit 2026 where he will be discussing Zero Trust and AI as the architecture for the intelligent age with Alan Rosa, CISO, CVS.March 24, 2026 | 9:40 AM – 10:30 AM: Securing GenAI Adoption: Usage Insights, Threats, and Defenses with Deepen Desai, EVP Engineering (Agentic Security Operations) and Dhawal Sharma, EVP Products & Strategy (AI Security).March 24, 2026 | 1:15 – 2:45 PM: Hands-On Threat Hunt: Building a Dynamic Hunt Program with Michael Wylie, Director of Threat Hunting.March 25, 2026 | 12:00 PM – 12:50 PM: What Are You, Really? Authenticating Workloads in a Zero Trust World with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist.March 25, 2026 | 2:25 PM – 3:15 PM: MASQUE of the Red Death: Rethinking Secure Connectivity with Sam Curry, SVP Global CISO and Yaroslav Rosomakho, Chief Scientist.What I Love About RSARSA is not just about products.It is about the community.It is the one week a year where the entire security industry shows up in one place. The hallway conversations. The sessions. The spontaneous debates about what’s working and what’s not.Some of the most valuable moments happen between meetings, events, and the show floor.That is why so many of us continue to show up every year.And it’s why I am excited for this one.Let’s Connect at RSACIf you are heading to San Francisco, come find us.Stop by the booth. Watch a demo. Attend a speaking session. Challenge our thinking. Share what you are seeing inside your organization.The best part of RSA has always been the conversations.We cannot wait to have them.We will see you at RSAC 2026.Booth #N-5269Moscone Center | San FranciscoAct Fast. Stay Secure.Meet with us | Learn more | Register for RSAC 2026]]></description>
            <dc:creator>Emily Laufer (Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Restrict risk not innovation.  A new mindset for the Financial Services boardroom]]></title>
            <link>https://www.zscaler.com/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</link>
            <guid>https://www.zscaler.com/blogs/company-news/restrict-risk-not-innovation-a-new-mindset-for-the-financial-services-boardroom</guid>
            <pubDate>Fri, 13 Mar 2026 13:03:01 GMT</pubDate>
            <description><![CDATA[I met with a CISO last week who could see clear gaps in his internal and external security posture because users were free to disable security controls. He knew it was creating risk but didn’t want to change it because of a ‘user-first’ mentality. This is not a user-centric behaviour, it is creating risk that your organization (and, incidentally, your users) doesn’t need.When caution is risky&nbsp;Big banks can’t out-innovate digital challengers if all their energy is spent ticking compliance boxes. And, if we look at where AI accountability is headed, it’s clear innovation will keep drawing the short straw.&nbsp;That ‘stay in your lane’ understanding between business versus IT is old-school at best, counter-productive at worst. The days of leadership seeing security issues as “something that IT handles” are gone. Singapore is already considering holding top banking execs&nbsp;personally accountable for AI-related risks.&nbsp;If this becomes a global benchmark, leaders will shoot down more bold bets. They will cling to compliance because it feels safe, even if it costs them the win. Customers won’t wait around. If you stall, or seem irrelevant, they’ll jump to the next shiny thing.C-Suite must greenlight innovation to stay competitive. But each new system, AI-driven service or merger comes with risk. Regulators don’t ease up. Every move you make needs evidence, signatures, and someone to blame if it goes wrong. In the financial sector, none of this is new, and it doesn’t go away. Question is, can we protect innovation in this security-first space? Yes. Can we do it without AI? No. If innovation needs confidence and speed, AI gives you the speed. The confidence? That’s where people freeze.Make it safe to go fastIndecision is expensive. While the board takes six months to debate pros and cons of a new capability, a hundred fintechs have beat them to it. It isn’t caution, it’s self-sabotage. They recognize the opportunity but, still, they hesitate.&nbsp;The problem is how we view security. Security isn’t the brakes. It’s the helmet, the seatbelt, and the training the driver gets. You need a roll cage in place. Something that allows you to take the corners at speed, that lets you push hard without worrying that the whole thing will flip over.&nbsp;This is where zero trust comes in. Talk of it is everywhere. Most of it is noise. Here’s what matters: zero trust&nbsp;IS that roll cage. It lets you move fast because it’s built to expect failure and limit the blast radius. It assumes nothing and checks everything; it contains damage, not creative ideas.&nbsp;If the board had the comfort to commit to fast change, they could stop asking “Is this safe?” and start asking “How far can we push this idea?” That’s leadership freedom. It’s not about slowing innovation but about making it safe to maintain speed. Zero trust transforms security from ‘the office of No’ into the foundation that lets the business say “Yes” faster. It gives leaders the confidence to make bold calls.What’s the alternative, really? Keep playing defense? Keep letting legacy liabilities dictate your pace of innovation? Do that and watch competitors lap you.&nbsp;Zero Trust isn’t procurement. It’s postureJust remember not to treat zero trust deployment like a checkbox exercise. It’s a mindset. It’s not just buying a tool; it’s rethinking access, identity, and trust across your entire environment. Beware of vendors who pitch zero trust like it’s a product you can buy on a Tuesday and deploy by Thursday. If someone promises you zero trust in a box, they’re selling you a box.It takes effort to build a great zero trust foundation because ‘verify everything’ isn’t one-size-fits-all. You must define exactly what that means for your business: which users can touch which applications, under what conditions, and which data is truly business‑critical versus routine. It relies on identity‑led policies, granular application access, and data classification that reflects real risk, not blanket permissions or inherited trust.Getting all of this right takes planning and discipline. But done properly, it’s the difference between leading and lagging. This is why zero trust is a leadership issue, not just a technical one.So, here’s my question: What’s the project you’ve been sitting on because you couldn’t justify the risk… to your budget, time, people? What would it take to greenlight it tomorrow?Restrict risk, not innovation:&nbsp;Before you greenlight that project you’ve been sitting on, read&nbsp;The Ripple Effect: A Hallmark of Resilient Cybersecurity for a clear blueprint on extending resilience beyond your walls.]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Ripple Effect: Why Your Cyber Resilience Must Look Beyond Your Walls]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-ripple-effect-why-your-cyber-resilience-must-look-beyond-your-walls</guid>
            <pubDate>Fri, 27 Feb 2026 20:34:22 GMT</pubDate>
            <description><![CDATA[The world is becoming riskier by the day. From AI-fueled cyberattacks and the looming threat of quantum computing to geopolitical tensions and supply chain volatility, external forces are sending shockwaves through every business. For organizations striving for business continuity and agility, simply reacting to these disruptions is no longer enough. Resilience must evolve from an internal defense mechanism to an outward-facing design principle.To better understand how organizations are navigating these external pressures, Zscaler surveyed 1,750 IT leaders across 14 global markets. While engagement and investment in cyber resilience are high, our findings reveal a crucial gap: business confidence often reflects a perceived control over internal systems rather than true preparedness for external disruption. A majority (61%) of IT leaders worldwide admit their resilience strategies remain too inward-looking.This year’s report,&nbsp;The Ripple Effect: A Hallmark of Resilient Cybersecurity, argues that true resilience must ripple outward across dependency layers—such as partners, platforms, and supply chains—to absorb and dampen external shockwaves before they destabilize operations. By adopting a Resilience by Design approach that extends beyond the walls of the enterprise, organizations can embed the capacity to withstand the inevitable.Critical Gaps: Where Inward Focus FailsInward-facing security exposes organizations in four key areas. First, third-party reliance is a significant source of vulnerability: 68% rely more on third parties, but less than half have updated their resilience strategy, and adoption of risk controls is under 50%. This high-stakes gap led to 60% of organizations experiencing a significant supplier-caused failure last year. What’s more alarming is that only half of the organizations (54%) are covered for third-party compromise by cyber insurance. Second, evolving technology presents a challenge: 52% of IT leaders feel their current security can't defend against existing or emerging threats like agentic AI and quantum computing. While 42% are testing and 34% have deployed agentic AI, half did so without governance. Seven out of ten lack visibility into "shadow AI" use, with 56% fearing sensitive data exposure. Moreover, 57% haven't factored Post-Quantum Cryptography (PQC) into their security strategy, despite 60% recognizing today's stolen data could be at risk in 3-5 years. Third, macroeconomic pressure is forcing rapid shifts: 74% of IT leaders agree the macroenvironment forces quick pivots. While planning has increased (71% regulatory compliance, 69% data localization), much remains reactive.&nbsp;Foreign technology dependency is impacting discussions around sovereignty policies and regulations and drives proactive change: Our survey shows IT leaders are actively mitigating this risk: 79% are evaluating their dependency on foreign-technology, while six in 10 have updated their cyber resilience strategy in the past year to comply with new or evolving sovereignty demands. Last year, 60% updated their cyber resilience strategies in response to changing regulations, such as NIS2, DORA and GDPR&nbsp;Finally, legacy architecture remains a significant hurdle, with 81% still critically or moderately relying on legacy systems. 64% of respondents also admitted their current infrastructure hinders effective response to failures, and 59% say their architecture can't keep pace with business change. For organizations to become truly resilient they must conduct external stress-testing, like simulating quantum disruption, AI innovation, and supplier interdependence, to uncover hidden risks.&nbsp;Extending Your Resilience by Design: Three ActionsTo close security gaps and unleash the protective "Ripple Effect," organizations must extend their resilience thinking outward. This involves prioritizing visibility and embedding proactive risk hunting everywhere, moving beyond internal systems to the external forces shaping operational risk and following data across internal systems, external partners, and the entire supply chain. Achieving this requires three strategic shifts:Zoom out and make architectural pivots manageable: Agility is key, requiring flexible architectures that can pivot in response to fast-changing external threats. Platform design simplifies this adaptation; complexity is the enemy of agility, and decoupling security from network infrastructure is essential for unencumbered speed.Prioritize visibility and embed proactive risk hunting everywhere: Move from reactive threat hunting to proactive risk hunting, following your data everywhere—across internal systems, external partners, and the entire supply chain.Build up, because future proofing is an evolution, not a leap: With a strong, interoperable platform architecture, future-proofing becomes an evolution. For example, securing Agentic AI builds on existing Data Loss Protection (DLP), and Post-Quantum Cryptography readiness is a manageable process of visibility and incremental updates.Enabling resilience that ripples outwardsThe Zscaler Zero Trust Exchange is engineered to deliver this extended, outward-facing resilience. As a cloud-native security platform it allows organizations to:Prioritize Visibility: with one single overlay security platform that powers Data Security, AI Security, and third-party security, giving end-to-end control across the full risk surface, including contractors and supply chains.Simplify with a platform approach It decouples security from network infrastructure, enabling secure, identity-based connections and allowing organizations to reconfigure markets or data flows quickly as conditions change, even meeting data sovereignty requirements with 25 data centers across Europe.Provide the ability to adapt fast based on Zero Trust: It provides an evolutionary pathway, where GenAI Security and Post-Quantum Cryptography Visibility are simply capabilities switched on from a single dashboard, building on unified controls to provide long-term readiness.In today’s third-party economy, an organization’s resilience is only as strong as the ecosystem they depend on. If an organization doesn’t design and continuously validate controls across suppliers, contractors, and shared platforms, the partner’s incident becomes their outage.To thrive amid uncertainty, organizations must build resilience from the inside out and move from reactive measures to proactive, deliberate action.Build resilience on strong foundations so that the protection it offers ripples outward, reducing the impact of the external shockwaves beyond your control.Need guidance? Reach out to Zscaler to amplify the ripple effect in your organization and check out the full report&nbsp;here.]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[MWC 26: Zscaler Cellular provides a secure and connected world with Telecommunication partners]]></title>
            <link>https://www.zscaler.com/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</link>
            <guid>https://www.zscaler.com/blogs/company-news/mwc-26-zscaler-cellular-provides-a-secure-and-connected-world-with-telecommunication-partners</guid>
            <pubDate>Thu, 19 Feb 2026 09:44:23 GMT</pubDate>
            <description><![CDATA[Mobile World Congress is where industries come together to shape what’s next in connectivity - from cellular and private networks to massive-scale IoT. But as enterprises accelerate deployment of connected devices in all manner of environments, from warehouses and retail kiosks to EV chargers and smart city infrastructure, security teams are facing a hard truth: traditional, network-based security models were not built for today’s highly mobile and distributed cellular environments. With AI tools and services booming in organizations, the need for secure device connectivity and accurate data is bigger than ever before.Legacy approaches to cellular-connected security often rely on costly backhaul architectures and infrastructure that can’t scale at the speed of business. Many of these devices operate beyond the practical reach of firewalls, VPNs, and software agents. They are often deployed in hard-to-access locations, managed by different teams, and moved across regions and borders. As a result, organizations struggle with the fundamentals: having visibility into all data streams, controlling how devices connect, enforcing consistent policy, and responding fast when something changes. That lack of visibility and control creates security vulnerabilities and expands organizations' attack surface in exactly the places attackers increasingly target.Zscaler Cellular eliminates these challenges by embedding Zero Trust protection into the SIM itself. That means every packet of data from a cellular-connected device can be evaluated at the first connection—enabling real-time policy enforcement and secure routing through Zscaler’s global, cloud-native security platform. This is a foundational shift from “add security later” to initiate security immediately, at the point where connectivity begins.Visibility and control in “black box” cellular ecosystemsIn many cellular deployments, the customer experience has historically been connectivity-heavy. But security and application-level control are typically left to the enterprise, creating a shared responsibility model where the biggest immediate gap is often visibility. Zscaler Cellular addresses that gap from day one by enabling organizations to treat each asset as an isolated environment, aligned with the Zero Trust architecture. Assets can communicate only according to policy, rather than inheriting implicit trust simply because they are connected. A modern cellular security approach can pair carrier resilience with a control plane for SIM management, while adding security policy enforcement on top turning a fragmented, opaque environment into something measurable and governable. Based on its initial success with the cellular security offer, Zscaler takes the cellular service one step further into the connectivity world.Zscaler partners with leading telecommunications companies to bring advanced Zero Trust security to cellular-connected devices. Connectivity has always been perceived as part of the end-to-end solution and Zscaler is focused on delivering a complete outcome to customers, together with the telecommunication service provider; Providing secure access, protection, and visibility for cellular-connected environments at cloud scale. By leveraging the Zscaler Zero Trust Exchange with telecom infrastructure, Zscaler Cellular delivers secure, scalable, and seamless connectivity to all kinds of mobile devices or things.&nbsp;For enterprises, these partnerships help deliver managed security services that address the unique challenges of securing distributed, cellular-connected environments and thus extending Zero Trust principles across global cellular networks to reduce risk and enable transformation at scale.&nbsp;Partnering with providers to extend reach without heavy liftThat is the reason why Zscaler is investing in partnerships with telecom service providers at this year's MWC. Those partners bring&nbsp;reach, spectrum, and the connectivity footprint, while Zscaler enables&nbsp;Zero Trust security, visibility, and control for the data streams. Zscaler has always been an overlay technology as we don’t depend on&nbsp;how packets move from A to B, but rather focus on securing the conversation between the source and destination. Based on this handshake, providers can deliver an end-to-end offering that customers are actively asking for. This partner-led approach supports the customer‘s choice. Some organizations want to keep their existing provider relationships and SIM estates. Others prefer a fully managed solution. Mobile World Congress 2026 is the right moment for telecom providers to turn security into a growth engine.&nbsp;Zscaler is working with a select set of telecom providers like NTT and Singtel amongst others to build deep integrations that benefit both sides. Providers can continue selling their own SIMs domestically, while enabling customers with international footprints to extend secure connectivity through Zscaler Cellular, delivered via the provider relationship. The result is a practical way for service providers to expand reach and local breakout options without requiring large upfront investments in new equipment or complex deployments. This allows telecom providers to monetize next-generation 5G networks and security with one of the most powerful value-add services they can bring to market. Zscaler has built a global, cloud-native security backbone that now also understands mobile networking. By integrating with Zscaler Cellular, providers can accelerate secure local breakout and deliver 5G-ready experiences with an enterprise-grade security layer without forcing major capital expenditure or rebuilding their portfolios from scratch.Ask for your personal meeting with the Zscaler team on site via this&nbsp;meeting scheduler. See you in Barcelona at MWC!]]></description>
            <dc:creator>Daan Huybregts (Head of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore Highlights Resilience and the secure Future of AI]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</link>
            <guid>https://www.zscaler.com/blogs/company-news/zenith-live-encore-highlights-resilience-and-the-secure-future-of-ai</guid>
            <pubDate>Mon, 22 Dec 2025 13:40:26 GMT</pubDate>
            <description><![CDATA[It was a privilege to join my colleagues on stage for Zenith Live Encore in London earlier this month at the Vision Hall in King’s Cross. Alongside Lee Langley we welcomed over 400 security leaders and innovators to discuss the convergence of AI and Zero Trust. The energy was palpable, and if you couldn’t join us, here is a summary of the key themes and discussions that defined the day.&nbsp;A year of bold transformationThe pace of transformation across EMEA over the last 12 months has been remarkable. We are proud to having been able to help a growing number of organizations fully embrace Zero Trust, consolidate their platforms, and effectively counter real-world threats.&nbsp;However, as we move forward, the lines between internal networks and the public cloud have become increasingly blurred. To navigate this evolution, organizations must shift their mindset. I am continually inspired by the boldness and innovation demonstrated by our customers, but we must all recognize that we aren’t just deploying technology for technology’s sake, we are deploying it to solve critical business challenges.&nbsp;Value over enforcementIn a session on Secure AI Innovations led by James Tucker, Head of CISO at Zscaler, we dug into the reality of AI adoption. There was a clear consensus: the implementation of AI is fundamentally a business process discussion. We need to move from application to finding genuine value. This means focusing on what brings the most time back to employees and identifying where the biggest vulnerabilities lie. Often, the simplest problems to identify are the most complex to solve, which is why bringing employees into the conversation is vital to understand what AI tools they are using to bridge these gaps. This insight is critical for mapping the true flow of data across an organization is a necessary step when we accept that the AI universe is in fact a data security challenge.&nbsp;Speed vs. security – can we have both?&nbsp;One of the day’s standout moments was our industry panel, “The Need for Speed (And Security): Enabling Agentic AI Innovation Without Hitting the Brakes”. Featuring insights from Zeki Turedi, Field CTO at CrowdStrike, Rob Hale, Principal EMEA Security Leader at AWS, and Yaroslav Rosomakho as Zscaler Chief Scientist. The discussion underscored that we are in the midst of the Agentic era and shifting from where AI simply automates tasks but actively executes them on our behalf. This means that we will face more adversaries and more threats than ever before, requiring our defenses to keep pace.&nbsp;As AI agents become more autonomous, the attack surface expands, making it even more of a challenge to enable innovation without wanting to take pause. For security leaders, this means we now need to find that delicate balance and apply a slight break to ensure that we can move at the speed of AI, while still maintaining robust Zero Trust principles.&nbsp;Zero Trust EverywhereFrom disrupting new cyberthreats online, to hearing the real-world stories shared on stage, I feel even more assured that security must be woven into the very fabric of our digital future. And our mission – Zero Trust Everywhere, Powered by AI – is the blueprint for that future.&nbsp;But we cannot do it alone and none of this is possible without the trust of our customers and the dedication of our partners. Thank you for your continued faith in us and I look forward to seeing you all at our next&nbsp;event in January 2026 where we will demonstrate how organisations can accelerate their AI initiatives with Zero Trust.&nbsp;]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zenith Live Encore: How to Build a Resilient Digital Future with Zero Trust and AI]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</link>
            <guid>https://www.zscaler.com/blogs/company-news/zenith-live-encore-how-to-build-a-resilient-digital-future-with-zero-trust-and-ai</guid>
            <pubDate>Wed, 26 Nov 2025 21:50:57 GMT</pubDate>
            <description><![CDATA[Organizations face unprecedented pressure to push their technological boundaries as AI adoption accelerates and competition intensifies. However, the current pace of AI integration far outstrips the speed in which organizations normally assess and address the risks. As a result, the race between innovation, speed and security is leaving defenders in an increasingly vulnerable position.&nbsp;IT security practitioners must enable this new technology’s use - whether public tools or internal deployments - while establishing reasonable guardrails that ensure visibility and robust data security assessments. Organizations are urgently seeking best practices to navigate AI-driven transformation. Extending Zero Trust principles to regain visibility and control of all data streams is now more critical than ever.As companies rethink how employees safely consume generative or agentic applications, they must also apply Zero Trust to their broader ecosystem of suppliers, partners, and B2B integrations. Modern supply chains increasingly share data, applications, and now AI models - creating a new attack surface if not properly secured.That’s why Zscaler’s Zenith Live event series is returning in its one-day roadshow format across Europe - turning AI insights into action. The events will showcase how a cloud-based approach to Zero Trust Everywhere can help security practitioners reduce risk, complexity, and cost in the new technology era. Zscaler experts will reveal how AI and Zero Trust are converging to redefine networking and security, fuelling rapid digital transformation and building resilient, mission-critical infrastructures to safeguard today's business aspirations.&nbsp;Participants will discover how a cloud-centric Zero Trust approach is redefining security to protect every connection, from users and workloads to IoT, OT, branches, and even AI. Security practitioners, IT architects, or networking professionals will gain practical insights and tools to drive real transformation, learning from their peers how to reset boundaries&nbsp; in the pursuit of digitalization while carefully managing cybersecurity risks. Zscaler experts will be on hand to share the latest strategies to minimize attack surfaces, eliminate lateral movement and prevent data loss.&nbsp;Following the recent SPLX acquisition, attendees will get first-hand insights at how this addition to the Zero Trust Exchange platform will extend shift-left AI asset discovery, automated red teaming, and governance - helping organizations secure their AI investments from development through deployment. We’re also bringing back industry panels and fireside chats, offering attendees the opportunity to learn from industry leaders and network with their peers.Agentic AI – Friend or Foe?As part of the agenda, we will also be speaking with Zscaler customers at different stages of their Zero Trust transformation journey. Panellists from leading private and public organizations will share their learnings in a ‘fireside chat’ - helping others who wish to take that first step towards a Zero Trust architecture. Having overcome their own implementation challenges, they’ll offer insights and guidance to make Zero Trust a reality.&nbsp;New this year: a panel on the emergence, adoption and security of Agentic AI. Zeki Turedi, Field CTO at Crowdstrike, and Rob Hale, Principal Security Segment Leader at AWS, will debate whether Agentic AI is a friend or foe - and underline the importance of retaining control over critical digital infrastructure, redefining data governance, and unlocking innovation securely.To learn more about the Zenith Live Encore agenda in your city and discover how Zscaler secures data, applications, devices and users on organizations’ transformation journeys, visit the&nbsp;registration site. See you in London on Tuesday, 9th of December 2025 in Vision Hall!&nbsp;]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Enabling Europe’s Digital Sovereignty Through Technology]]></title>
            <link>https://www.zscaler.com/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</link>
            <guid>https://www.zscaler.com/blogs/company-news/enabling-europes-digital-sovereignty-through-technology</guid>
            <pubDate>Fri, 14 Nov 2025 20:21:06 GMT</pubDate>
            <description><![CDATA[For years, Europe has discussed the concept of digital sovereignty, but geopolitical fragmentation and a growing ambition for technological independence have moved the discussion from theory toward action. On November 18, the French and German governments will host a high-level summit aimed at turning this aspiration into a practical roadmap. It’s a pivotal moment as policymakers, industry leaders, and advocates unite to safeguard Europe’s digital future.Let’s be clear: Europe is charting new territory. The ambition to secure control over critical digital infrastructure, redefine data governance, and unlock innovation is bold, understandable, and yet complex. It is, however, not a concept with a clear definition. In fact, if one visited the various EU capitals one would probably encounter more than 27 different versions of what “digital sovereignty” could mean. But the lack of one coherent and agreed upon definition should not be misunderstood. To paraphrase a senior official from one of the largest member states during a recent conversation: The call for digital sovereignty is loud and ideological.&nbsp;In Europe, there is indeed an increasing convergence on a number of principles. First and foremost, it’s about securing the future; about being in control of data, being independent, ensuring service continuity, demanding transparency, and making sure that Europe reaps the benefits of the digital age and remains competitive on the global stage.The tech industry has a responsibility to respond in earnest. At Zscaler, we understand the critical nature of this goal. We believe sovereignty must be achieved on European terms. As a global leader in cybersecurity with almost 2,500 customers across Europe, we are committed to innovating and delivering cutting-edge technology that aligns with and supports Europe’s digital vision. As a testament to this commitment Zscaler was in 2010 the first security service provider to build a cloud for Europe.Ahead of the Summit in Berlin, we offer our perspective on some of the defining elements of digital sovereignty and explore how solutions deliver the security, flexibility, and independence European organizations demand to thrive in today’s interconnected world.1. Safeguarding European DataEurope’s data must be private, secure, and local. As organizations adopt global cloud systems, they are concerned about losing control over sensitive information to outside actors or cyberthreats. Data sovereignty is about keeping data protected, and ensuring compliance with national rules while building trust for critical operations.How Zscaler Supports Europe’s Data Protection and Localization Goals:Zscaler does not store end-user content: All inline traffic processing is performed in-memory inside the local infrastructure, simplifying data control.The Zscaler Zero Trust Exchange secures application access without exposing sensitive data.The platform’s cloud-native design leverages encryption, data visibility, and granular access controls, seamlessly aligning with GDPR and broader compliance requirements.Customers can opt to exclusively use European infrastructure. Zscaler has 25 data centers across Europe (20 in EU countries), ensuring data processing happens locally for optimal performance and sovereignty.European customers' can ensure that their log data is stored within Europe. However, customers have full control over storage decisions and have the option to have data hosted in any sovereign or in-country logging zones.Zscaler makes data control simple and enables organizations to uphold the principles of Privacy by Design and Privacy by Default while delivering low-latency, highly secure access.&nbsp;2. Securing Digital AutonomyDigital sovereignty involves reducing overreliance on foreign technologies, and keeping control over systems. Europe needs flexible frameworks that avoid vendor lock-in while enabling secure innovation. Without autonomy, organizations risk being limited in how they evolve and protect their most critical digital assets.How Zscaler Facilitates Europe's Technological Independence and Cybersecurity Goals:Enabling Europe’s Technological Independence:Zscaler’s vendor-neutral architecture allows European businesses to retain flexibility in their IT frameworks, allowing organisations to mix and match solutions across cloud, data, endpoint, identity, and services from different technology providers. For more information, please visit:&nbsp;/partners/technologyZscaler facilitates delegation of administration which allows only EU citizens to define policies, logging and viewing of any data on our platform.A cloud-based approach ensures businesses can reduce dependencies on legacy systems while avoiding vendor lock-in, preserving sovereignty and freedom to innovate.Zscaler ensures businesses can migrate from legacy systems without being locked into specific hardware, proprietary ecosystems, or constrained by external dependencies.Securing Europe’s Critical Infrastructure:With Zscaler’s Zero Trust architecture, users and devices are continuously authenticated and authorized before accessing applications, preventing breaches.Zscaler’s advanced threat protection capabilities protect organisations from malware, Zero-Day vulnerabilities, and AI-driven cyberthreats, while safeguarding operations across the continent.Zscaler is working with hosting and service providers to own & operate sovereign solutions built on Zscaler cloud solutions in their European datacenters.&nbsp;Zscaler is redefining security for a resilient, self-reliant Europe by blending cutting-edge technology with scalable and best-in-class security.3. Accelerating InnovationInnovation drives growth and competitiveness, and Europe must embrace new technologies to stay ahead. To succeed, organizations need to adopt solutions that are secure and compliant, while still giving them the ability to operate and scale confidently without putting sensitive data at risk.How Zscaler Facilitates Europe’s Innovation and Competitiveness Goals:By facilitating secure, cloud-first strategies, Zscaler reduces infrastructure costs, freeing resources for new investments in innovation and growth. Scalable, flexible solutions allow organizations to confidently adopt emerging technologies.With Zscaler’s capabilities, businesses can seamlessly enable secure hybrid work environments, delivering security and flexibility for modern workplaces.Zscaler innovates, improves operational efficiencies, and responds to market trends faster, gaining a critical edge against international competitors, while maintaining compliance with Europe’s rigorous regulatory standards.A no-compromise Zero Trust approach ensures that organizations can innovate and expand without exposing their systems, people, or data to unnecessary risk.At the same time, a transition away from legacy technology offers the additional advantage of combining state-of-the-art protection while reducing costs: Unlike previous technological innovations, moving forward saves resources.&nbsp;Zscaler redefines what it means to innovate securely in the digital age, ensuring that European businesses grow and stay competitive internationally.4. Delivering Responsible AIAI has the potential to transform the digital economy, but it also brings security vulnerabilities and the risk of misuse. Europe’s goal is to adopt AI responsibly by focusing on privacy, ethical standards, and robust safeguards that ensure trust and transparency in AI systems.&nbsp;As recently recommended in a joint report&nbsp;by French and German authorities, Zero Trust must be applied to LLM systems to address AI-specific security challenges.How Zscaler Enables Responsible AI Adoption:Achieving the productivity gains from AI requires that the AI systems can run safely without exposing organizations to risk.Zscaler is committed to ensuring that any AI systems it deploys in its products adheres to the regulatory requirements set forth in the EU AI Act, which is the first comprehensive AI regulatory framework enacted in the world establishing global standards for transparency, fairness, and accountability in AI.Zero Trust principles protect sensitive AI datasets and data pipelines, preventing manipulation, theft, and malicious exploitation while preserving the integrity of algorithms and models.Through Zero Trust architecture, Zscaler safeguards the use of AI models, agentic AI, and their data pipelines, ensuring the integrity of AI solutions.Zscaler helps European organizations maximize the potential of AI, meeting ethical standards, and protecting systems and data pipelines against misuse.5. Providing Operational ResilienceDisruptions from cyberattacks, natural disasters, damage to undersea cables, and political uncertainty can threaten critical systems and data. Operational resilience helps businesses stay functional and secure during such events, ensuring stability and continuity even in unforeseen circumstances.How Zscaler Bolsters Operational Resilience:Zscaler’s Zero Trust architecture ensures secure, direct access to cloud services and applications, even during disruptions caused by internet outages or attacks on critical infrastructure such as undersea cables, due to our resilient data center architecture, keeping European businesses operational when it matters most.With real-time threat protection, Zscaler prevents ransomware and other cyber threats from disrupting critical infrastructure and business operations.Zscaler provides secure, flexible access that supports employees working from anywhere while maintaining security standards.By decoupling security from legacy network models, and embracing cloud-native solutions, Zscaler empowers organizations to adapt quickly to shifting geopolitical conditions, ensuring business continuity in even the most uncertain environments.Zscaler is the first cloud security solution to deliver a business continuity solution.&nbsp; Through either customer-hosted or third-party hosted infrastructure, Zscaler customers are protected from service interruptions due to black-outs, brown-outs, catastrophic failures of infrastructure, terrorism, or regulatory/policy changes.&nbsp; Issues local to the user, between the user and the cloud, or a cloud incident are detected and fail-over to a business continuity solution occurs automatically.Our customers have an option to keep using a self-hosted private service edge even in case of a catastrophic global routing event which would make all cloud services unavailable.Zscaler builds resilience into organizations’ systems, protecting operations against disruptions and safeguarding sovereignty goals.Zscaler delivers destination agility and resilience by dynamically rerouting traffic and adapting paths in real time, maintaining secure and continuous connectivity during internet or cloud disruptions.The New Reality Requires a Renewed Commitment to Europe’s Digital FutureAs we approach the Franco-German Summit on European Digital Sovereignty, two principles stand out as essential to the success of Europe’s digital ambitions:Digital sovereignty and open strategic autonomy must be shaped on European terms, driven by European priorities and values. This means that technology companies must innovate and deliver solutions that align with Europe’s needs and aspirations.Trusted technology providers that deliver Europe’s sovereignty in practice—not just in words—should be empowered to keep contributing to this vision. EU policy should allow trusted technology providers that demonstrably advance Europe’s sovereignty to continue contributing to this vision.Combining these principles is, in our view, critical to achieving Europe’s sovereign digital future, as well as its global competitiveness at this pivotal moment in history.At Zscaler, we recognize that enabling Europe’s digital sovereignty is about empowering European organizations to secure their systems, innovate without boundaries, and thrive on their own terms. As a global leader in Zero Trust security Zscaler is uniquely positioned to help European organizations meet today’s challenges and build a resilient, self-reliant future.]]></description>
            <dc:creator>Casper Klynge (VP, Government Partnerships)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Step Into the Future of Zero Trust + AI Security with Zscaler at AWS re:Invent 2025]]></title>
            <link>https://www.zscaler.com/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</link>
            <guid>https://www.zscaler.com/blogs/company-news/step-future-zero-trust-ai-security-zscaler-aws-re-invent-2025</guid>
            <pubDate>Tue, 04 Nov 2025 19:46:37 GMT</pubDate>
            <description><![CDATA[Zscaler and AWS are redefining what’s possible in the cloud. Visit Booth #1375 at the Venetian, December 1-5, to see how zero trust + AI security come together to protect data, power innovation, and simplify cloud security operations.Meet with Zscaler at AWS re:Invent 2025: Schedule a meeting | Explore Zscaler for AWSIn today’s cloud-first world, agility and innovation are everything. Yet many organizations are still weighed down by legacy tools that can’t keep up. VPNs, firewalls and static security models were never built for AI-driven transformation or a distributed workforce. They slow progress, create blind spots and expose new attack surfaces in the cloud. As organizations move more applications to the cloud and adopt GenAI, traditional security approaches put users, devices, and data at risk. The future of security depends on moving beyond these limitations towards a unified zero trust architecture. Together, Zscaler and AWS help enterprises simplify, automate, and scale securely across workloads, users, and data while keeping innovation moving forward.&nbsp;What to Expect at AWS re:Invent with ZscalerHere’s what you’ll see:Live demos showcasing Zero Trust + AI innovations in actionExpert insights on securing GenAI Apps and cloud workloadsProven strategies to eliminate VPNs/Firewalls and reduce riskReal-world customer use cases powered by Zscaler on AWSExpert theater presentations on the latest Zscaler solutionsDon’t miss these sessions:Tue., Dec. 2, 2:30PM: Securing the AI Era with Dhawal Sharma, EVP Products & Strategy, ZscalerWed., Dec. 3, 4:00PM: Zero Trust: The Blueprint for Securing AI-Powered SDLC with Brian Lazear, VP, Product Management - Cloud WorkloadsHow Zscaler + AWS Make It PossibleTogether, Zscaler and AWS deliver a secure foundation for cloud transformation.Here’s how:Unify security across AWS environments. Protect users, workloads, and data through the Zscaler Zero Trust Exchange, a global cloud platform built on AWS infrastructure.Secure GenAI applications. Discover and control AI tool usage while preventing data leakage and unauthorized access.Simplify access and eliminate VPNs. Provide seamless, content-based access to private apps on AWS and beyond without the cost and complexity of legacy VPNs.Protect workloads at scale. Segment and secure inter-workload traffic with cloud-native controls that reduce lateral movement and risk.Accelerate cloud migration. Move from on-prem to AWS with built-in visibility, automation, and policy consistency.&nbsp;Join us at AWS re:Invent 2025Zscaler and AWS are shaping the future of secure cloud innovation. Visit Booth #1375 at the Venetian December 1-5, to explore how Zero Trust and AI come together to protect data, accelerate transformation, and simplify security across your organization.Meet our experts, get a live demo, and learn how leading enterprises are using Zscaler and AWS to scale securely, operate efficiently, and innovate with confidence.Schedule a meeting | Explore Zscaler for AWS | Customer success stories | AWS Marketplace]]></description>
            <dc:creator>Dhawal Sharma (Vice President Of Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Tension Between ‘Decentralized Ops’ and ‘Security Compliance’ ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-tension-between-decentralized-ops-and-security-compliance</guid>
            <pubDate>Thu, 23 Oct 2025 07:17:13 GMT</pubDate>
            <description><![CDATA[When responsibilities for security governance, implementation, and innovation are spread across multiple business units, there’s a lack of cohesion that makes security compliance more complex than it needs to be. Navigating this complexity is made even trickier for those still operating on legacy infrastructure. It’s a problem faced by many large banks in the Financial Services sector.Operational Friction PointsThe vast organizational scale of established banks naturally creates a complex operational ecosystem. This often results in fragmented decision-making, with different teams managing isolated parts of the technology and security landscape. While there is an argument to be made for how this approach supports domain expertise, it obscures a bigger problem: inconsistent application of security governance. And inconsistency is a word we want to avoid in banking’s highly regulated environment.&nbsp;When it comes to security, there are a few critical shared responsibilities that teams headed by the CISO, CIO, and CTO must all navigate: regulatory compliance, risk management, and incident response. However, as the authority on security governance, it is the CISO who sets the organization’s guiding framework—with the CIO and CTO left to implement its outlined requirements across their respective domains of IT infrastructure and product environments. Even with a single framework in place, siloed operations often lead to inconsistent implementation across departments. Without a unified approach, risk exposure increases—especially when legacy landscapes mean visibility (into who is connecting to what and when) is not the default.Time and budgets are additional compliance pain points. As the number of regulations relevant to the financial services sector continues to grow, staying compliant has become a resource-intensive endeavor. Audits can stretch over weeks or months, requiring significant investment in both people and technology to ensure that security policies are embedded into day-to-day operations. In legacy set-ups, this burden means manual oversight and patchworking or compensating controls across fragmented systems. The ongoing operational expense of maintaining these controls typically falls to the CIO and CTO, who are already stretching budgets to reduce costs, maintain resilience, and deliver on transformation goals. If security was embedded into the architecture by design, CIOs and CTOs wouldn’t bear the long-term costs of decisions made outside their control.&nbsp;Technical Reality ChecksWhile compliance challenges in day-to-day operations are well known, what happens when banks try to innovate? Increasingly, a gap is emerging surrounding these efforts between the strategic optimism of non-technical leadership and the grounded realism of technical teams.&nbsp;As new-age challengers emerge, many banking CEOs equate staying competitive with embracing emerging technologies like AI. It’s true, AI holds real potential to drive innovation, growth, and market leadership. But one major barrier stands in the way: legacy systems weren’t built to support AI integration, increasing exposure risk and the complexity of maintaining security compliance. What’s more, AI introduces a new operational domain with fresh challenges around observability and control. These challenges are compounded by fragmented infrastructures, where the data that AI depends on resides in siloed systems. As a result, previously distinct technology domains are now colliding at greater speed—and with heightened internal volatility, as teams scramble to move fast while staying secure.Solving for Security at ScaleHow do banks address the challenges they face when trying to unify security enforcement across different divisions and innovate across the organization with emerging technologies? Many are turning to zero trust architecture.&nbsp;Unlike traditional perimeter-based approaches, this security approach assumes no implicit trust within the network and enforces strict verification at every access point, regardless of user, device, or location. The zero trust model aligns the responsibilities of the CISO, CIO, and CTO by centralizing policy enforcement, improving visibility across systems, and reducing the complexity of managing compliance in siloed environments.&nbsp;But zero trust is more than a security framework—it’s a strategic enabler of scalable protection, which becomes clear when we think of these points below:&nbsp;By delivering security as a service and connectivity at scale, zero trust empowers banks to adopt new technologies safely and rapidly. It provides the same level of protection, features, and control in both on-prem and cloud use cases, bringing much-needed consistency across hybrid environments. This means teams don’t have to compromise or choose between use cases. Everything works consistently, no matter where the data or applications live.It delivers visibility across&nbsp;all domains. This means that while technology domains may remain segmented, the visibility&nbsp;and control&nbsp;is not, allowing security teams to monitor and influence activity without friction.Data security is embedded at the heart of zero trust’s proxy-based architecture—not bolted on after the fact. It means banks can move quickly to scale new tech integrations—even advanced integrations like AI agents—without compromising compliance or operational integrity. In fact, it offers onramps for both legacy and emerging services, extending protection not just within the bank but also across its broader ecosystem—including partners and community-facing platforms.&nbsp;Common Security LanguageIn a decentralized operating environment, the question of who’s really in charge of security is less about hierarchy and more about cohesion. Zero trust helps banks speak a common security language—one that embeds compliance into every action, across every team, no matter who’s leading the charge.READY TO SECURE AT SCALE? Financial Services not only want but need a modern security approach to handle the ‘now’ and prepare for ‘what’s next’. The key is finding the right architecture with zero trust at its core to help you secure, simplify and comply with confidence.&nbsp;Find your future-proofed path here]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Cost of Trust: Preventing Breaches with Damages in the Millions]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-cost-of-trust-preventing-breaches-with-damages-in-the-millions</guid>
            <pubDate>Thu, 16 Oct 2025 07:51:29 GMT</pubDate>
            <description><![CDATA[In Financial Services, trust is foundational. In cybersecurity, implicit trust can be a costly liability, running up millions of dollars in losses.&nbsp;To help ground this statement, I want you to consider a specific amount: $6.08 million to be exact. This is the real-world price tag that Financial Services enterprises are paying for putting their trust in the wrong people, processes, and technologies—it’s the average cost of a data breach in the sector, according to the latest data from&nbsp;IBM.&nbsp;The astronomical stakes make the case for a zero trust approach and highlight that traditional security models, despite their enduring presence&nbsp;in the market, are no longer enough.The Financial Impact of BreachesFinancial Service organizations have always been on cybercriminals’ radar. Over the past two decades, nearly one-fifth of all global cyber incidents have targeted—you guessed it—a financial firm according to the latest&nbsp;IMF report.It’s a significant number and includes many high-profile breaches. For example, in 2019, a CNN headline read:&nbsp;A hacker gained access to 100 million Capital One credit card applications and accounts. This was one&nbsp;of the biggest breaches in recent history, with considerable financial fallout for the American credit provider. There were regulatory fines to the tune of&nbsp;$80 million, because the OCC regulator found that Capital One failed to put risk management practices in place before migrating to the cloud. There was also a hefty&nbsp;$190 million Class Action Settlement&nbsp;to resolve lawsuits from affected customers.When we think about financial consequences of cyber incidents, the first point that comes to mind is the very tangible cost needed to recover and secure operations. Then come potential costs in regulatory fines. But one impact that’s most damaging and enduring is to a brand’s reputation. Customers are increasingly wary of entrusting their data to organizations that have faced a breach. Their concern is valid: the latest ThreatLabz research revealed that data exfiltration surged 92.7% from last year. It shows that data theft is fuelling extortion campaigns, so it makes sense that 47% of businesses (across sectors) say they struggle to attract new customers after publicized cyberattacks according to&nbsp;Hiscox Cyber Readiness Report.Gaining trust is a competitive advantage, but one that’s easily lost. Especially in a digital system ‘protected’ by legacy security.&nbsp;Where Traditional Models FailLegacy security tools&nbsp;fall short of today’s demands in many ways. They focus on protecting the perimeter yet do&nbsp;not offer enough visibility and, as such, deprioritize resilience.Legacy tools like VPNs, firewalls, and static access controls were designed for a time when users and data stayed inside the network perimeter. Today’s cloud-first hybrid environments render these tools insufficient. Once attackers breach the (blurred boundary of an imagined) perimeter, they often face little resistance. And lateral movement could mean unfettered access to masses of sensitive data.What about visibility? There are several reasons why security architects managing traditional set-ups aren’t getting the necessary visibility they need to enforce least privilege or respond quickly to anomalies. One is a flat network architecture where tools like firewalls struggle to&nbsp;differentiate between normal and suspicious traffic&nbsp;because everything looks the same. Without traffic segmentation, it's hard to apply context-aware monitoring that delivers the necessary visibility. Another is broad network access, where the activity of connected users isn’t monitored, meaning suspicious behavior can go unnoticed. Bottom line? Security should provide always-on, real-time visibility of user and device activity.Finally, we touch on the&nbsp;topic of resilience; it’s become something of a mantra at Zscaler, and for good reason. When we look at technology and processes, resilience isn’t only about securing but about responding: how quickly can you contain a breach and bring business back online? We’re in a ‘when not if’ cyberattack era where no business is immune, which is why running threat detection alone is shortsighted. Unfortunately, the reality is, traditional security models struggle to contain an attack, which is disastrous for business continuity.&nbsp;Zero Trust as a Cost-Saving StrategyConsidering the financial ramifications of a security breach, I feel that zero trust can be framed as a cost-saving investment. We should move away from the notion of zero trust being ‘just’ a security upgrade—embracing this modern approach has more to do with implementing a solid business resilience strategy.The return on investment plays out in a few ways. For one, it stops attackers moving from one compromised system to others. Zero trust is also about implementing privilege escalation. In the case of a breach,&nbsp;unauthorized access to higher-level systems is blocked because every access request is verified. Another feature of zero trust architecture is that it enables micro-segmentation to, similarly, reduce the attack surface, but also enact real-time access-policy enforcement without disrupting other workflows.When a zero trust architecture is powered by AI, the ROI is about saving time for often overburdened security architects. They will be able to detect anomalies as they occur and can reduce manual triage because containment measures can be automated. The result is faster incident response and recovery times, which helps lower remediation costs. The cost benefit is especially important in regulated environments like Financial Services, where fines for non-compliance around data protection can be hefty.Cybersecurity is no longer just a technical issue. As this blog shows, the cost of getting it wrong isn’t limited to a dollar figure. It’s tied to your brand’s reputation and affects your ability to give customers what they’re paying for. For decision-makers serious about protecting their brand value and business continuity, zero trust is a logical next step in what has, to date, been a legacy journey. Time to leave that legacy behind.&nbsp;Ready to implement zero trust? If you’re just starting your journey, consider Zscaler’s checklist of features ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our&nbsp;Financial Services&nbsp;eBook and our&nbsp;Financial Services Page.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilience Reimagined: The Next Chapter Begins]]></title>
            <link>https://www.zscaler.com/blogs/company-news/resilience-reimagined-the-next-chapter-begins</link>
            <guid>https://www.zscaler.com/blogs/company-news/resilience-reimagined-the-next-chapter-begins</guid>
            <pubDate>Tue, 14 Oct 2025 15:49:08 GMT</pubDate>
            <description><![CDATA[Over the past year, one of Zscaler’s central missions across EMEA has been to help enterprises unlock&nbsp;The Resilience Factor. We define this as the unique ability of a business – or indeed, an individual employee and their team – to withstand adversity, adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.From our flagship&nbsp;Resilience Factor research report to the engaging&nbsp;Personal Resilience Superpower quiz, we have primarily explored resilience through an internal lens. With constant disruption the new norm, we've looked at how organizations can build robust strategies and processes, the proactive technologies they should prioritize, and – just as importantly – how they can nurture resilience within their people.As we approach the end of the calendar year, pursuing true cyber resilience is more critical than ever. Hardly a day passes without news of the latest breach happening to companies of all shapes and sizes, and the consequences of those breaches now linger far longer than anticipated. It’s no surprise that resilience was a central theme at the recent Gartner Security & Risk Management Summit, and remains a focus for enterprises, industry analysts, governments and international NGOs like the&nbsp;World Economic Forum alike.CISOs and their teams continue to operate on the front line in a “when, not if” world of cyber incidents – where the only certainty is that the next inevitable breach could come from any direction. In today’s interconnected landscape, however, a focus on internal resilience alone is no longer sufficient.Organizations must now contend with:Turbulent market forces: Regulatory shifts, sovereignty demands, and economic disruptions are forcing rapid operational pivots that legacy architectures cannot keep up with.Emerging technologies: AI is already dramatically reshaping the threat landscape and quantum is right on the horizon – exposing dangerous blind spots in security strategies.Operational ecosystem complexity: Distributed – and increasingly contractor-based – workforces and volatile supply chains introduce new vulnerabilities into an organization’s attack surface.That’s why we’re now turning our focus outward. We’ll be exploring how organizations are evolving their resilience strategies to address external factors – managing exposure to market disruption, emerging risks from the latest threats and technologies, and the complexities of their ever-extending user base and supply chain.Our stance remains unchanged: organizations must become&nbsp;Resilient by Design. This means rethinking reactive approaches and embracing resilience as a proactive, central principle – one that enables businesses to anticipate, withstand, and recover confidently from both internal and external threats to operational continuity.This next chapter is about expanding the conversation. It’s about recognizing that resilience isn’t just a security imperative – it’s a strategic one. And it’s about equipping leaders with the insights and tools they need to build 360° resilience into the very fabric of their organizations.So stay tuned. We’ll be sharing new perspectives, fresh research, and practical guidance to help you extend your cyber resilience strategies beyond your dissolving walls. And if you missed any of our earlier materials, now’s the perfect time to catch up.The future is unpredictable. But with the right mindset and design, resilience can be your greatest competitive advantage.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity (part 2): The Illusion of the Trusted Perimeter]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-psychology-of-trust-in-cybersecurity-part-2-the-illusion-of-the-trusted-perimeter</guid>
            <pubDate>Thu, 11 Sep 2025 06:59:30 GMT</pubDate>
            <description><![CDATA[Traditional security models were built around the idea of a trusted perimeter: everything inside it was assumed to be trustworthy, and the goal was to keep bad actors out. But that model no longer holds.Now, users connect from anywhere, using a mix of corporate and personal devices, accessing data across multiple platforms. The perimeter has dissolved. And, with it, the illusion of internal safety.It’s something network architects are becoming acutely aware of. They need to make sure that the burgeoning number of users and devices can all connect to the network. This includes connecting unmanaged IoT devices, which—due to their effective invisibility—create a critical point of vulnerability when the network is ‘protected’ by a legacy tool like a VPN.And this critical vulnerability is only growing, as we see leaps and bounds made in interconnected vehicles, smart buildings and the like. In fact, the global number of IoT devices is forecast2 to more than double from 19.8 billion this year to over 40.6 billion in the next decade.The more pervasive IoT becomes, the greater the vulnerabilities in legacy networks will be. IoT introduces proprietary software that often lacks integration with legacy network and security tooling—creating vulnerabilities in your defenses. What’s more, IoT devices are increasing faster than employee counts, rapidly expanding the attack surface. With AI now being embedded into these devices, combined with the emergence of Agentic AI intent, the traditional castle-and-moat architecture is entirely inadequate.These outdated architectures fail to correctly tailor permissions—a critical flaw in a landscape where lateral movement remains one of the biggest threats. They simply aren’t sophisticated enough to correctly tailor permissions. They give broad network access to users and devices with verified credentials. If those credentials are compromised, a hacker using them can bypass your ‘trusted perimeter’ and access any sensitive data hosted internally without going through any further checks.Bottom line? Never trust, always verify, because there is no safe boundary around your network anymore.The Urgent Need for a Psychological ReframeIt seems like a cynical principle: never trust, always verify. However, this foundational philosophy of the zero trust movement isn’t about being paranoid—it’s about being prepared. It’s a recognition that trust, while essential in human relationships, must be earned and continuously verified in digital systems.Understanding this, we can safely say that zero trust isn’t just a technical framework. It’s a mindset shift. We must safeguard our digital environment from the threat of our own familiarity bias; we must turn the decision to trust into an objective action instead of a subjective one to gain assurance that security policies are consistently applied. By enforcing least-privilege access and carrying out continuous authentication, zero trust transforms security from a static barrier into a dynamic, adaptive system.This approach aligns with today’s ‘when not if’ cyberattack reality. It acknowledges that breaches are inevitable, and that internal actors (whether malicious or compromised) can be just as dangerous as external ones.Email phishing, of course, isn’t the only way a compromised internal actor can expose data. Employees using public-facing AI tools to speed up work tasks could unwittingly share private data. And, they are also less likely, considering the familiarity bias undercurrent, to spot AI-refined social engineering. Hackers are also turning to AI to automate their efforts, giving them greater scope and sophistication in less time with far less effort. This increases the likelihood that they’ll hook a victim.Clearly, AI is a pervasive threat and arguably will eventually erode trust to the point we trust nothing. But it’s not all bad. We need to reframe how we view AI: it can be a powerful ally, used to objectively enforce security policies in a way that takes trust out of the equation.From Paranoia to PrudenceFor business decision-makers, the path forward is clear. The threats are evolving. The perimeter is gone. And the psychology of trust must evolve with it.Zero trust offers a way to do just that—not by rejecting trust, but by redefining it for a world where control through continuous verification is the new foundation of security.For further information please visit: https://explore.zscaler.com/emea-financial-services/PART OF A HIGHLY REGULATED INDUSTRY? For organizations in tightly regulatedsectors, particularly those in Financial Services, the need to embrace zero trust now is critical. If you’re just starting your journey, view Zscaler’s checklist of features toconsider ahead of investing in zero trust architecture. It’ll give you an overview of what you need to embed the necessary control and resilience for navigating our complex world. Details in our Financial Services eBook2Statista, Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2034. June 2025. Available at: https://www.statista.com/statistics/1183457/iot-connected-devices-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[“AI-liens at the Workforce“ and how new trust frameworks provide risk management strategies in the wake of Agentic AI]]></title>
            <link>https://www.zscaler.com/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</link>
            <guid>https://www.zscaler.com/blogs/company-news/ai-liens-at-the-workforce-and-how-new-trust-frameworks-provide-risk-management-strategies-in-the-wake-of-agentic-ai</guid>
            <pubDate>Tue, 09 Sep 2025 08:16:30 GMT</pubDate>
            <description><![CDATA[From Agentic AI to Geopolitics: Zscaler’s Agenda for the Gartner Risk & Security Management SummitLater this month, I’ll be delivering a keynote at the Gartner Risk & Security Management Summit EMEA, where Zscaler will be a Premier Plus Sponsor. Hosted in London between 22-24 September, the annual summit convenes the region’s top security minds to tackle the latest challenges in the evolving digital landscape – where a complex mix of cyber threats, AI, regulatory shifts, and sovereignty demands are all converging to put pressure on business operations.As a global leader in Zero Trust transformation, Zscaler has a wealth of insights on how organizations can adapt to a rapidly changing risk environment, while driving innovation and safeguarding operational resilience. And we’ll be delivering these insights in a variety of different forums across the three days of the Summit.&nbsp;On September 22nd, I’ll be taking to the mainstage for “AI-liens in the Workforce: A New Trust Model with the Introduction of Advanced NHI.” This session will explore how agentic AI is reshaping enterprise ecosystems – driving accelerated automation and enhancing decision-making, but also creating an urgent need for new trust frameworks and more comprehensive risk management strategies. Attendees will leave with actionable insights on how to evolve their trust models to navigate autonomous AI environments securely and adaptively.The following day in our theatre keynote, “Driving Business Leadership with AI, Cellular, and Zero Trust,” Zscaler’s innovations team will reveal how these three technologies are revolutionizing both enterprise security and operational agility. The audience will learn how cutting-edge AI-driven frameworks, secure cellular connectivity, and transformative Zero Trust architectures are enabling businesses to turn risk into strategic advantage. Armed with this knowledge, they will also discover practical strategies to protect distributed environments, future-proof their security architecture, and embrace innovation on the edge in a digital-first world.In addition to the two keynotes, Casper Klynge, our VP of Government Affairs EMEA, will host an exclusive roundtable on day one titled “Navigating the Geopolitics of Tech: Should the Private Sector Be the Custodians of the Transatlantic Relationship?” This invitation-only session will explore the evolving interplay between tech dependency and cybersecurity, set against the backdrop of Europe’s digital sovereignty debate. Focused on the private sector’s role in particular, the roundtable aims to spark meaningful dialogue on the intersections between geopolitics, technology, and private-sector leadership.The Gartner Risk & Security Management Summit offers those of us in the industry an invaluable forum to engage with forward-thinking professionals and security innovators. Whether you are a CIO, CISO, governmental leader, or strategic decision-maker, I believe Zscaler has a compelling perspective to share on how to approach the most pressing challenges facing enterprises today, from managing risk in AI-driven ecosystems to navigating geopolitical complexities. We look forward to exploring groundbreaking ideas, fostering collaboration, and contributing to meaningful discussion.Join us at the Zscaler booth, attend our keynotes, and connect with our executive team at the cocktail reception on Monday, September 22nd. Reach out for your personal invitation&nbsp;here.Together, let’s shape the future of resilience, AI innovation, and security leadership.&nbsp;]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Leader in The Forrester Wave™ Secure Access Service Edge Solutions, Q3 2025: The Future is Zero Trust ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</link>
            <guid>https://www.zscaler.com/blogs/company-news/zscaler-named-leader-forrester-wave-tm-secure-access-service-edge-solutions-q3</guid>
            <pubDate>Mon, 08 Sep 2025 17:26:16 GMT</pubDate>
            <description><![CDATA[We are thrilled to announce that Zscaler has been named a Leader in The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025.We are especially proud to be positioned with the highest score in the Strategy category, which we see as a reflection of our unique zero trust approach.To us, this recognition from Forrester reinforces our long-held conviction: true SASE isn't about routing packets or bolting products together; it’s about securely connecting the right user to the right application, based on policy, without ever placing them on the corporate network. This principle is the driving force behind the world's largest security cloud: the&nbsp;Zscaler Zero Trust Exchange™.The Problem with First-Generation SASEMany early SASE offerings simply repackaged old problems. They focused on optimizing network paths by stitching together disparate SD-WAN products with a separate security stack (SSE). This "good enough" approach left enterprises still owning and operating a complex WAN, managing separate policies for network and security, and struggling with visibility gaps. It remained a fundamentally network-centric architecture, creating complexity, cost, and a larger attack surface—the very issues a true SASE platform should eliminate.A New Architectural Approach: The Zero Trust ExchangeOur answer is a completely different architectural model. The Zero Trust Exchange is a cloud-native platform that acts as an intelligent switchboard between users, devices, and applications.Instead of routing packets, it focuses on one thing: brokering secure, policy-based connections.All traffic—from user laptops, guest Wi-Fi, servers, and IoT/OT systems—is forwarded to the nearest Zscaler cloud point of presence.The Zero Trust Exchange delivers comprehensive security services inline. This includes a full SSE stack—from&nbsp;ZTNA and&nbsp;SWG to&nbsp;CASB,&nbsp;DLP, and&nbsp;Firewall-as-a-Service (FWaaS)—to inspect 100% of traffic and apply granular zero trust policies.Secure connections are brokered directly between the entity and the application, eliminating lateral threat movement and completely removing the need to expose your infrastructure to the internet.The Transformative Benefits of Zero Trust EverywhereBy leveraging the Zero Trust Exchange platform, organizations unlock immediate value:Radically Simplified IT: Liberate IT by moving away from owning and operating the WAN. The Zero Trust Exchange enables you to transform traditional offices into secure,&nbsp;cafe-like branch experiences. Provision new sites with full, cloud-delivered security in minutes, not months.Massively Reduced Costs: Stop paying for expensive, private MPLS circuits and move to cost-effective direct internet access. Move from a burdensome CapEx model to a predictable OpEx model, significantly lowering total cost of ownership.Superior Security: Reduce the attack surface to zero by making users and branches invisible to the internet. With full SSL/TLS inspection and consistent policy enforcement for every connection, you can prevent lateral threat movement and stop attacks before they start.A Phenomenal User Experience: Connect users directly and quickly to cloud apps without the latency of backhauling traffic. The result is a faster, more productive experience for every user, at every location.The Future is Zero TrustThe industry is at an inflection point. Owning and managing a network to secure your enterprise is no longer sustainable in a cloud-first world. The future is built on a true zero trust architecture.Being named a Leader in The Forrester Wave™ for SASE Solutions—and recognized with the top score in the strategy category—reinforces our conviction that zero trust simplicity is the proven path forward. We are proud to be named a leader among top solutions in the market and will continue to innovate to help our customers.To learn more, access a complimentary copy of The Forrester Wave™: Secure Access Service Edge Solutions, Q3 2025 report.Discover how the Zscaler Zero Trust Exchange can transform your network and security.&nbsp;Forrester does not endorse any company, product, brand, or service included in its research publications and does not advise any person to select the products or services of any company or brand based on the ratings included in such publications. Information is based on the best available resources. Opinions reflect judgment at the time and are subject to change. For more information, read about Forrester’s objectivity&nbsp;here .]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The Psychology of Trust in Cybersecurity: it’s not Paranoia, it’s Prudence ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-psychology-of-trust-in-cybersecurity-it-is-not-paranoia-it-is-prudence</guid>
            <pubDate>Thu, 04 Sep 2025 12:58:38 GMT</pubDate>
            <description><![CDATA[An innate trust in what’s familiar is a very human response. In the workplace, it’s almost a given that colleagues, internal systems, and corporate networks are all trustworthy.But in today’s ‘everything-and-everyone-connects-from-everywhere’ world, this instinct can be dangerously misleading. The enterprise network is the most vulnerable it’s ever been—not only because cloud-first hybrid environments have vastly expanded the attack surface.There are three other reasons we’re experiencing heightened vulnerability. First, there’s the greater chance of compromise as hackers are turning to AI to launch increasingly sophisticated social engineering campaigns. Second is how easy it is for a bad actor to move laterally through the network, unmonitored, using verified credentials to log in (not hack in!). Finally, there’s the danger to data: the alarming rise of ransomware or of data exfiltration (without any alarms being triggered).This is bad news for any industry. Especially for those already ranked among the most attacked1 of all global industries. Considering the sector’s high-value data and regulatory exposure, it’s no surprise to find Financial Services among that group.Heritage status is a double-edged sword for established finance brands. They’ve amassed incredible experience that digital-first challengers can’t compete with; however, years and years of built-up, bolted-on security and performance updates to their legacy tech infrastructure have created complex, unwieldy environments. This means less agility and greater cyber-risk exposure. Complexity extends to the sector’s vast supply chain ecosystem—and the fact that every move within it is highly regulated.There are clear challenges for the Financial Services sector, particularly for the bigger established legacy banks that are up against agile digital-first challengers. Organizations in this industry, and all highly regulated sectors for that matter, really need to double down on security—and fast.This isn’t fearmongering; it’s about challenging the trust bias that, too often, becomes a risky default. It’s about championing security prudence to ensure that control and resilience are maintained.The Human Bias Toward TrustEver heard about cognitive heuristics? Rooted in cognitive science, the term describes the mental shortcuts we take when we need to make decisions quickly or with limited information. There are different types of shortcuts but the one that we really need to be aware of in the digital workplace is the familiarity heuristic. This is about seeking out the familiar in the face of uncertainty. It’s a judgement bias that many of us have defaulted to.In a corporate setting, a familiarity heuristic may see us giving trust without second thought. For example, instinctively believing internal emails are ‘safer’ than external ones, assuming our own company systems are secure by default, or believing our colleagues are less likely to pose a threat to our cybersecurity.This assumption that what’s ‘inside’ is safe is exactly what cybercriminals prey on. Network breaches could be the result of an external threat. More often, they are due to staff credentials being compromised, unintentionally, and largely over email. In 2024, our ThreatLabz team examined 1.2 billion data transactions across apps and core business channels like email. The findings, shared in our 2025 Data@Risk Report, highlight the scale of the issue: sensitive company data (including source code and financial information) was leaked in nearly 104 million email transactions.It’s telling that email phishing is still one of the most effective attack vectors, even in 2025 with all our knowledge about the perils of poor security hygiene. Again, it’s down to that human bias toward trusting the familiar: an internal email from a seemingly legitimate sender lands in the inbox of an employee who clicks on a link as directed, opening the door to a hacker. The attacker then moves laterally across the network—going undetected in a legacy security environment where trust is assumed rather than verified. The question is, can an entity’s trustworthiness ever be assumed?Part 2 of this series on the psychology of trust in Cyber Security is here. If you want to learn more about Cyber Security in the FSI space download the ebook here.1Statista, Distribution of cyberattacks across worldwide industries in 2024. May 2025. Available at:https://www.statista.com/statistics/1315805/cyber-attacks-top-industries-worldwide/]]></description>
            <dc:creator>Martyn Ditchburn (Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Salesloft Drift Supply Chain Incident: Key Details and Zscaler’s Response]]></title>
            <link>https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</link>
            <guid>https://www.zscaler.com/blogs/company-news/salesloft-drift-supply-chain-incident-key-details-and-zscaler-s-response</guid>
            <pubDate>Sat, 30 Aug 2025 19:42:18 GMT</pubDate>
            <description><![CDATA[At Zscaler, protecting your data and maintaining transparency are core to our mission to secure, simplify and accelerate businesses transformation. We are committed to keeping you informed about key developments that may impact your organization.What Happened?Zscaler was made aware of a campaign targeted at Salesloft Drift (marketing software-as-a-service) and impacting a large number of Salesloft customers. This incident involved the theft of OAuth tokens connected to Salesloft Drift, a third-party application used for automating sales workflows that integrates with Salesforce to manage leads and contact information.&nbsp;The scope of the incident is confined to Salesloft’s Drift app and does not involve access to any of Zscaler's products, services or underlying systems and infrastructure.As part of this campaign, unauthorized actors gained access to Salesloft Drift credentials of its customers including Zscaler. Following a detailed review as part of our ongoing investigation, we have determined that these credentials have allowed limited access to some Zscaler Salesforce information.&nbsp;What Information May Be Affected?The information accessed was limited to commonly available business contact details for points of contact and specific CRM related content, including:NamesBusiness email addressesJob titlesPhone numbersRegional/location detailsZscaler product licensing and commercial informationPlain text support case header content from certain cases limited to the following fields: Case Number, Opened, Preferred Contact Number, Description, Priority, Case Owner, Preferred Time Zone, Case Status, Type, Customer Case Reference, Product, Last Activity, Subject, Resolution Notes, Reason for Hand Off, Current Status / Next Plan of Action, Data Collected, Issue Summary / Business Impact, and Requestor. No attachments, files, or images were included in the incident, as it solely involved structured text data from case headers.After extensive investigation, Zscaler has currently found no evidence to suggest misuse of this information. If anything changes, we will provide further communications and updates.&nbsp;What Did Zscaler Do?&nbsp;Zscaler acted swiftly to address the incident and mitigate risks. Steps taken include:Revoking Salesloft Drift’s access to Zscaler’s Salesforce dataOut of an abundance of caution, rotating other API access tokens.Launching a detailed investigation into the scope of the event, working closely with Salesloft to assess and understand impacts as they continue investigating.Implementing additional safeguards and strengthening protocols to defend against similar incidents in the future.Immediately launched a third party risk management investigation for third party vendors used by Zscaler.Zscaler Customer Support team has further strengthened customer authentication protocol when responding to customer calls to safeguard against potential phishing attacks.&nbsp;What You Can DoAlthough the incident’s scope remains limited (as stated above) and no evidence of misuse has been found, we recommend that customers maintain heightened vigilance. Please be wary of potential phishing attacks or social engineering attempts, which could leverage exposed contact details.Given that other organizations have suffered similar incidents stemming from Salesloft Drift, it’s crucial to exercise caution regarding unsolicited communications, including emails, phone calls, or requests for sensitive information. Always verify the source of communication and never disclose passwords or financial data via unofficial channels.Zscaler Support will never request authentication or authorization details through unsolicited outreach, including phone calls or SMS. All official Zscaler communications come from trusted Zscaler channels. Please exercise caution and report any suspicious phishing activity to security@zscaler.com.&nbsp;Need Assistance or Have Questions?If you have concerns or need additional support, Zscaler’s Customer Success and Support teams are available via&nbsp;help.zscaler.com or your existing Zscaler support channels.&nbsp;You can also reach out to our Security team at&nbsp;driftincident@zscaler.com.Your security is our top priority. Thank you for your continued partnership with Zscaler.Update: Blog updated on September 3rd, 2025 to include support case information impacted by the incident. Blog updated on September 7th, 2025 to include additional support case information impacted by the incident.]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Commitment to Responsible AI]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zscalers-commitment-to-responsible-ai</link>
            <guid>https://www.zscaler.com/blogs/company-news/zscalers-commitment-to-responsible-ai</guid>
            <pubDate>Thu, 21 Aug 2025 02:00:00 GMT</pubDate>
            <description><![CDATA[There was a question recently posted about how Zscaler trains AI models. We wanted to provide accurate information on how we train our AI models. Zscaler does not use customer data to train its AI models. Each customer owns their proprietary information or personal data (user names, email addresses, device IDs, etc.) in the Zscaler logs. We only use data or metadata that does not contain customer or personal data for AI model training.Organizations want to safely unlock the value of artificial intelligence and machine learning, but they also need to ensure that this does not come at the expense of privacy, security and compliance controls. This becomes particularly charged when we consider the potential of training AI using proprietary data or personal data.&nbsp;The foundation of our architectural approach is data containment. Every customer’s tenant is self-contained: their data lives within their tenancy, under their control. Sensitive information never leaves that boundary. This is not just a principle: it’s a design choice by Zscaler that governs how we build, scale, and deliver value. This is how Zscaler can ensure that customer data is never used to train an AI model beyond a given tenant.Within that contained environment, customers can harness the power of their own data. Logs, transactions, and telemetry generated by their use of our platform are used to improve outcomes for their organization alone. This means customers benefit directly from their own signals, whether it’s for risk modeling, AI copilots, or policy enforcement, without having to trade away autonomy or privacy or security.Leveraging Data ResponsiblyA common concern is whether preserving privacy limits the ability to benefit from large-scale insights. Here’s where an important distinction comes in: personal data remains private, secured, and not included as model training data while metadata that does not contain proprietary information or personal data is used to enrich each tenant’s environment.Think of it like water flowing through pipes: while the content of the water belongs entirely to each customer, the knowledge of how the water moves (its pressure, velocity, and patterns) can inform the system without ever extracting the water itself. Similarly, Zscaler’s platform can use traffic patterns and telemetry that does not contain personal data, and aggregated signals to strengthen AI models and improve the overall environment while still enforcing the guarantee that sensitive data never leaves a customer’s tenancy.Zscaler’s ability to learn from over half a trillion transactions per day leverages a network effect without sacrificing customers’ privacy (specifically and technically a logarithmic utility). Customers benefit from the sheer breadth of signals Zscaler processes because it allows us to recognize global threat trends and provide resilient, real-time defenses. At the same time, customer-specific data is never exposed outside of respective tenancy.Instead, Zscaler leverages the aggregate knowledge of signals across the platform, never tied to an individual customer’s data, to strengthen detection and modeling. Each tenant gains from this global intelligence while maintaining strict boundaries for its own data.To re-emphasize: customers’ proprietary information or personal data in the Zscaler logs is never shared outside of the customer boundary.&nbsp;A Core Security Principle Rooted in Shannon’s Information TheoryThere is deep alignment of our approach with Shannon’s Information Theory, a topic I will delve into more in a future blog. Zscaler views data along a continuum that stretches from low entropy, high-information states such as clear text, through progressively higher entropy forms like ciphertext, and ultimately to encryption and the extreme of pure randomness. At Zscaler, our architectural principle begins with data control. Sensitive classes of data never leave a tenant boundary in any form including customer data. Beyond that, we apply a disciplined progression toward maximum entropy wherever possible, ensuring that only the minimum necessary information is exposed. Techniques such as anonymization, tokenization, de-identification, and other data strategies are not applied as afterthoughts but as deliberate mechanisms to elevate entropy while still preserving just enough structure for essential operations, such as AI modeling and training at the platform level. This approach ensures that the system operates at the highest entropy state consistent with utility, minimizing information exposure while maximizing privacy, trust, and compliance. This is how Zscaler unlocks the value of artificial intelligence but still ensures privacy and compliance for all customers.]]></description>
            <dc:creator>Sam Curry (SVP, Global CISO)</dc:creator>
        </item>
        <item>
            <title><![CDATA[It’s Time to Take Resilience Personally]]></title>
            <link>https://www.zscaler.com/blogs/company-news/it-is-time-to-take-resilience-personally</link>
            <guid>https://www.zscaler.com/blogs/company-news/it-is-time-to-take-resilience-personally</guid>
            <pubDate>Thu, 24 Jul 2025 15:23:42 GMT</pubDate>
            <description><![CDATA[In a recent&nbsp;blog post, I explored resilience as a central topic for Zscaler. At that stage we’d already released our&nbsp;Resilience Factor research, which highlighted the state of cyber resilience strategies within global businesses and put forward a more proactive ‘Resilient by Design’ approach as the next cyber security imperative. But I also previewed some further work we were undertaking on personal resilience.Why is a technology company looking at personal resilience you might ask?&nbsp;Connecting resilient teams with business continuityAt Zscaler, we believe that the best cyber resilience strategies feature three key elements:&nbsp;processes, technology,&nbsp;and&nbsp;people. However, while companies understand only too well how technology and operational processes affect continuity strategies, that last element is frequently overlooked.&nbsp;And that is a critical misstep. Resilience is an inner strength that prepares individuals and teams to navigate challenges and quickly bounce back. In today’s ‘when not if’ cyberattack reality – where our previous research showed us that 60% of IT leaders expect to experience a cybersecurity failure within the next six months –&nbsp;personal resilience has become a non-negotiable for employees at the frontline of digital defense. And there’s a proven link between this trait and business performance. In fact, studies have shown that resilient employees are almost&nbsp;twice as likely to be motivated and productive than their non-resilient peers.Put simply, business leaders who invest in cultivating the resilience of their people and teams – combined with efforts to address its causes from a technology and process perspective – will have&nbsp;a competitive advantage. At Zscaler we want to empower our customers with this advantage, helping them move forward with confidence, no matter what threat or disruption they faceFostering resilience within your teamSo how do you design your environment to foster resilience, both for yourself and your team – and what do you need your people to be resilient against? To help you get started, we’ve created two key resources:The Missing Link: Why Investing in the Resilience of Your People is Imperative for Business Continuity: Firstly, we’ve teamed up with professional coaching experts Positive Intelligence to create a&nbsp;practical roadmap for strengthening resilience as a core leadership skill. Complemented by valuable insights from our survey of 200+ IT and security professionals across EMEA, the roadmap focuses on integrating resilience into personal habits, team dynamics, and company culture.The Personal Resilience Superpower Quiz:&nbsp;To help identify the resilience “personality types” within your team, we’ve developed the&nbsp;Personal Resilience Superpower Quiz. In just 12 quick questions, you’ll uncover your superpower, potential watch-outs, and strategies to enhance collaboration. Beyond individual advice, you’ll also learn how the four resilience types can work together to create a team that’s prepared for anything.As a Cool Commander, the description of facing problems head-on and going after challenges confidently and in control definitely resonates with me. So it was interesting to read how other personas like the Practical Problem Solver can be vital to sense-check my fast-paced approach.Facing the futureFor over 18 years, Zscaler has offered cloud-based services to protect enterprise networks and their data. Based on this wealth of experience, we know firsthand the risks organizations face by not investing in their front-line employees' resilience as well as not adequately protecting their business.Our mission this year is to help enterprises unlock “The Resilience Factor”, which we define as the unique ability of a business (or an individual employee) to withstand adversity, adapt operations, and be ready to thrive in the face of any challenge. With 47% of the IT professionals telling us they feel only somewhat resilient, and 51% believing their organization doesn’t care about personal resilience, we think it is an urgent one.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Unlock Ransomware Resilience and AI Defense with Zscaler at Black Hat 2025]]></title>
            <link>https://www.zscaler.com/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</link>
            <guid>https://www.zscaler.com/blogs/company-news/unlock-ransomware-resilience-and-ai-defense-zscaler-black-hat-2025</guid>
            <pubDate>Mon, 21 Jul 2025 21:33:29 GMT</pubDate>
            <description><![CDATA[Black Hat 2025 is right around the corner, and this year’s agenda hits at the core of what cybersecurity professionals care about the most: stopping AI-driven ransomware by leveraging AI to stay ahead of evolving threats.Whether you are on the front lines of incident response, working to secure hybrid environments or researching the next wave of cyberthreats, Zscaler product and industry leaders will be available to provide insights and showcase new solutions and strategies designed for real-world defense.Here is what you can expect from Zscaler at Black Hat 2025:&nbsp;Experience Zero Trust Everywhere at Booth #3551Cybersecurity isn't a spectator sport - so get hands on with Zscaler at booth #3551. Our in-booth sessions and live demos are designed to help you understand how AI and automation are being used to stop ransomware in real time, reduce attack surfaces and protect sensitive data.Meet face-to-face with our product experts and technology partners to explore new capabilities in inline data protection, threat containment and exposure management. If you are tackling challenges around endpoint visibility or identity-driven policy, the Zscaler booth is the place to ask questions, test solutions and get the technical depth you are looking for.&nbsp;From Risk to Readiness: Combat the Latest Ransomware Extortion Surge with the Zero Trust Defense PlaybookThe intersection of AI and ransomware is reshaping the cybersecurity battlefield – and Deepen Desai, Zscaler CSO, and Dr. Brett Stone-Gross, Zscaler’s Distinguished Security Researcher, are diving into the heart of it. Join their session on Wednesday, August 6 at 2:35 PM to uncover the latest ransomware surge and how organizations can respond with resilient frameworks and smarter defenses. This powerhouse duo will go beyond theory, showcasing the latest research and delivering practical guidance on how to combat AI-driven ransomware.&nbsp;Your Path to AI-Powered Security Starts Here: Schedule a Meeting with Zscaler at Black Hat 2025Transform how you approach cybersecurity by scheduling an on-site meeting with the Zscaler team at Black Hat 2025. Learn how Zscaler addresses emerging threats, boosts operational efficiency, and reshapes security architecture to align with today’s fast-evolving landscape. Tailor the conversation to your unique goals for deploying modern, scalable defenses.Don’t just keep up with cybercriminals—take the lead and visit Zscaler at Black Hat 2025 to discover cutting-edge solutions designed to keep you ahead of the curve.]]></description>
            <dc:creator>Diana Shtil (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A New Chapter for Zscaler in the Heart of London]]></title>
            <link>https://www.zscaler.com/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</link>
            <guid>https://www.zscaler.com/blogs/company-news/a-new-chapter-for-zscaler-in-the-heart-of-london</guid>
            <pubDate>Wed, 16 Jul 2025 10:04:45 GMT</pubDate>
            <description><![CDATA[Zscaler has proudly opened the doors to its new EMEA headquarters in London, marking an exciting milestone for the company. Our new home is located on the third floor of the iconic Royal Exchange, a historic building overlooking the Bank of England in the heart of the City district.Originally opened by Queen Victoria in 1844, the Royal Exchange has long been a cornerstone of historic trade and governance. It was the location of the first stock exchange, cementing its role as a global hub for commerce. Over the years, it has witnessed monumental moments, including the proclamation of King Edward VII in 1901 and the announcement of the new Sovereign in 2022. Now in its third iteration, rebuilt after catastrophic fires including the Great Fire of London in 1666, The Royal Exchange stands as a symbol of resilience and reinvention, qualities that closely mirror Zscaler’s mission of empowering customers to overcome challenges and thrive securely in the digital economy.The relocation underscores Zscaler’s dedication to the thriving UK market, which is among the company’s top five regions globally. London’s role as a leading tech hub makes it an ideal base, providing unmatched opportunities to engage with diverse talent, enterprise customers, policymakers, and strategic partners. Being in close proximity to many of our key partners further enhances our ability to collaborate effectively and innovate solutions. This strategic move enables Zscaler to accelerate advancements in cybersecurity, support transformative security initiatives, and strengthen collaboration with customers across EMEA.Beyond serving as Zscaler’s EMEA headquarters, this new space will also act as the primary hub for our Executive Design Center (EDC). EDCs are pivotal in hosting discussions that inspire innovation, foster collaboration, and advance strategic agendas for cyber transformation. Here in the UK, we will leverage the center to deepen relationships with customers and partners, explore new ideas to solve the most pressing cybersecurity and operational challenges, and foster the kind of thought leadership that drives impactful business results.While this move is a celebration of new beginnings, it is also about the hardworking team that drives Zscaler’s success every day. We are proud of our 300+ UK employees and are planning to&nbsp;grow our headcount over the next year, with roles focused on Sales, Marketing, Solution Engineering, Cybersecurity Analysis & Research, Customer Success, and Partner Enablement. At Zscaler, we believe diversity of thought and experience is essential to building exceptional teams. This culture of growth, learning, and impact has earned us distinctions such as the UK’s Best Workplace™ for Employee Development award.The energy within the new space has been palpable as we officially welcomed our teams this week. We look forward to continuing to push boundaries in cybersecurity innovation for our customers across the region. This new office marks a brilliant step forward for Zscaler in EMEA. We’re here to stay, to grow, and shape the future of cybersecurity right from the heart of London.]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Why Our New London Office Marks a Milestone for Zscaler in EMEA]]></title>
            <link>https://www.zscaler.com/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</link>
            <guid>https://www.zscaler.com/blogs/company-news/why-our-new-london-office-marks-a-milestone-for-zscaler-in-emea</guid>
            <pubDate>Tue, 15 Jul 2025 11:44:23 GMT</pubDate>
            <description><![CDATA[This week’s London office opening in the amazing Royal Exchange building is big news for not just the UK, but all of EMEA. More than just another address to add to our global footprint, the office represents our long-term commitment to the region as a strategic hub for security innovation, cloud transformation, talent, and customer collaboration. This new and expanded office reflects our ethos as a world-class international company.Previously, Zscaler’s EMEA operations have been distributed across several regional hubs. Now we’re proud to announce that London is the official headquarters for Zscaler in EMEA. This centralization brings together leadership, strategy, sales, and marketing under one roof – creating a vibrant environment for ideation, collaboration, and the delivery of cybersecurity strategies that protect critical data, enable agility, and drive business outcomes at scale.The centerpiece of the new space is something truly special: our first purpose-built European Executive Design Center (EDC) for the region.Until now, our only Executive Briefing Center was located in San Jose, which meant a long flight for EMEA customers looking to make use of it! With the launch of the London EDC, we’re bringing customers that same immersive, hands-on experience – right on their doorstep. This is truly a game-changer. It will allow prospects and customers to see firsthand how Zscaler technology protects and modernizes some of the world’s largest and most complex organizations. More importantly, it will enable them to co-create strategies with our top-tier consultants to solve the most pressing cybersecurity and IT infrastructure challenges facing enterprises and the public sector across EMEA.Some of the key features the EDC offers include:Access to Zscaler’s global innovation roadmapWorkshops on threat intelligence, AI in security, and Zero Trust Everywhere strategyPeer-to-peer customer sessions and best practice sharingEvery detail of the center has been carefully considered – from a dedicated customer entrance and terrace to flexible meeting rooms to accommodate larger gatherings and a private kitchen – ensuring a tailored, high-impact experience for every visitor.For our customers, the EDC ultimately means earlier access to innovations, more localized support, and direct engagement with EMEA leadership.But it is just one milestone in a far broader regional story.EMEA has always been Zscaler’s second-largest market by geography, contributing approximately 30% of our global revenue – with the UK accounting for a significant portion of that. And our presence here continues to expand. Over the past two years, we’ve established offices and customer hubs in key markets such as Germany, France, the Netherlands, and the UAE. We’ve seen significant team growth, supporting everything from go-to-market roles to technical and partner-focused functions. And we’ve built out our partner ecosystem and joint go-to-market programs with regional system integrators and MSSPs.This growth is being driven by a surge in demand from organizations in the region that are accelerating their move to zero trust security. As concerns around threat protection, data sovereignty, operational resilience and more continue to rise, we are&nbsp;scaling our people and infrastructure to meet that demand – locally and effectively.The opening of our London HQ and EDC is a reflection of EMEA’s growing significance in Zscaler’s global operations. It’s a signal of expanded investment in the region’s cybersecurity ecosystem – and a promise to our customers that we’re thinking long-term about how we support them on the journey ahead.We look forward to welcoming our staff and customers to our new home in London.]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[A Transformational Zenith Live EMEA]]></title>
            <link>https://www.zscaler.com/blogs/company-news/a-transformational-zenith-live-emea</link>
            <guid>https://www.zscaler.com/blogs/company-news/a-transformational-zenith-live-emea</guid>
            <pubDate>Thu, 10 Jul 2025 09:39:03 GMT</pubDate>
            <description><![CDATA[As the digital landscape continues to evolve at breakneck speed, Zscaler’s Zenith Live EMEA 2025 proved to be more than just a conference—it was a bold statement about the future of secure digital transformation.&nbsp;From demonstrating our latest AI-powered innovations around segmentation, data security classification, prompt visibility and more, to providing deep dives into securing private LLM deployments and on-prem data environments, the event showcased how Zero Trust Everywhere is no longer a concept—it's a necessity.&nbsp;As was evidenced in the brilliant turnout in Prague, this is something more and more organizations – of every size and industry – are coming to realize. I had the pleasure of spending four days at the show and during that time I witnessed firsthand many lightbulb moments for our attendees – where one of our speakers or even a peer introduced an idea or solution that they hadn’t thought of previously.&nbsp;The key topics of discussion were largely what I had expected them to be. As predicated in my&nbsp;previous blog, data resiliency was a huge talking point for customers, partners and media attendees alike, and especially front of mind given the current macroeconomic climate. But we also saw a great deal of interest in data sovereignty and the different approaches organizations could take to achieving this. Whether the use case is public sector or private, country-level or regional, as sovereign demand only grows more nuanced, so too will the need for security companies like Zscaler to respond.And of course, no conference in 2025 would be complete without a heavy focus on AI. With our recent acquisition of Red Canary to expand our AI-powered security operations, and a whole batch of advanced AI security capabilities announced during Zenith Live AMS, we had a lot to say. And a lot to be proud of. As organizations continue to adapt to the AI era, Zscaler is enabling our customers to adopt cutting-edge AI technologies securely and at scale. Our platform leverages the world’s largest inline security cloud—analyzing over 500 trillion security signals daily. This unmatched volume of real-world telemetry fuels Zscaler’s AI engines, enabling precise threat detection and robust automated security.&nbsp;For newer customers attending the show for the first time from markets such as the Middle East, Africa and Eastern Europe, I hope their time in Prague will have solidified something they were already starting to see – that Zscaler isn’t just a security tool, but a platform for unlocking true transformation outcomes.&nbsp;We’re now in a race to the end of our financial year – but the show has yet again proved to us that our direction is the right one. So why not join us on the journey – we’re here to help you deliver security, resilience and operational agility wherever you need it most.&nbsp;&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The End of Network Guesswork: Cellular Control Made Simple]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-end-of-network-guesswork-cellular-control-made-simple</guid>
            <pubDate>Fri, 20 Jun 2025 06:14:08 GMT</pubDate>
            <description><![CDATA[Most organizations assume that once a device connects to a cellular network, it’s automatically under control. In reality, that assumption is rarely true. When a SIM card is active and connected, its traffic flows freely across networks and borders with little visibility or control. The result is an illusion of security that leaves organizations exposed to risks and policy violations, especially when they need to enforce compliance based on geography or behaviour.As I outlined in my previous&nbsp;blog, telcos provide a certain layer of control at the network-level, but granular control related to an organization’s specific security policies is often missing from their offering. As a result, most organizations still tend to rely on legacy architectures such as firewalls, VPNs, and backhaul networks to try and fill the gap. Not only do these add complexity and cost, but they often fail to deliver the proactive, zero trust control that today’s cellular environments demand. Once connected, devices are allowed to communicate too freely, violating zero trust principles that require strict verification of every interaction.Zscaler Cellular changes this dynamic entirely by giving organizations granular control of every packet leaving the device. Instead of having to wait for traffic to reach a network hub or firewall, every connection attempt is evaluated and decided upon instantly at the edge. This early decision determines whether the traffic is routed to the internet or a private application, and allows organizations to apply related policy enforcement before the data ever leaves the device. Because the control is integrated at this base level, organizations no longer need to deploy complex infrastructure or configure multiple layers of security. The SIM or eSIM simply activates, and control is live.This approach enables highly granular, context-aware policies to be implemented based on identity, location, behaviour, or risk factors. For example, a SIM can be restricted to operate only within specific countries or regions, preventing unwanted roaming, data transfers or misuse. Anomaly detection capabilities further enhance security by flagging or blocking unusual behaviour, such as attempts to access disallowed resources or connect from unexpected locations. These controls are delivered globally and consistently, ensuring seamless security anywhere in the world without added operational overhead.And I’d underline seamlessly here. What makes Zscaler Cellular truly revolutionary is its simplicity by design. There is no need to manage firewalls, tunnels, or backhaul networks. There is no complex setup or manual intervention required beyond inserting or activating the SIM. The traditional guesswork and delays associated with network security are eliminated. Instead, organizations gain immediate visibility and policy enforcement aligned with zero trust principles, transforming reactive security measures into proactive, intelligent control.This seamless integration of connectivity and zero trust security is made possible by uniting two previously separate domains; connectivity from mobile operators and zero trust frameworks from security providers. Zscaler is the first to bring these together in a unified service, delivering secure, ubiquitous communication with intelligent control.In a world where cellular devices increasingly power critical business functions, Zscaler Cellular offers a decisive step forward in protection. This is zero trust application without complexity - and it’s just the beginning. Because once control is simplified, the next frontier is zero trust everywhere.&nbsp;Learn more about the power of ubiquitous protection in my third and final blog of this series next week.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Out of Sight, Out of Control: Bridging the Cellular Visibility Gap]]></title>
            <link>https://www.zscaler.com/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</link>
            <guid>https://www.zscaler.com/blogs/company-news/out-of-sight-out-of-control-bridging-the-cellular-visibility-gap</guid>
            <pubDate>Thu, 12 Jun 2025 04:22:05 GMT</pubDate>
            <description><![CDATA[Do You Know What Your Organization’s Cellular Devices Are Doing Right Now?Every day, countless cellular-connected devices quietly communicate across the internet and private networks, without the knowledge or oversight of the organizations that own them. These devices - which could range from lighting sensors to critical industrial equipment - operate outside traditional security controls, creating a blind spot in many enterprises’ security strategies. Indeed while it’s commonly assumed that mobile networks provide a secure path for all cellular devices even if you have trouble seeing them, the reality is far more complex and risk-prone than most realize. And so it begs the question, do you know what your organization’s cellular devices are doing right now?Mobile carriers do offer network-level protections, but these aren’t necessarily designed with applications or the sensitive data flowing across them as the priority focus. Cellular devices frequently run multiple software components, making a variety of outbound requests that go unseen by traditional security tools. The implicit trust placed in these mobile connections leaves organizations vulnerable to threats that can easily slip through the cracks.Without full visibility into what these devices are doing, security teams cannot detect unusual activity, enforce granular policies, or respond effectively to emerging risks. The legacy approach of relying on firewalls, VPNs, and costly backhaul infrastructure simply doesn’t scale or adapt well to the sprawling, dynamic world of cellular-connected devices. This results in increased attack surfaces and operational headaches.That’s where Zscaler Cellular changes the game. By ensuring every single data packet from cellular devices go through Zscaler’s zero trust platform, organizations gain complete visibility into device behavior - even for those that were previously out of reach. This transparency means businesses can see exactly where each device connects, what it’s communicating with, and how policies are being applied to it in real-time. Most importantly, it enables a shift from blind trust in mobile networks to informed control over every connection. This is visibility by design.&nbsp;Visibility is more than a technical advantage; it’s the foundation for extending modern security to mobile and IoT environments. But the real opportunity goes further: with Zscaler Cellular, organizations can move from passive insight to active, ubiquitous protection.By bringing zero trust to devices that were previously out of reach, security teams can enforce consistent policy across every connection, everywhere - no matter the network or location. In my next blog, we’ll dive deeper into how this newfound visibility empowers organizations to enforce powerful controls - moving beyond passive monitoring to actively securing every session at the very first packet.If you want to find out more about Zscaler Cellular, join us at Zenith Live EMEA in Prague from 16th - 18th of June 2025.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zero Trust is Reshaping Cyber Insurance by Reducing Risk]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</link>
            <guid>https://www.zscaler.com/blogs/company-news/zero-trust-is-reshaping-cyber-insurance-by-reducing-risk</guid>
            <pubDate>Wed, 11 Jun 2025 06:52:49 GMT</pubDate>
            <description><![CDATA[In an era where ransomware attacks continue to show the shortcomings of perimeter-based defenses, Zero Trust has proven itself as a game-changer for cyber insurance outcomes.A&nbsp;landmark report from&nbsp;Zscaler, leveraging Marsh McLennan’s Cyber Risk Intelligence Center, found that&nbsp;up to 31% of cyber losses could have been prevented with Zero Trust architecture properly deployed alongside solid cyber hygiene. That translates into&nbsp;$465 billion in avoided global economic damage annually–a staggering figure with major implications for both security leaders and insurers.Where Traditional Security FailsTraditional security models rely on perimeter security appliances like firewalls and virtual private networks (VPNs), but recent data paints a troubling picture: these very devices are often the&nbsp;initial access vector in ransomware attacks.&nbsp;According to Coalition insurance claims data, organizations using perimeter security products like firewalls and VPN’s are&nbsp;up to 12 times more likely to report a claim.Why? Because perimeter defenses foster a&nbsp;false sense of security, encouraging risky behavior like enabling firewalls, VPN’s, remote desktop protocol (RDP) or skipping multi-factor authentications (MFA) under the illusion of “protected borders.” In contrast,&nbsp;Zero Trust assumes breach,&nbsp;verifying every user, device, and application continuously, thereby&nbsp;limiting an attacker’s ability to access and move within a network, even after an initial compromise.Real-World Impact: The Zscaler Zero Trust Exchange and Cyber InsuranceOrganizations that deploy the&nbsp;Zscaler Zero Trust Exchange are not only reducing the risk of breaches and business interruption stemming from ransomware or other attacks, they're also seeing&nbsp;measurable improvements in cyber insurance outcomes.Take&nbsp;Risk360, Zscaler’s cyber risk quantification engine, which helps customers&nbsp;translate Zero Trust posture into dollar-value risk assessments. With telemetry from 50+ million devices and deep visibility across IT estates, Zscaler equips underwriters with the data needed to streamline cyber insurance applications and renewals.That’s already happening. Through relationships like Zscaler and Resilience Insurance, organizations can now feed Zero Trust telemetry into insurance renewals. The result?Simplified Zero Trust inclusion, during policy submissionsBetter assessment of overall riskUnderstanding of Zero Trust controls that address exposure&nbsp;Beyond the Boardroom: Proving ROI on Security InvestmentsCyber insurance isn’t just a financial backstop; it’s becoming a&nbsp;real-time barometer of cybersecurity maturity. And Zero Trust is proving its worth.Darin Hurd, CISO of US-based mortgage company Guaranteed Rates, puts it plainly: “We now have independent validation that Zero Trust offers significant benefits... Companies that prioritize Zero Trust investments gain a significant edge as cyber defenders.”IBM’s 2024&nbsp;Cost of a Breach Report provides further confirmation: organizations with Zero Trust experience&nbsp;20.5% lower breach costs than those without. The report puts the average cost of a breach in the US at $9.48 million.Zero Trust: Best Practice and Business-CriticalAs the threat landscape evolves, organizations can no longer afford to rely on outdated perimeter defenses. Apply proper cyber hygiene in addition to Zero Trust is a better approach. It’s a risk management imperative for cyber resilience. When properly deployed, Zero Trust reduces the external attack surface, prevents lateral spread, protects against comprise and data loss, resulting in:&nbsp;&nbsp;Enhanced cyber insurability, often resulting in more favorable policiesPrevents one third of cyber eventsCuts breach costs by over 20%Reduces insured loss by up to 31%Zscaler’s industry leading Zero Trust Exchange solution enables clients to identify, mitigate and report on their security posture, while streamlining the cyber insurance submission and renewal process with an automated Zero Trust addendum.&nbsp;We knew it. Insurers knew it. Attackers knew it. And now, thanks to&nbsp;Zscaler and Marsh McLennan, we have the data to prove it.&nbsp;]]></description>
            <dc:creator>Stephen Singh (VP, M&amp;A/Divestiture and ITO integration at Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Having Resilient Conversations at Zenith Live 2025]]></title>
            <link>https://www.zscaler.com/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</link>
            <guid>https://www.zscaler.com/blogs/company-news/having-resilient-conversations-at-zenith-live-2025</guid>
            <pubDate>Tue, 03 Jun 2025 09:30:53 GMT</pubDate>
            <description><![CDATA[Since the start of this year, I have been all over the EMEA region – from Spain to Scandinavia, the UK to the Middle East. It’s been inspiring to understand the different priorities of each market, and where individual companies and broader industries are on their Zero Trust journeys.&nbsp;No matter the location or vertical, however, one topic that is coming up time and time again in my conversations with customers is resilience. Or more specifically, how companies can back-up and protect their existing data estate, and why this action should be acted upon immediately vs. being something that can wait.&nbsp;Exploring today’s resilient landscapeResilience is a topic we’ve been discussing a lot at Zscaler - and not just in terms of our own cloud infrastructure. Earlier this year, we launched&nbsp;research exploring the state of cyber resilience within global businesses. While the results showed an increasing recognition of resilience’s critical business value within a volatile operating environment and escalating threat landscape, they also highlighted worrying inconsistencies, gaps and inefficiencies in current strategies that IT leaders cannot afford to ignore any longer.&nbsp;In particular, we’ve seen that many organizations still rely on outdated or reactive security models. They feel confident in their resilience posture because nothing’s gone wrong yet. But without getting far more proactive with their approaches, set-ups and risk hunting, that confidence may well be misplaced in the wake of emerging developments like AI powered threats. Real resilience comes from visibility, awareness and preparation – not just hope and assumption.The key is building what we call “Resilience by Design.” That means designing systems that can absorb shocks, adapt quickly and keep the business running, even when things go wrong. It applies across every layer of the tech stack, from infrastructure and networks to applications and data. But so too does it apply to the people behind these stacks. As Gartner&nbsp;puts it in ‘Succeed as an SRM Leader by Infusing Resilience Into Your Program’: “Resilient people embody many of the same characteristics as resilient systems and are a key component of a resilient program.”&nbsp;At Zscaler we fully agree with the need for a more holistic approach to resilience – that’s why we’ve also commissioned research into personal resilience, and are due to launch those results in the coming month.&nbsp;Continuing the conversationMy next destination will be Prague for Zenith Live EMEA – Zscaler’s annual user conference. And I’m sure resilience will be a central topic of discussion there as well, as we plan to demonstrate how organizations can thrive in AI with the help of Zero Trust.&nbsp;My attendance of Zenith Live will mark almost a year to the day since I joined Zscaler, so it’s an important milestone for me to reflect upon. In the past 12 months I’ve seen our relationships with partners and customers grow and mature. As companies look to the convergence of AI and Zero Trust to fuel their next level of digital transformation and establish resilient, mission-critical infrastructures, Zscaler’s platform message is&nbsp;resonating more than ever.We’ve also expanded into markets like the Middle East, Africa and Eastern Europe – and I’m really looking forward to meeting some of our newest customers in Prague, as well as our growing partner ecosystem and my team members who are flying in from across the region.&nbsp;We’ve a packed schedule of keynotes, transformation theatre presentations featuring Zero Trust Everywhere and over 60 breakout sessions co-presented by customers, so it promises to be a great event.&nbsp;I’ll be onsite for the full&nbsp;conference so do come and find me on the show floor. We can chat resilience, AI, zero trust and much more.&nbsp;]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Zscaler’s CMMC Level 2 Certification Empowers U.S. Department of Defense Contractors]]></title>
            <link>https://www.zscaler.com/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</link>
            <guid>https://www.zscaler.com/blogs/company-news/how-zscaler-s-cmmc-level-2-certification-empowers-u-s-department-defense</guid>
            <pubDate>Tue, 27 May 2025 14:37:12 GMT</pubDate>
            <description><![CDATA[Cyber threats are escalating at an unprecedented rate, and as contractors supporting the U.S. Department of Defense (DoD), the stakes couldn’t be higher. Protecting sensitive data, such as Controlled Unclassified Information (CUI), is a mission-critical responsibility for every contractor within the Defense Industrial Base (DIB). With the establishment of the Cybersecurity Maturity Model Certification (CMMC) framework, the DoD has provided clear guidelines to strengthen the security posture of its contractors and safeguard the digital supply chain that underpins U.S. national defense.At Zscaler, we understand the immense responsibility that comes with operating in this high-stakes environment. It is with great pride that I share the news that Zscaler takes a prominent role as a Security SaaS provider in&nbsp;achieving CMMC Level 2 certification. This accomplishment is not just a certification milestone—it’s a testament to Zscaler’s commitment to empowering DoD contractors with the tools and technologies they need to achieve compliance, modernize security, and execute their mission-critical projects with confidence.Why CMMC Compliance Is a Game Changer for DoD ContractorsThe CMMC framework is DoD’s self-induced catalyst toward strengthening the cybersecurity posture of the DIB. Developed by the DoD, CMMC establishes a governance framework that defines a set of cybersecurity, compliance, and contractual standards that contractors must meet to be eligible for defense contracts. The framework emphasizes the protection of sensitive government data—including CUI—and ensures that cybersecurity is not an afterthought, but a foundational aspect of every contract.Achieving CMMC compliance is about much more than meeting contract requirements. Compliance demonstrates a contractor’s ability to protect critical assets, ensuring mission continuity and safeguarding the integrity of the overall national defense strategy. As threats continue to evolve, the financial, operational, and reputational risks of failing to secure sensitive information mean that compliance has become a strategic imperative for every DoD contractor.At Zscaler, we view compliance not as an endpoint but as a springboard for comprehensive cybersecurity excellence. With our achievement of CMMC Level 2 certification, we are positioned to help DoD contractors strengthen their cyber defenses, streamline compliance, and adopt solutions that meet today’s needs while anticipating tomorrow’s risks.The Zscaler Approach: Zero Trust and Cloud-First SecurityOur journey to earning CMMC Level 2 certification was rooted in our implementation of a Zero Trust Architecture. This approach is powered by Zscaler Internet Access™ (ZIA™) and Zscaler Private Access™ (ZPA™), two of our core solutions that are&nbsp;FedRAMP-authorized and purpose-built to meet the security demands of federal and defense environments.Zero Trust flips the traditional perimeter-based security model on its head. Instead of assuming that entities within a network can inherently be trusted, Zero Trust applies the principle of “never trust, always verify.” It ensures that no user, device, or application can access sensitive resources without first being authenticated and authorized. For the DoD contracting community, this model is a game changer. It eliminates unnecessary risk, minimizes the attack surface, and ensures sensitive data remains secure—no matter where users or applications are located.Our cloud-native approach is designed to simplify the complex. Many contractors today struggle with the operational burden of fragmented legacy systems and disjointed compliance workflows. By centralizing cybersecurity and compliance under the Zscaler platform, we enable contractors to reduce complexity, eliminate inefficiencies, and focus on their core missions.How CMMC Level 2 Certification Benefits DoD ContractorsEarning CMMC Level 2 certification is more than an achievement for Zscaler—it’s a call to action to help DoD contractors embrace industry-leading security solutions. Here’s what this milestone means for your operations:Streamlined Compliance Process: Managing compliance across the DoD contracting landscape can often feel like navigating through a maze of fragmented tools and requirements. Zscaler consolidates and simplifies compliance efforts, helping contractors achieve regulatory requirements faster and with minimal disruption to operations.Enhanced Cybersecurity Posture: With our Zero Trust approach, DoD contractors benefit from robust, cloud-native protections that evolve alongside emerging threats. This proactive security architecture reduces the risk of data breaches and other cyber exploits.Accelerated Digital Transformation: Our cloud-first solutions were built to empower contractors to innovate without sacrificing security. Whether transitioning workloads to the cloud or modernizing IT operations, Zscaler ensures that contractors can embrace digital transformation with confidence.Future-Ready Protections: In the constantly shifting cybersecurity landscape, future-proofing your operations is essential. As Zscaler actively works toward alignment with CMMC Level 3 requirements, contractors can rest assured that their cybersecurity framework will remain adaptable and aligned with DoD mandates.Compliance represents much more than a checkbox exercise; compliance is the foundation for achieving higher levels of organizational resilience and operational agility. As I often say, “Compliance is the foundation and the floor, not the ceiling.” That philosophy drives Zscaler’s approach to CMMC compliance.Looking AheadOur CMMC Level 2 certification is not the endpoint of our journey but a stepping stone to even greater achievements as we continue to support the DIB. We are actively assessing our alignment with CMMC Level 3 requirements and remain dedicated to helping contractors prepare for what’s next.To all U.S. Department of Defense contractors: Zscaler is here to help you protect sensitive data, drive innovation, and sustain mission success in an era of increasingly complex challenges. We’re proud to stand alongside you as a partner in security excellence and a catalyst for meaningful digital transformation.If you’re ready to accelerate compliance and adopt modern security built for the demands of the DoD ecosystem, I invite you to explore Zscaler and see how we can work together to defend the critical missions that keep our nation safe.]]></description>
            <dc:creator>Kumar Selvaraj (Sr. Director, Technology Risk &amp; Compliance)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler Named a Leader in the 2025 Gartner® Magic Quadrant™ for Security Service Edge (SSE)]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</link>
            <guid>https://www.zscaler.com/blogs/company-news/zscaler-named-leader-2025-gartner-r-magic-quadrant-tm-security-service-edge-sse</guid>
            <pubDate>Fri, 23 May 2025 15:31:03 GMT</pubDate>
            <description><![CDATA[IntroductionAt Zscaler, our mission is to secure, simplify, and accelerate business transformation, empowering your organization to be more competitive. For more than 15 years, we have been pioneering the technology that secures any-to-any zero trust communication using business policies, not corporate networks, and we have witnessed the widespread adoption of SSE solutions that provide a practical path for organizations to follow.Gartner Magic Quadrant for SSEThe 2025 Gartner® Magic Quadrant™ for&nbsp;Security Service Edge (SSE) has been published and Zscaler has again been named a Leader in this report,&nbsp;positioned highest for Ability to Execute. This is the fourth year that Zscaler has been named a Leader in the Magic Quadrant for SSE.We believe that our placement in the Leader Quadrant in this report, alongside 1,000+ reviews for Zscaler SSE on Gartner Peer Insights™, averaging a score of 4.65 out of 5 (as of today), demonstrates our strength in addressing the market for SSE solutions.&nbsp;In our opinion, the services that make up SSE are foundational elements of the&nbsp;Zscaler Zero Trust Exchange™, the first cloud native, multitenant, proxy-based security architecture, that is now processing over 500 billion daily transactions.Zero Trust EverywhereSSE, as defined by Gartner, ensures that authorized users have secure identity- and policy-driven access to approved internet, SaaS, and private applications. Building on more than 15 years of&nbsp;cybersecurity innovation and feedback from thousands of CIOs and CISOs,&nbsp;Zscaler takes this concept further with&nbsp;Zero Trust Everywhere, enabling customers to extend the benefits of SSE and unify security across three broad areas:Users: Secure application access for employees, contractors, partners, suppliers, and other B2B third parties.Branches: Secure each branch, factory, warehouse, and IoT/OT device, treating each as an island of one.Clouds: Secure workload communications across multicloud environment.&nbsp;&nbsp;By extending the SSE platform beyond users, Zscaler enables its customers to simplify their IT operations with a comprehensive, cloud native architecture that can protect their&nbsp;entire organization.Customer EndorsementWe believe that a key measure of Zscaler’s success is the value we deliver to our customers, and the trust they put in us to provide a resilient, scalable, and secure service as they progress through their digital transformation journeys. We’re proud of Zscaler’s recognition, validated by the following proof points:&nbsp;&nbsp;47 million users across approximately 8,500 customers worldwide~45% of Fortune 500 companies across all verticals rely on Zscaler to protect their operationsGlobal reach, with approximately 50% of our revenue in North America and 50% internationallyAn NPS score consistently above 75 vs. an average of 30 for SaaS organizationsConclusionAt Zscaler, driving innovation to empower organizations with a robust SSE-based zero trust platform is at the core of everything we do. Our goal is to stay ahead of evolving security needs, enhancing the Zero Trust Exchange with advanced capabilities to secure workforces, cloud workload communications, IoT/OT access, and B2B connections. With relentless focus, we ensure our customers are always prepared for what’s next.To receive a copy of the 2025 Gartner Magic Quadrant for SSE and see why Zscaler was recognized, please&nbsp;click here.We will be hosting a special webinar looking into the SSE market in 2025. Click here to register.&nbsp;&nbsp;&nbsp;Gartner DisclaimerGartner, Magic Quadrant for Security Service Edge, Charlie Winckless,&nbsp;Thomas Lintemuth,&nbsp;Dale Koeppen,&nbsp;Charanpal Bhogal, 20 May 2025Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.Gartner Peer Insights content consists of the opinions of individual end users based on their own experiences with the vendors listed on the platform, should not be construed as statements of fact, nor do they represent the views of Gartner or its affiliates. Gartner does not endorse any vendor, product or service depicted in this content nor makes any warranties, expressed or implied, with respect to this content, about its accuracy or completeness, including any warranties of merchantability or fitness for a particular purpose.GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally, MAGIC QUADRANT and PEER INSIGHTS are registered trademarks of Gartner, Inc. and/or its affiliates and are used herein with permission. All rights reserved.]]></description>
            <dc:creator>Adam Geller (Chief Product Officer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[IDC MarketScape Recognizes Zscaler as a Leader in Data Loss Prevention (DLP)]]></title>
            <link>https://www.zscaler.com/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</link>
            <guid>https://www.zscaler.com/blogs/company-news/idc-marketscape-recognizes-zscaler-leader-data-loss-prevention-dlp</guid>
            <pubDate>Tue, 29 Apr 2025 15:00:01 GMT</pubDate>
            <description><![CDATA[Data Loss Prevention (DLP) has undergone significant transformations over the years. Initially rooted in reactive measures to prevent data misuse, DLP has evolved to incorporate predictive and automated capabilities powered by AI and machine learning. This evolution enables enterprises to discover and classify sensitive data, identify abnormal patterns, maintain compliance with global regulations, and enhance overall security posture.As organizations adapt to the escalating risk of data breaches, the demand for robust data loss prevention (DLP) solutions has never been higher. IDC defines DLP as the set of technologies and processes designed to discover, monitor, and protect sensitive data from unauthorized access, misuse, or loss.&nbsp;IDC MarketScape for DLP Assessment&nbsp;IDC MarketScape: Worldwide Data Loss Prevention 2025 Vendor Assessment offers a comprehensive evaluation of nine companies in the DLP space. Its research includes vendor capabilities mapping, case studies, customer interviews, and evaluations of innovation at both strategic and tactical levels. By combining vendor performance insights with market trajectories, the excerpt serves as a benchmark for enterprises looking to enhance their data protection strategies with advanced DLP solutions. This rigorous research methodology provides a detailed analysis of vendor capabilities, offering invaluable insights into the competitive DLP landscape. Recently, the IDC MarketScape released its 2025 Worldwide Data Loss Prevention (DLP) Vendor Assessment, positioning&nbsp;Zscaler as a Leader.&nbsp;IDC MarketScape vendor analysis model is designed to provide an overview of the competitive fitness of technology and suppliers in a given market. The research methodology utilizes a rigorous scoring methodology based on both qualitative and quantitative criteria that results in a single graphical illustration of each supplier’s position within a given market. The Capabilities score measures supplier product, go-to-market and business execution in the short-term. The Strategy score measures alignment of supplier strategies with customer requirements in a 3-5-year timeframe. Supplier market share is represented by the size of the icons.Key takeaways from&nbsp;IDC MarketScape: Worldwide DLP 2025 Vendor AssessmentFor technology buyers, the IDC MarketScape assessment offers crucial takeaways. Enterprises are advised to prioritize vendors who concurrently support advanced data discovery, real-time threat prevention, and scalable integration across multi-cloud environments. Seamless deployment, integrations with existing IT ecosystem tools, and advanced reporting and analytics are must-have features for future-proofing data protection strategies. In addition to the excerpt, buyers are especially urged to align DLP investments with zero-trust security principles to ensure that solutions adapt readily to the shifting threat and data loss landscape.&nbsp;Why IDC MarketScape named Zscaler as a DLP LeaderThe IDC MarketScape for DLP 2025 Vendor Assessment named Zscaler as a Leader in the DLP market, citing the following strengths:&nbsp;“Zscaler has a sizeable customer base for its Zero Trust Network products. This gives Zscaler a solid foundation for expanding and growing its data security footprint while offering customers a consolidated experience.”“Customer feedback cited the speed and depth of Zscaler's customer service and support, as well as the interoperability with other products in the portfolio.”What we believe are Zscaler’s Highlights and StrengthsComprehensive Data Protection Platform:&nbsp;Zscaler’s standout strength lies in its&nbsp;Zscaler Data Protection offering and its leverage of the&nbsp;Zscaler Zero Trust Exchange™ architecture. This integrated platform delivers functionalities essential for any contemporary DLP solution: robust data discovery, classification, data security posture management, and proactive mapping of regulatory requirements. Zscaler's platform ensures complete data channel coverage, identifying sensitive data across various workloads, applications, and endpoints, while deploying real-time security capabilities to prevent unauthorized data exposure.Zero Trust Architecture:&nbsp;Zscaler’s Zero Trust Exchange aligns with one of the most effective security philosophies, enabling enterprises to eliminate implicit trust and secure interactions over all digital channels.Discovery and Classification:&nbsp; With powerful AI-driven classification complemented by traditional techniques like Regex, IDM, OCR, and EDM, the excerpt highlights the Zscaler platform’s comprehensive discovery capabilities. As a critical foundation for any data protection strategy, robust classification delivers deep visibility across all devices, applications, and locations, enabling organizations to safeguard sensitive data effectivelyIntegrated DSPM:&nbsp;Beyond simple data visibility, Zscaler’s platform extends into&nbsp;Data Security Posture Management (DSPM). This empowers organizations to uphold compliance, automate least-privilege access, and mitigate risks associated with misconfigurations or insider threats with prioritized risk remediation. Zscaler's DSPM capabilities are currently available as an add-on to its Zscaler AI Data Protection Platform.Email DLP:&nbsp;The newest addition to Zscaler's Platform, this data loss channel enables integrated control over email and attachments. Easily added to existing email infrastructure as an extra hop to M365 or Google services, Zscaler helps further consolidate DLP control across this key channel.Reporting:&nbsp;Zscaler offers comprehensive reporting features in its core product that include historical data, trends, patterns of activity, user behavior and executive summaries with customizable metrics and insights.&nbsp;Rapid innovation comes with unique challenges. Chief among these is the complexity involved in transitioning legacy systems to its advanced cloud-focused model. For some organizations, the gap between on-premise familiarity and sophisticated cloud-native tools may initially find the learning curve steep without adequate resources or organizational buy-in and require extensive change management efforts.&nbsp;Moreover, as DLP policies grow stricter, successful implementation requires strong collaboration between security, compliance, and end-user teams within client organizations.&nbsp; Building awareness at the grassroots level for stakeholders preconditioned to work with legacy solutions is another challenge. To this end, Zscaler offers robust onboarding services to help ease these transitions.&nbsp;Conclusion: Zscaler’s Vision for Future-Proof DLPWe believe that Zscaler continues redefining data protection in a world where sensitive information travels beyond traditional perimeters. Its Zero Trust Exchange, backed by policy-based automation and AI-powered insights, is setting a new standard for protecting enterprise data. As the data risk landscape evolves and regulatory scrutiny intensifies, organizations seeking a proactive approach to data security can trust Zscaler’s innovative solutions to stay ahead.For enterprises navigating the complexities of DLP, we believe Zscaler’s position as a Leader in the IDC MarketScape is more than recognition; it’s a call to action for investing in a future-proof strategy. With the right guidance and technology, businesses can maintain compliance while fostering innovation in a cloud-first, AI-driven world.&nbsp;To learn more, download an excerpt of&nbsp;the IDC MarketScape: Worldwide DLP 2025 Vendor Assessment.&nbsp;Source: “IDC MarketScape: Worldwide DLP 2025 Vendor Assessment” By: Jennifer Glenn, IDC doc #US53234325, March 2025]]></description>
            <dc:creator>Mahesh Nawale (Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Start Spreading the News: Zscaler Rocks Exposure Management]]></title>
            <link>https://www.zscaler.com/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</link>
            <guid>https://www.zscaler.com/blogs/company-news/start-spreading-news-zscaler-rocks-exposure-management</guid>
            <pubDate>Mon, 28 Apr 2025 20:14:32 GMT</pubDate>
            <description><![CDATA[It’s not just our customers who love our Exposure Management offerings – now Cyber Defense Magazine has chimed in to recognize the excellence of our solutions with not one but two Global InfoSec Awards!We took the top prize in two categories:Visionary Continuous Threat Exposure Management (CTEM)Cutting Edge Exposure ManagementThe CDM Global InfoSec Awards honor information security innovators who provide unique and compelling products and services. What perfect timing, to earn this recognition just as we kick off the RSA Conference this week! Come see these award-winning solutions in action, at Booth N-5361.Our best-in-class Exposure Management solutionsPowered by our Data Fabric for Security, our solutions provides our customers with a complete and contextual understanding of their risk posture.Our Asset Exposure Management solution for CAASM:Creates a complete and accurate asset inventory by integrating data across hundreds of sources and normalizing the asset metadata for increased accuracy.Identifies coverage gaps to pinpoint missing controls, misconfigurations, and ensure compliance.Automates workflows to adjust access policies and update CMDBs to maintain asset hygiene.Our Unified Vulnerability Management solution:Consolidates data ingested from multiple vulnerability scanners, plus dozens of other security and business tools providing other findings and business context.Correlates the aggregated information to identify a company’s most critical exposures, taking into account their mitigating controls.Prioritizes vulnerabilities based on business impact and exposure severity and identifies key mitigation requirements for high-risk areas.&nbsp;Our Risk360 solution:Assesses risk across Zscaler systems and third-party data sources, surfacing configuration change recommendations within Zscaler offerings to reduce customer risk.Quantifies the financial loss estimates associated with industry standard and custom risk factors.&nbsp;&nbsp;Come see us at RSAAll these solutions, along with Zscaler’s full Zero Trust Exchange solution and Data Protection offerings, will be featured at our RSA Booth, and we’ll have live presentations nearly every hour. We’d love to see you there!If you’re not lucky enough to be at RSA this year, don’t fret – you can always schedule a personalized demo.]]></description>
            <dc:creator>Michelle McLean (Sr. Director, Product Marketing)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler UK User Group provides Insight, Collaboration and Networking opportunities]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</link>
            <guid>https://www.zscaler.com/blogs/company-news/zscaler-uk-user-group-provides-insight-collaboration-and-networking-opportunities</guid>
            <pubDate>Thu, 17 Apr 2025 16:53:57 GMT</pubDate>
            <description><![CDATA[Our recent Zscaler User Group Event at Hijingo in London was once more a testament to the power of collaboration, bringing together over 55 customers for a day of networking, information sharing, and open discussions on how to navigate the evolving landscape of Zero Trust security. As a customer-only event, a user group meeting is designed to foster meaningful dialogue, with an agenda that encourages peer learning, exchange of experiences, and exploring best practices together. In addition to the customer-led sessions that focussed on individual organizations' Zero Trust transformation journeys, and a session from our Customer Success team on 'Zero Trust Beyond Remote Work,' these events truly thrived on the personal exchanges between participants.Key take aways from real-world Zero Trust experiencesThe day’s standout moments are usually the fireside chats amongst customers. These conversations offer candid, real-world insights into both the challenges and successes of implementing Zero Trust across organizations. Interestingly, the key takeaway this year wasn’t technical at all. Customers consistently emphasised that aligning stakeholders, securing executive buy-in, and shifting organizational mindsets are the true foundations of a successful Zero Trust journey. To drive this transformation, it is essential to clearly demonstrate the ROI of a Zero Trust approach by focussing on leadership priorities such as cost reduction and security simplification.As multi-cloud environments grow increasingly complex, organizations are finding it difficult to maintain visibility and control - unless they can unify their data streams through a centralized dashboard. Once they transition to a cloud-based Zero Trust platform, the next challenge often lies in managing Zero Trust across distributed, virtual teams. This shift highlights the need to upskill teams to effectively handle the new security paradigm. This opening session brought a key theme into focus: Zero Trust is as much about operational and cultural transformation as it is about technology.&nbsp;AI, Risk, and the Zero Trust Journey&nbsp;Inspiration provided the session on AI governance in a Zero Trust world. It served as a timely wake-up call for organizations to take a proactive stance on defining AI security policies before security gaps have a chance to emerge. As AI adoption accelerates, so do the challenges around governance, security, and risk management. The session explored how businesses must strike a careful balance between innovation and security, ensuring AI-driven progress boosts productivity without introducing unnecessary risk.&nbsp;As employees will always try to find a way to boost their productivity with the help of AI, organizations have to understand usage patterns of the tools. Only by identifying how employees interact with AI, will they be able to counterfeit the associated risks of the modern ways of working. The recently launched&nbsp;ThreatLabZ 2025 AI security report showed an explosion of AI/ML transactions in the Zscaler cloud with a 3,464.6% year-over-year increase, highlighting the massive growth of enterprise AI adoption. However, AI can be a double edged sword that enables not only a productivity boost, accelerated decision-making, and automated workflows, but cybercriminals are using the same technology to automate and scale more sophisticated attacks. From hyper-realistic deepfakes to advanced vishing scams, AI-generated threats have quickly raised the stakes for enterprise security.According to the report, blocking is the immediate reaction to the emerging threat landscape. With 59% of AI/ML transactions prohibited by enterprises, this signals concerns over data security and the uncontrolled use of AI applications. However, blocking AI-related transactions is only a reaction and not a strategy. Organizations must work to establish AI governance frameworks to ensure AI use is controlled without stifling innovation or user productivity. A risk-based approach that centers around protecting critical assets must begin with a clear classification of the AI tools in use. This foundational step enables IT teams to define precise policies for sanctioned, tolerated, and unsanctioned AI applications. Building on this session, much of the discussion within the user group centered around governance strategies for effectively managing AI-related risks.&nbsp;Fireside Chat: From Strategy to SuccessParticipants also gained valuable insights from peers who shared real-world lessons on implementing Zero Trust in complex environments. The fireside chat highlighted the critical role of cross-functional collaboration in successfully adopting and scaling Zero Trust strategies. One customer shared how they streamlined their security architecture by consolidating firewalls and proxies through the Zscaler cloud – simplifying their toolset while maintaining robust protection. At the same time, they focused on strengthening business continuity by enhancing resilience and improving incident response as part of their disaster recovery planning – a topic that resonated strongly throughout the day’s discussions.&nbsp;While the customer conversations were front and center, Zscaler closed the event with a session on Zero Trust beyond Remote Work. It showcased how the Zscaler cloud platform continues to evolve, enabling organizations to extend Zero Trust principles to all networks and devices, regardless of location. Emphasis was placed on securing all traffic through the Zscaler platform using tools like Client Connector, App Connector, and Private Service Edge. Together, these components help build a resilient Zero Trust architecture that supports granular access controls based on user identity, device posture, and business context. The key message was clear: Zero Trust isn’t just for remote work – it must be embedded across the entire enterprise to effectively replace broad network access with precise, application specific segmentation.&nbsp;&nbsp;In conclusion, our customers’ experiences highlight that Zero Trust is not a one-time project, but an ongoing journey that hinges on stakeholder alignment and strong cross-functional collaboration. As organizations adopt AI, security teams must take a proactive stance, implementing governance frameworks while maintaining visibility and control across increasingly complex multi-cloud environments. Close partnership with product teams also plays a vital role in unlocking the full value of new capabilities. By actively listening to and building alongside our customers, we can guide them through every step of their Zscaler journey and help ensure lasting, successful transformations. Because in the end Zero Trust isn’t a destination - it’s a continuous journey.&nbsp;&nbsp;]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[How organisations can weather future storms by becoming ‘Resilient by Design‘]]></title>
            <link>https://www.zscaler.com/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</link>
            <guid>https://www.zscaler.com/blogs/company-news/how-organisations-can-weather-future-storms-by-becoming-resilient-by-design</guid>
            <pubDate>Thu, 03 Apr 2025 08:33:11 GMT</pubDate>
            <description><![CDATA[In today's world of escalating cyber threats, organisations face unprecedented challenges trying to maintain IT and business operations without disruption. As the pressure to digitally transform continues, cyber resilience is fast emerging as the driving force behind survival and success. But with bad actors currently controlling the pace of change, organisations are having to find more and more ways to improve their security posture, which is why cyber resilience has gained popularity.As an approach, cyber resilience recognises the fact that an appropriate security posture is not just having the best defensive controls, but includes how to stay in business - no matter how significant the attack. The process is never complete, and instead must be constantly evolved to keep up with adversaries. That means that within their cyber security strategies, organisations must respond to the challenge of not only putting controls in place to prevent incidents from occurring, but also having the mechanisms set-up to be able to respond to and recover when they inevitably do. We call this being ‘Resilient by Design.’This is where a mindset shift is needed. According to our recent research report&nbsp;‘Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative’ 60% of IT leaders globally believe their organisation overly prioritizes prevention in its cyber security strategy, and more than half of the respondents (57%) say their leadership continues to define cyber security failure as initial access by a threat actor.&nbsp;This needs to change. Effective cyber resilience approaches that are ‘Resilient by Design,’ must go beyond the technical challenge of cyber prevention, and instead look at the situation far more holistically. They must answer the question: Do we have the ability across our business, infrastructure and people to prevent, withstand and recover from a successful attack?Preparing for the cyber stormThe analogy that comes to mind is that organisations should think of their cyber resilience as if they are preparing for a storm. If they only have an umbrella to hand, that will offer little protection against a hurricane. That is why humans rely so heavily on the weather forecast to warn us of coming storms – so we can take action to not only protect ourselves by seeking shelter, but also deploy additional security and recovery measures in advance. Continuing the analogy, there is more to overcoming the effects of a hurricane than just taking shelter. You also need to be able to prevent and withstand as much damage or impact as possible. Are building construction codes set up in such a way to endure the gale-force winds?&nbsp; Are there clean up plans after the storm clears - and are they prioritised to ensure essential services keep running?Of course, taking effective recovery measures means that you have to declare what those essential services are going to be beforehand. You might, for example, need ambulances to be able to go down roads to tend to the injured – meaning those roads have to be cleared first, and those ambulances are ready to go with medical staff available to equip them. Similar “cyber preparedness” steps have to be taken into consideration to become ‘Resilient by Design.’How to become ‘Resilient by Design’?Organisations need to ensure that they can respond quickly to cyber incidents. At Zscaler we are already helping our customers to shift to an architecture that can weather the cyber storm – not only putting appropriate security controls in place, but also replacing aging architectures that were built on what was effectively a house of cards.&nbsp;Per my introduction, we are also tackling the challenge from a more holistic point of view, looking beyond technology aspects and considering the full breadth of an organisation to deliver the capabilities for a robust response and recovery strategy. Forecasting cyber incidents, based on AI delivered insights should become part of the strategy as well. Additionally, as part of this, ‘Resilient by Design’ must encompass business capability requirements as well. The change to a zero trust based architecture, for example, not only solves the security challenges of digitized organisations, it also supports business agility and delivers a competitive advantage at the same time.&nbsp;With business capability an increasing part of the protection equation, security has already become a board level topic – and so too must resilience. Organisations need a business vision and an investment plan to switch gears to become truly cyber resilient. To continue to innovate with confidence, they also need to know they are as protected as possible, and able to recover from any incident without major interruption to business operations.&nbsp;The changing role of security&nbsp;Security’s role as a business enabler is a new paradigm that has become a reality in the past few years of transformation. In recognition of this, the CISO must also transform their role to reflect the more modern function of a BISO (Business Information Security Officer) and ensure that today’s security processes take business operations into account as well. As the security function matures, a ‘Resilient by Design’ approach is yet further evidence of the increasingly central role it is taking on.&nbsp;Looking ahead, organisations must leave the old school thinking of isolated security controls behind to achieve holistic resilience across their operations. In doing so, they will be able to weather whatever cyber security storms come their way. In today's volatile world, being ‘Resilient by Design’ isn't just a nice to have. It's your ticket to get a competitive advantage and unlock The Resilience Factor.This blog summarizes the first episode of The Resilience Factor podcast series. You can listen to the full conversation of the podcast&nbsp;here.]]></description>
            <dc:creator>Marc Lueck (CISO Northern Europe, Zscaler)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Lessons from Gartner on Infusing Resilience Into Your Security and Risk Program]]></title>
            <link>https://www.zscaler.com/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</link>
            <guid>https://www.zscaler.com/blogs/company-news/lessons-from-gartner-on-infusing-resilience-into-your-security-and-risk-program</guid>
            <pubDate>Tue, 25 Feb 2025 18:43:25 GMT</pubDate>
            <description><![CDATA[2025 demands a new approach to cybersecurity resilience. As network complexity collides with ever-more volatile threat and operating landscapes, traditional security measures have become untenable.While a security framework with perfectly synchronised people, processes, and partners might sound aspirational, it's no longer something you can choose to reach for—it's essential for business survival.&nbsp;Yet too often, proactive, sustained cyber resilience takes a back seat to reactive responses when cyber-attacks and operational failure scenarios strike.A timely research report from Gartner,&nbsp;Succeed as an SRM Leader by Infusing Resilience Into Your Program 1), offers a practical blueprint for organisations caught in these reactive cycles. It reveals how to build cyber resilience into your operations and create an adaptable system that can tackle constant interruptions, remove complexity, and stay prepared for threats both big and small.At Zscaler, we believe cyber resilience will define business success in 2025. And that a new approach is desperately needed. This isn't about better controls or technology alone – it's about making those controls and technologies work more effectively while supporting the teams that use them. Our mission this year is to help our customers unlock&nbsp;The Resilience Factor—something we define as the unique ability of a business (or indeed individual employee) to&nbsp;withstand adversity,&nbsp;adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.Ready to strengthen your organisation's cyber resilience strategy?&nbsp;Download the Gartner report now to discover practical steps for building a more resilient security programme. And stay tuned—this is just the beginning of our exploration into The Resilience Factor.1) Gartner, Succeed as an SRM Leader by Infusing Resilience Into Your Program, Authors: Michael Aldridge, Belinda Wilson, Arthur Sivanathan, 18th June 2024]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Legacy Architecture is Preventing a Modern Digitised NHS]]></title>
            <link>https://www.zscaler.com/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</link>
            <guid>https://www.zscaler.com/blogs/company-news/legacy-architecture-is-preventing-a-modern-digitised-nhs</guid>
            <pubDate>Tue, 25 Feb 2025 12:53:45 GMT</pubDate>
            <description><![CDATA[May 12th, 2017 is a day burned into the memories of IT and security teams nationwide. For those lucky enough to not be impacted, it was the first large-scale ransomware attack - titled WannaCry - which encrypted the data on Windows devices that hadn’t updated to a recent Microsoft patch. That data was held for ransom by bad actors who exploited the unpatched software, which had a major impact on more than a third of NHS Trusts and subsequently thousands of patients across the country.Now you might be thinking it’s 2025 – how is WannaCry still relevant eight years later? Well, although the Windows patching has improved beyond what it was in 2017, the fundamental flaws that were culpable in 2017 are still seen today. Traditional connectivity practices are still being used in hospitals and continue to leave our health system open to vulnerabilities due to implicitly trusted network access. Third parties and other organizations continue to connect to internal networks via VPNs or firewalls that have consistently proved to be plagued with basic vulnerabilities and zero-day threat software gaps.&nbsp;All of this subpar infrastructure time from already over stretched IT teams within the public sector and more specifically, our health system. We can’t keep trying to mitigate the flaws in legacy architecture by patching up the holes – there has to be a better way!Four steps to robbing a bankBefore we can identify the solution, we need to identify the root of the problem by understanding how a breach can happen. To put it into non-technical terms, an IT security breach is much like robbing a bank.&nbsp;The first step is to identify all the possible bank branches to hit. Perhaps there are 50 or 500 bank branches out there, so the next step is to narrow this down to a branch that can be broken in without getting caught. Perhaps it is in a secluded area, or the surveillance cameras are not working. The third step, once you're in, is to move laterally - find a cash safe, and make your escape. Four simple steps.&nbsp;This is the same four-step approach to conducting a cyber attack. First, they find your attack surface. What's your attack surface in the cyber world? Well, it's every public IP which may be firewall, a VPN, or application portal. And today, AI is helping bad guys to identify the attack surface very, very quickly. Secondly, they want to compromise you. They do this by essentially finding a vulnerable user or vulnerable applications. And today, you can actually generate phishing campaigns using AI or Machine Learning, or you can even create a webpage to really bring them in. So, either users fall for it through social engineering, or they exploit a vulnerable application. Once infected, the malware moves laterally through the wider network. It finds high-value assets, then encrypts it and asks for ransom. Number four, they don't stop there, they steal your data. And stolen data is often sent to the Internet.Build a zero trust strategyNow you understand the principle of a cyber breach, you need to learn how to mitigate these four steps. This is where a zero trust architecture is the ideal counter-measure. Zero trust isn’t about plugging the gap by creating a new form of firewall or VPN. Its key focus is to make sure the bad guys can be stopped at each of the four steps. For instance, Zscaler’s platform is far more effective than traditional firewall-based architecture. Generally, when new technologies like cloud come, IT vendors try to take existing technologies of networking security and try to adapt it to the cloud. Zscaler Zero Trust is fundamentally different. It never put users or third parties on the network and it only uses inside-out connections, always verify identity, policy and risk before allowing access.&nbsp;Meet us at NHS Cyber Security ConferenceReliance on outdated legacy systems is increasingly untenable in today’s digital age. To avoid another WannaCry incident, NHS Trusts must update their security architecture to a Zero Trust approach to prevent lateral movement and decrease the attack surface of traditional technology stacks. To learn more about how NHS networks are being continuously exposed to threats, please join us on&nbsp;5th of March 2025 at 12:55 for Zscaler’s session on “Why Legacy Architecture is No Longer Fit for Purpose in a Modern Digital NHS”. Using lessons from real world examples of ransomware attacks, we will highlight the limits of patching, and why VPNs and their daily CVEs continue to expose NHS networks to threats. Additionally, we’ll examine the dangers of lateral movement between interconnected NHS trusts and why this sharing of data might increase vulnerability. Attendees will leave with actionable insights on modernizing IT infrastructure to reduce these risks and better secure the future of digital healthcare using zero trust principles.&nbsp;We look forward to seeing you there.&nbsp;]]></description>
            <dc:creator>Mike Culshaw (Sales Engineer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Mobile World Congress: The Demand for Uniformity in Zero Trust]]></title>
            <link>https://www.zscaler.com/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</link>
            <guid>https://www.zscaler.com/blogs/company-news/mobile-world-congress-the-demand-for-uniformity-in-zero-trust</guid>
            <pubDate>Tue, 18 Feb 2025 12:43:22 GMT</pubDate>
            <description><![CDATA[My key take away from last year’s Mobile World Congress was that&nbsp;now almost everything is SIM-enabled, the industry focus moving forward will be on how telcos can make use of connectivity being delivered everywhere. Related to this, the open question coming away from the conference was how mobile connectivity can be orchestrated in one environment with effective controls?&nbsp;I have long seen security as the great unifier in this regard - as every user, device, and service demands uniform security on any network. This year I will return to Barcelona to deliver on that vision with an orchestration approach based on the uniformity of Zero Trust delivered via the Zscaler security cloud.For uniformity, the challenge has always been to extend an enterprise’s control, visibility and protection to all its assets, wherever they may be. To do so requires going beyond where physical infrastructure is located, where we have a forwarding router on the edge, or where clients are. To date, our Zero Trust based security cloud has been covering client side software and the edge of a network, and forwarding the edge of the cloud to all things in the IoT or OT-space.&nbsp;But we have not yet addressed the last unexplored territory of cellular connectivity with Zero Trust - meaning that this has still been a blind spot contributing to unsecured data streams from mobile services or things. And I deliberately say “things” here to signify that this goes beyond the scope of devices. The last mile for true uniformity of Zero Trust services has been unrealized – until now. With the extension of our Zscaler Cellular portfolio, we just added the last piece of the puzzle to deliver unified Zero Trust everywhere, at any time, and on anything in the various form factors that we need to deliver.Closing the security gap of mobile thingsZscaler Cellular brings secure Zero Trust-based connectivity into a cellular format; it is designed to enable the secure connectivity of IoT and OT devices or things that move outside the boundaries of a traditional network infrastructure.&nbsp;Typically, the traffic of such mobile devices outside the traditional enterprise perimeter would fall outside the control of IT security teams. Now, by providing organizations with an innovative way to send such traffic of these mobile devices or things through the Zscaler Zero Trust Exchange security platform, Zscaler Cellular helps the devices to achieve secure bi-directional connectivity from enterprises or their customers, and therefore close any potential security gaps.Zscaler Cellular can be deployed with existing cellular providers or through an end-to-end service from Zscaler. To deliver this Zero Trust functionality, Zscaler has built the Zscaler Cellular Edge, which can be deployed via three different routes:1. As a bolt-on for existing telco services&nbsp;2. Through a direct service from Zscaler&nbsp;3. By moving the cellular edge into private cellular environments. Customers that are looking into replacing their Wi-Fi ecosystem with a high speed, low latency solution based on 5G can use this path to gain secure gateway functionality to enable those devices and services to be protected.Zscaler Cellular makes routable or public IPs obsoleteTraditionally, SIMs would connect via a private APN to the customer’s network, which would require an IP address that makes it fully routable. Once the mobile traffic is inside the private network it is secured via the firewall. Such a set-up repeats the old story of tromboning and backhauling data (i.e. per traditional MPLS traffic flows) which a modern Zero Trust approach already made obsolete. The problem with continuing to use these routable networks is that their security models add latency, vulnerabilities, cost and backhauling to the data center, and also make devices visible to attackers.To simplify such a complex set-up, Zscaler Cellular has a direct relationship with any mobile network - turning the cell edges into the gateway to access private or Internet workloads without having to backhaul data. Similar to the early days when the Zscaler service removed backhauling by providing secure direct access to the Internet for users accessing their applications in the cloud, the cloud platform now also considerably simplifies the infrastructure for mobile connectivity and makes SIMs invisible to the outside world. Rather than the heavy lift of previous network configurations, one unified Zero Trust policy secures all cellular data streams via the Zero Trust Exchange platform. As well as simplifying the set-up, this enables Zscaler to give secure connectivity, protection and visibility via one unified approach that serves a multitude of customer use cases.Simplified security for the mobile world at MWCThe benefit of a unified Zero Trust approach is the universal applicability for various use cases of basically everything that is mobile. Whether it is handheld devices, vehicles, machinery, or other use cases in the logistics or mobility space the concept of simplified combined connectivity and security resonates broadly across a variety of industries.&nbsp;If you want to experience the power of the Zscaler Cell Edge and private cellular networks at Mobile World Congress, visit Zscaler at our Deloitte and NTT partner stands or drop by our booth on the executive meeting room level. We are looking forward to showcase how Zscaler Cellular extends the reach of Zero Trust to shape the future of secure connectivity.]]></description>
            <dc:creator>Nathan Howe (Global VP of Innovation)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Resilient by Design: From reactive incident response to proactive cyber strategies ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</link>
            <guid>https://www.zscaler.com/blogs/company-news/resilient-by-design-from-reactive-incident-response-to-proactive-cyber-strategies</guid>
            <pubDate>Tue, 11 Feb 2025 08:00:05 GMT</pubDate>
            <description><![CDATA[How resilience can be woven into security fabrics&nbsp;As they try to keep up with the rapid pace of technological evolution, IT teams continue to face immense pressure to innovate and digitize. At the same time, internal conditions such as legacy architectures and hybrid workforces, plus external ones like growing industry regulations and soaring cybersecurity threats, make protecting their business a more complex task than ever before.A realistic security team should be thinking that a significant security failure – whether a cyber-attack, brownout, blackout or worse – is now an inevitability. Accordingly, organizations must have a cyber resilience strategy on hand that allows them to bounce back and mitigate the damage of any incident as quickly and efficiently as possible.&nbsp;Now is the time for IT teams to test current cyber resilience strategies and discover if they are fit-for-purpose in this new digital age. Where are the potential blind spots and how would a change in a security approach help to not only close them, but also gain more competitive advantage?&nbsp;A misguided sense of confidenceIn December 2024, Zscaler conducted a cross-industry survey in 12 global markets called&nbsp;‘Unlock the Resilience Factor: Why Resilient by Design is the Next Cyber Security Imperative’, engaging 1,700 IT leaders to uncover the state of cyber resilience within today’s organizations. The report found that almost two-thirds (60%) of IT leaders expected a significant failure scenario within the next twelve months, and 45% had already experienced one in the past six months.While these statistics show a depressing reality, the survey data suggests IT leaders feel confident in their resilience strategy to respond to such incidents. Almost half (49%) of respondents believe their IT infrastructure to be highly resilient and this rises significantly to 94% who believe their current cyber resilience measures are at least somewhat effective. Well, there you have it – crises averted, and organizations can sleep soundly knowing they are prepared for any eventuality. Unfortunately, when you scratch the surface, you may find that this confidence is built on shaky foundations.The report findings actually uncovered worrying inconsistencies in these cyber resilience strategies, suggesting some of the IT leaders’ confidence in handling the new ‘when not if’ threat reality may be misplaced. Despite acknowledgement from the wider cyber community of the potential threat of AI-based cyber-attacks, for example, only 45% of IT leaders say that their cyber resilience strategy is up to date in response to the rise in this technology. Upon further scrutiny, two-fifths (40%) of respondents also admitted to not having reviewed their cyber resilience strategy in the last six months.Resilience not a high enough prioritization for leadershipExamining the disconnect, the report highlights a lack of investment from organizational leadership as one of the chief reasons resilience might be falling behind. While respondents noted that leaders understood the growing importance of a robust cyber resilience approach, only 39% felt it was a top priority for their leadership. This was reflected by almost half (49%) agreeing that the level of financial investment doesn’t meet the escalating need – as well as the fact that only 44% of IT leaders said their CISO actively participated in any resilience planning, and only 36% said their cyber resilience strategy is included within their organization’s overall resilience strategy.Without leadership understanding the potential impact of a weak cyber resilience strategy, IT teams are always going to be on the backfoot. Greater investment is needed to ensure that teams can threat hunt all the possible vulnerabilities within their organization and build a resilience strategy that aligns with the wider business strategy. Any cyber resilience strategy that operates in a silo isn’t going to be fit-for-purpose and may result in a failure scenario lasting for a longer period of time as business essential technology isn’t prioritized within the legacy resilience strategy.Build a ‘Resilient By Design’ approachTo mitigate cyber resilience risk, organizations should embed visibility and control into their security solutions’ very fabric. This is enabled through an approach we call ‘Resilient by Design’. By planning for failure, teams are better equipped to take immediate action; understanding exactly what the failure scenario is and where it is, with supportive tech solutions in place to stop it in its tracks before it becomes a full-scale incident. This is what Zscaler’s Zero Trust Exchange Platform enables – ‘Resilient by Design’ is part of the DNA of the cloud security platform and its services, which help businesses better anticipate and mitigate risks instead of simply experiencing and reacting to them. For the traditional security audience, this translates into availability, confidentiality and integrity no matter what.The following services support a ‘Resilient by Design’ approach to reduce risk, minimise the attack surface, prevent initial compromise, prevent lateral movement and stop data loss:Zscaler Internet Access™ (ZIA™) with user risk scoring allows organizations to set dynamic access control policies based on various risk factors, accounting for the latest threat intelligence to restrict access to sensitive applications for users with a high risk score.Zscaler Private Access™ (ZPA™) has been updated with Adaptive Access Policy to continuously assess a risky user's behavior or device posture changes and provide user-specific and device-specific enforcement based on these security events.&nbsp;Zscaler Data Protection provides consistent, unified security for data in motion and data at rest across SaaS and public cloud applications, reducing the likelihood of data exfiltration while mitigating the potential impact of ransomware attacks.Unified Vulnerability Management&nbsp;leverages unified security findings and business context to prioritize risk, automate remediation workflows, and provide dynamic reports and dashboards.Risk360™ supports insight into how Zscaler systems are configured and suggests changes to improve the risk posture of an organization. Telemetry data from the Zscaler security cloud and third-party sources help to quantify and visualize enterprise-wide risks, detect Active Directory misconfigurations, and identify security gaps in public-facing assets.Zscaler Deception deploys realistic decoys across an environment to lure, detect, and intercept active attackers.&nbsp;ConclusionToday’s business landscape demands that organizations put more of a focus on cyber resilience to ensure it is funded properly and encompasses all elements of the organization. But these actions cannot take place in a silo. Instead, they must become part of security strategies from the start, equal in priority to prevention.&nbsp;The ‘Resilient by Design’ architecture helps businesses move away from the traditional detect-and-respond approach to threats and empowers enterprises with the tools for swift containment, effective response, and minimal to no disruption when a failure scenario hits. This principle helps IT teams withstand adversity, adapt operations, and move forward with confidence, ready to thrive in the face of any challenge.]]></description>
            <dc:creator>Brian Marvin (SVP, Sales)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing the Zscaler Cyber Academy: Elevate Your Zero Trust Cybersecurity Journey]]></title>
            <link>https://www.zscaler.com/blogs/company-news/introducing-zscaler-cyber-academy-elevate-your-zero-trust-cybersecurity-journey</link>
            <guid>https://www.zscaler.com/blogs/company-news/introducing-zscaler-cyber-academy-elevate-your-zero-trust-cybersecurity-journey</guid>
            <pubDate>Wed, 05 Feb 2025 17:38:43 GMT</pubDate>
            <description><![CDATA[We are thrilled to unveil Zscaler Cyber Academy, a completely reimagined learning experience designed to empower you with the knowledge and skills to navigate the evolving threat landscape, with a core focus on zero trust principles.The cybersecurity landscape is constantly evolving, especially in the realm of zero trust, demanding a continuous learning approach. To best serve our community, we have significantly enhanced the Zscaler Cyber Academy, delivering a more comprehensive, engaging, and impactful learning experience, centered around building and maintaining robust zero trust architectures.Why the Change?Evolving Threat Landscape in Zero Trust:&nbsp;The sophistication of cyber threats targeting zero trust implementations is increasing rapidly. The Zscaler Cyber Academy is designed to equip you with the latest knowledge and skills to effectively combat these threats and protect your organization's zero trust framework.Enhanced Learner Experience:&nbsp;We understand the importance of a seamless and engaging learning experience. The reimagined Academy focuses on providing a more intuitive and user-friendly platform, making learning more accessible and enjoyable.Industry Alignment with Zero Trust Standards:&nbsp;The Zscaler Cyber Academy aligns with the latest industry best practices and certifications, ensuring your learning reflects the most current and in-demand skills.Key Changes to look out for:From Zscaler Academy to Zscaler Cyber Academy:&nbsp;The new name reflects the broader scope of cybersecurity expertise you'll gain. It emphasizes our commitment to providing comprehensive and in-depth cybersecurity knowledge.Revamped Learning Paths:Highly customizable learning paths tailored to your specific role, skill level, and career goals. Explore a wider range of specializations, including cloud security, threat detection and response, and more.Updated Certifications:Expanded range of certifications that validate your expertise in specific areas, such as Zscaler product specialties and industry-recognized certifications (e.g., CISSP, CISA). Certifications now emphasize hands-on skills and real-world application.Modernized Learning Experience:Sleek and modern Learning Management System (LMS) with improved navigation, enhanced search capabilities, interactive elements, and personalized dashboards.Redesigned Website:User-friendly interface with improved search functionality, clear calls to action, and easy access to all learning resources.The Zscaler Cyber Academy's alignment with the latest industry best practices and certifications related to zero trust ensures that your learning reflects the most current and in-demand skills. This includes knowledge of various zero trust frameworks, technologies, and compliance requirements, all of which are essential for working with the Zscaler Zero Trust Exchange.Who is this for?The updated learning journeys for roles like administrators, engineers and delivery consultants who configure or deploy the latest suite of Zscaler products like ZIdentity, Experience Center, Risk Management portfolio, or those who wish to&nbsp; learn more about these new features.&nbsp;We have launched a&nbsp;bridge course for each of the learning journeys so that you can move from the old learning journeys to the new learning journeys at each stage of your progress.&nbsp;If you have any questions, please don't hesitate to write to us at&nbsp;training@zscaler.com.&nbsp;We invite you to explore the new Zscaler Cyber Academy today, and embark on your journey to cybersecurity excellence.]]></description>
            <dc:creator>Prameet Chhabra (VP, Platform Enablement )</dc:creator>
        </item>
        <item>
            <title><![CDATA[London’s Calling: Zenith Live Encore Kicks Off Its EMEA Tour]]></title>
            <link>https://www.zscaler.com/blogs/company-news/londons-calling-zenith-live-encore-kicks-off-its-emea-tour</link>
            <guid>https://www.zscaler.com/blogs/company-news/londons-calling-zenith-live-encore-kicks-off-its-emea-tour</guid>
            <pubDate>Thu, 09 Jan 2025 10:33:50 GMT</pubDate>
            <description><![CDATA[It was an absolute honor to host the Zenith Live Encore event in London alongside our Software Engineering leader, Lee Langley. With over 200 guests joining us, the day was packed with inspiring discussions on how AI-enabled zero trust is shaping the future of secure and seamless digital transformation. The energy in the room was electrifying, as attendees, customers, and speakers shared real-world transformation stories, product innovations, and thought-provoking insights. The passion and collaboration on display reinforced how vital these conversations are as we all strive to drive meaningful change in the digital era. Below is a recap of the event highlights for those who couldn’t join us in person.&nbsp;The Platform Revolution in CybersecurityWe opened the event with a thoughtful discussion about the importance of a platform mentality for security. Platforms are foundational systems that enable organizations to operate efficiently and also to innovate effectively. An example of cloud-based platforms would include Amazon Web Services (AWS) and Microsoft Azure. Or alternatively you could also use work platforms such as Workday and Salesforce. Zscaler differentiates itself from the above by being a platform that spans both categories – providing a unified, cloud-native architecture that integrates seamlessly into existing platforms and enhances their capabilities while also securing operations.Unlike point solutions that address isolated problems, the Zscaler platform delivers a complete security ecosystem. It ensures secure access, data protection, and zero trust principles across an entire environment. Whether it’s providing secure connectivity to AWS, safeguarding workflows in Salesforce, or enabling protected operations in ServiceNow, Zscaler transforms how platforms interact with each other and with users. This integration is what makes Zscaler a true platform—not just a tool or add-on.&nbsp;Zscaler doesn’t just secure your business, it enables you to run your business, securely.&nbsp;AI-Driven Zero Trust: A Game-ChangerOur day continued with more detailed speaker sessions with product experts who discussed how AI is enhancing the way the Zscaler platform operates. Our first speaker, Yaroslav Rosomakho, CTO in residence at Zscaler, provided unparalleled insight into the real-world outcomes of implementing AI-enabled zero trust to transform business operations. Yaroslav argued that zero trust needs to be viewed less as a cost-saver for businesses and more as a business-enabler.&nbsp; It helps organizations to innovate while maintaining a strong level of security. This was followed by a session with Mark Ryan, VP of Product Management at Zscaler, who demonstrated Zscaler’s commitment to proactive threat management, whilst enabling the best user experience. By delivering groundbreaking tools to enable the user to work securely - using isolation, or notifications - users are informed of how security is empowering them to work.The final sessions focused on transformational Zscaler product innovations that have taken place since Zenith Live 2024. We touched upon how AI is being utilised to support risk management analysis in real-time. This improves efficiency by assigning AI to focus on the most critical tasks first. It provided a great showcase of how AI can transform security operations from a defensive posture to proactive risk management.We also highlighted Zscaler’s commitment to driving innovation in data protection. Many of the audience confirmed that some form of generative AI applications were permitted within their organization. Peter Szabo and Luke Miller took to the stage to outline how Zscaler’s transformational platform approach safeguarded against sensitive data leakage using cutting edge innovations. Using an AI-based unified policy engine, IT leaders can determine whether the data being fed to the GenAI application is private. If so, it will initiate browser isolation to avoid that data becoming accessible to the wider internet. It allows users to work with the application but have control of the endpoint to prevent certain data being stored by the application for public use.Here are the top three learnings from our product experts:Zero trust should be viewed as a business-enabler rather than just a cost-saver.If implemented correctly, zero trust security empowers employees to work, no matter where they are, using proactive threat management.AI-enabled zero trust can support real-time threat analysis and protect against data loss, using a policy engine that can isolate users while still allowing them to utilise applications such as generative AI.Advice from customers’ journeysWe closed out the day with a ‘fireside chat’ panel with three Zscaler customers who are all at varying points in their own zero trust journey. Each speaker shared his personal zero trust story and gave invaluable practical advice on how best to sell zero trust to their executive board. The key discussion point among the panellists was on cultural change. How do you convince an organization to take this leap?&nbsp;Sam Grossick, Enterprise Architect at Leonardo had recently presented his business case to the board, so was able to provide key insights into how security professionals can help guide their organization through to the point of purchase. Whereas BP and Unilever were multiple years along in their journey and could discuss how to keep convincing an organization to continue moving forward with the platform and innovating. There's&nbsp;sometimes&nbsp;a perception at board level&nbsp;in some organisations that once they buy a security platform they have completed their protection and will forever be in a state of safety. However, a platform approach is a journey that continuously evolves in order to reap the benefits. Our role at Zscaler is to ensure we are navigating the organizational change of customers and support overcoming any internal hurdles in order to align security with business goals.We are incredibly grateful to all the customers who joined us and spoke at Zenith Live Encore – thank you!&nbsp;Next stop, Zenith Live 2025With the combined power of zero trust and AI, Zscaler can enable businesses to transform securely without fear of opening the attack surface of their organization. Using AI to combat other AI attacks means that we can constantly evolve and keep pace with the evolving threat landscape.The Zenith Live Encore event helped to showcase these platform evolutions in the platform and provided attendees with actionable insights and a deeper understanding of how a zero trust platform can empower their digital transformation journeys.&nbsp;While 2024 may be coming rapidly to a close, Zscaler continues to innovate and push the envelope for our customers and partners. We look forward to sharing our latest evolutions at&nbsp;Zenith Live 2025 in Prague from 16th - 19th of June!&nbsp;Be part of the conversation and the innovation—register today to secure your spot!]]></description>
            <dc:creator>Justin Brooks (Area Vice President, Sales - UK&amp;I)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Zscaler’s Zenith Live Encore will showcase the power of AI & Zero Trust]]></title>
            <link>https://www.zscaler.com/blogs/company-news/zscalers-zenith-live-encore-will-showcase-the-power-of-ai-and-zero-trust</link>
            <guid>https://www.zscaler.com/blogs/company-news/zscalers-zenith-live-encore-will-showcase-the-power-of-ai-and-zero-trust</guid>
            <pubDate>Thu, 28 Nov 2024 12:58:07 GMT</pubDate>
            <description><![CDATA[The new customer roadshow kicks off in London on December 3rd, 2024At our annual Zenith Live event in June, Zscaler discussed the inflection point between zero trust and AI. The combination of both innovations promises to unlock vast protection potential for cybersecurity practitioners – enabling their organizations to continue to push technological boundaries in their pursuit of digitalization while carefully managing cybersecurity risks.To showcase Zscaler’s progress since June and facilitate even more face-to-face interaction with our customers and partners, we have launched the Zenith Live Encore roadshow. Taking the format of one-day events hosted in key cities across the globe, the roadshow will demonstrate how AI innovations can help security practitioners reduce risk, complexity, and cost. Our zero trust experts will be on hand to provide the latest insights into how security can minimise attack surfaces, eliminate lateral movement and stop data loss. We will also give attendees the chance to learn from industry leaders and network with their peers.Keeping up with the pace of innovationAt Zenith Live, our CEO Jay Chaudhry laid out his vision for how AI and zero trust were set to intersect and evolve the solutions that Zscaler offers. Picking up from Jay, at Zenith Live Encore we will give a keynote exploring how these innovations have progressed over the past five months and what that means for customers on their zero trust journeys. In particular, we will explain how Zscaler is introducing additional depth to its zero trust offering by enhancing adaptive risk capabilities and increasing AI-driven automation to support customers’ deployment from historic flat networks into a segmented architecture.The keynote will be followed by deep-dive sessions into these innovations with our Zscaler experts to provide practical examples of how each solution is evolving and the different business cases it solves. During the&nbsp;Data Platforms Innovations&nbsp;session, for example, we will consider the topic of&nbsp;accelerating businesses with Generative AI while managing associated data risks. Here our experts will highlight how businesses can secure the usage of GenAI across their organizations to enable employees to unlock the benefits of the technology without fear of data loss or breach. Each session is designed to inspire discussion and outline clear business cases for IT teams to present back&nbsp;to wider teams in their organisations.Learn from Zero Trust adoptersAs part of the agenda, we will also be speaking to Zscaler customers at varying stages of their zero trust transformation. Panellists from Unilever, BP, and Leonardo, will take part in a ‘fireside chat’ aimed at sharing their learnings and inspiring others who wish to take that first step towards a zero trust architecture. Having already overcome the hurdles of implementing such an architecture on their current technology stacks, each panellist will provide practical guidance and insights that will help truly bring zero trust to life. It promises to be a lively and informative discussion!A cybersecurity evolutionAI innovations combined with a zero trust architecture represent a truly game-changing evolution for the cyber security industry. Working together, these two technologies can not only protect businesses against the evolving threat from bad actors, but also enable them to thrive and innovate without fear of widening their attack surface.If you are interested in learning more about this evolution and hearing directly from those who are already experiencing it, register for the&nbsp;Zenith Live Encore event in London today!]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Understanding the CyberRatings SSE Report and Why Zscaler is Named A Top Provider]]></title>
            <link>https://www.zscaler.com/blogs/company-news/understanding-cyberratings-sse-report-zscaler-named-top-provider</link>
            <guid>https://www.zscaler.com/blogs/company-news/understanding-cyberratings-sse-report-zscaler-named-top-provider</guid>
            <pubDate>Wed, 23 Oct 2024 21:15:58 GMT</pubDate>
            <description><![CDATA[CyberRatings, the leading non-profit security testing organization, recently tested several vendors’ security service edge (SSE) offerings with the goal of deriving empirical data that would answer the question, “Are SSE products secure by default?”&nbsp;&nbsp;The emphasis is aligned to a shift in the industry towards “secure by default” approaches to develop and deploy software products. The trend is an outcome of a&nbsp;2023 report authored by CISA and its international partners that emphasizes that the burden of security should be shifted away from the end-user and back towards software vendors.In CISA’s words:Scope of the test: a “quick look” at default security postureCyberRating labeled this as a “mini-test” because their analysts did not intentionally run through a comprehensive evaluation of the full capabilities of the vendors’ SSE platforms. Instead, with the mini-test, CyberRating’s analysts sought to provide a data-driven “quick look” at the default security posture vendors can deliver with minimal to no additional security configuration of their SSE.In short, CyberRatings wanted to test the initial functional working state of these SSE offerings. For a more complete evaluation of Zscaler SSE, see the&nbsp;June 2024 CyberRatings SSE Report in which Zscaler achieved an “AAA” rating.&nbsp;SSE security posture test methodologyThe SSE mini-test was designed to provide insight into the default security posture across these platforms using a small subset of malware samples (using ~3,000 samples vs. the 100,000+ samples in CyberRating’s more all-inclusive tests). CyberRatings ran the following tests using Windows 11 clients configured with each vendor’s SSE client software:Test 1: Download ~1,000 benign samples over HTTP&nbsp;designed to be susceptible to being classified as malware despite being innocuous (e.g., the solution’s propensity for triggering false positives).&nbsp;Test 2: Download ~3,000 active malware samples over HTTP, current to within 30 days of the test (e.g., the SSE’s ability to detect and block basic malware downloads). No evasions were applied.Zscaler SSE found “secure-by-default” with zero false positivesIn its default configuration, Zscaler stands above our competitors in the mini-test of SSE platforms: Zscaler blocked about 97% of the malware test samples with no false positives. Zscaler also includes Cloud Sandbox capability out of the gate, unlike several of our competitors.&nbsp;Here’s what's notable in the evaluation results in relation to our competitors:&nbsp;Zscaler blocked the most malware samples when compared to other vendors’ SSE platforms running in their default configurations. Zscaler also did not produce any false positives. With our SSE, the most important security controls needed are automatically enabled to protect enterprises from malicious cyber actors.&nbsp;Cisco’s, Checkpoint’s, and Versa Networks’ SSE platforms did not detect any malware samples when their default configuration remained unchanged. In other words, they do not provide security by default. Their ability to inspect traffic for malware is dependent on making configuration changes. Yet, security teams are frequently overloaded with security and operational responsibilities, resulting in limited time to dig through documentation to understand and implement robust cybersecurity posture.&nbsp;Cisco still drew false-positives, even when the CyberRatings evaluators made changes to their default configuration.The keys to effective AI-driven threat detection are a quality dataset and Zscaler’s AI models training on the telemetry collected by operating the world’s largest security cloud. This cloud continuously collects and analyzes over 500 trillion daily signals and 500 billion daily transactions.&nbsp;&nbsp;An effective SSE offering also reduces complexityThe results of this mini-test are clear: customers need ease-of-use combined with high efficacy to defeat today’s advanced cyberthreats—and Zscaler was found to deliver:&nbsp;&nbsp;Security by default—there is no configuration option hidden somewhere in the administrative console that must be enabled.&nbsp;&nbsp;Zscaler automatically enables the most important security controls needed to protect enterprises from malicious threat actors. In short: we deliver security value upon deployment and thus deliver fast time to value.&nbsp;&nbsp;Effective blocking of malware without introducing false positives. False positives can consume a security team’s valuable time that could have been spent on higher-value work.&nbsp;&nbsp;Frictionless configuration that eliminates complexity.&nbsp;Security teams are frequently overloaded with security and operational responsibilities, resulting in limited time to understand and implement robust cybersecurity posture.&nbsp;Find out more about the CyberRating’s SSE mini-test:&nbsp;Get your copy now]]></description>
            <dc:creator>Brendon Macaraeg (Sr. Product Marketing Manager)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing New Business Continuity Solutions]]></title>
            <link>https://www.zscaler.com/blogs/company-news/introducing-new-business-continuity-solutions</link>
            <guid>https://www.zscaler.com/blogs/company-news/introducing-new-business-continuity-solutions</guid>
            <pubDate>Wed, 16 Oct 2024 23:34:35 GMT</pubDate>
            <description><![CDATA[Zscaler, trusted for resilienceAs we recently announced, Zscaler continues to grow, adding more and more customers seeking a trusted security cloud that provides protection and a great user experience. Passing&nbsp;500 billion daily transactions was a major milestone that we could not have reached without the trust put in us by our customer base.That trust has been hard won, and rightly so, given the fact that Zscaler is a security cloud that sits inline between users, devices and applications, making us mission critical for our customers. The reliability and performance of our service is paramount, which is why we go to such lengths to stay on top of demand, both in terms of service availability and capacity.And it’s working! As the number of daily transactions has risen over recent years, we have seen an inverse drop in the number of support tickets handled by our customer success team.&nbsp;Business Continuity in FocusBusiness continuity planning (BCP) has been receiving heightened attention in 2024, driven by the growing number of governmental and industry regulations compelling it, such as&nbsp;DORA, but also by some&nbsp;high profile IT outages that had widespread impact around the world. The reliance on being secure and online means vendors must do all they can to provide reliable services that also maintain compliance to regulatory mandates.Customers, especially from regulated industries, often ask us, ”We trust Zscaler and your investments in building the most trusted security cloud, but how should we plan for a force majeure event, as unlikely as it may be?”In early 2023, we&nbsp;introduced resilience capabilities for our security cloud, providing organizations with a way to stay connected, even in the event of a widespread internet outage, or a nation-state level attack on the infrastructure underpinning Zscaler services.These widely adopted customer-controlled resilience solutions serve the basic need to keep the lights on. Now it’s time to go to the next level, and so we’re delighted to be announcing significant enhancements to our resilience solutions that minimize disruption to normal activity, even during a catastrophic, so-called "black swan" event.We laid out three goals when thinking about how to build on our initial resilience capabilities:Provide business continuity with full security posture, even during a catastrophic eventMake it even easier to configure and deployMake it simple, or even automated, to triggerIntroducing Business Continuity Private CloudsFor the next evolution in our resilience solution, we are introducing Private Business Continuity Clouds that add a private control plane to the existing private data plane to facilitate access to applications with a full security posture in the event the public cloud is unavailable or unreachable. Customers will be able to deploy local services in their own data center, or even opt for an upcoming fully Zscaler-managed solution. The components to make this work vary for internet/SaaS and private application, so let’s unpack this in more detail.Internet and SaaS Applications (ZIA)When it comes to access to the web, and web-hosted (SaaS) applications, if the customer wishes to retain granular controls during a catastrophic failure they would deploy one or more Private Service Edges. Managed by Zscaler Cloud Operations, these physical or virtual appliances provide the same functionality available under normal operations through Zscaler’s Public Service Edges, the internet gateways to the Zero Trust Exchange (of which there are more than 160 around the world). Primary functions of a Service Edge include bidirectional web traffic inspection for malware, and the enforcement of malware, security, compliance, data loss prevention, and firewall policies.To the Private Service Edge we are adding the ability for Client Connector to failover to the Private Service Edge, and establish a Z-Tunnel 1.0, leveraging the Business Continuity PAC file. A new Private Policy Caching capability is added, which facilitates seamless failover between itself and Public Service Edges, specifically by providing a backup for the public Central Authority servers. These are the servers that host all customer policy and configuration settings. They also monitor the cloud and provide a central location for software and database updates, plus threat intelligence.With the addition of the Private Policy Cache, customers retain full security posture during a catastrophic failure, including for unauthenticated users who require access during that time.Private Applications (ZPA)Private applications are accessed differently, whereby they are rendered effectively invisible to all but those with permissions to access them. This is distinct from a publicly available SaaS application, which must be visible to the internet to be discovered and accessed. This difference presents a unique set of challenges when it comes to handling catastrophic failures.Zscaler addresses this with a new Private Cloud Controller, a virtual appliance that stays in sync with the public Zero Trust Exchange until a failover event occurs, or the ZTE is unreachable, for whatever reason. This solution was originally developed to address the stringent requirements of the military DDIL (Denied, Disrupted, Intermittent, and Limited) use case where federal agencies need to ensure zero trust access to critical applications, even in the event of loss of connectivity to the public cloud. In this instance the Private Cloud Controller takes on responsibility for a wide range of functions, over and above what was previously available:Business Continuity for EndpointsThere’s another important use case to cater for. Imagine an organization’s endpoints (laptops, mobile devices) had been compromised, as famously&nbsp;happened to Maersk back in 2017. Even if the Zscaler public cloud was operational and reachable, such an organization could be dead in the water without a way to securely connect productivity devices to applications.Enter Cloud Browser Isolation for secure, agentless BYOD access to web applications. This functionality already has a place in the Zscaler portfolio as an alternative to VDI, or to secure the use of BYOD devices. These make the feature a perfect fit for a catastrophic event by enabling an impacted organization to utilize any unmanaged or BYOD device for application access via its browser. Employees simply switch over from their non-functioning corporate device to continue their work. Zscaler is able to stream applications as pixels to the ‘guest’ device, meaning full security and policy controls can be maintained, and data loss prevented.ConclusionWhen it comes to technology, eventually something is going to go wrong. IT professionals the world over spend a good chunk of their time seeking to mitigate potential impact to productivity by building resilience, in all its forms. It’s like an insurance policy, except that when it comes to business continuity planning for cybersecurity it’s more: regulatory and compliance requirements in many industries demand adherence.These imperatives have driven customers to demand more capabilities during even the most catastrophic events. With these new industry-first offerings from Zscaler, organizations can feel confident that they will experience little to no impact to their operations. To learn more, read our&nbsp;solution brief, or watch our&nbsp;on-demand webinar.&nbsp;&nbsp;&nbsp;&nbsp;]]></description>
            <dc:creator>Lidor Pergament (Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Another Milestone: Zscaler’s Daily Transactions Pass Half a Trillion!]]></title>
            <link>https://www.zscaler.com/blogs/company-news/another-milestone-zscaler-s-daily-transactions-pass-half-trillion</link>
            <guid>https://www.zscaler.com/blogs/company-news/another-milestone-zscaler-s-daily-transactions-pass-half-trillion</guid>
            <pubDate>Wed, 09 Oct 2024 11:58:01 GMT</pubDate>
            <description><![CDATA[The Largest and Most Trusted Security CloudIn support of our vision for a future built around zero trust, Zscaler’s security technology is served through the world’s largest inline security cloud. What does this mean in practice? Simply, every customer sends traffic destined for the internet or their private applications through an infrastructure cloud operated by Zscaler. The Zero Trust Exchange serves to identify, assess, police, and route that traffic on a session-by-session basis, at considerable scale.Our customers put their faith in our ability to operate a dependable security cloud that is always available and able to scale to meet growing demand. Zscaler provides a mission-critical service for every one of them. So it is with great pride that we announce the number of daily transactions through our cloud has, for the first time, surpassed 500 billion!We would never have reached this staggering scale without the vote of confidence each and every one of our customers consistently places in Zscaler.Exponential GrowthZscaler was conceived as a service that would offer the “zenith of scalability”, from which the company name was derived. The early Zscaler team knew that a scalable architecture would be fundamental for the company’s growth, so we have always invested to stay one step ahead, maintaining capacity to spare, and a performant experience. Today, more than 160 Zscaler hosted Zero Trust Exchange cloud edges around the world work together to process this incredible volume of daily transactions.What Is a Transaction?Every time you interact with an application or service you’re creating a transaction. One simple example would be when you want to visit a web page. A query is made to a DNS server to identify the IP address of the web server, and this is returned to you so that an IP connection can be built. That’s one transaction. An HTTP request is then made to the web server which comes back with an HTTP response. That’s another transaction. With Zscaler’s proxy security model every one of these transactions passes through the Zero Trust Exchange. Needless to say that across Zscaler’s many thousands of customers these add up quickly!&nbsp;Understanding 500 Billion Daily TransactionsHow can we visualize a number this big? Here are a few fun facts about 500 billion:That’s almost 60x the number of Google searches per day500 billion gallons of water is enough to fill over 750,000 Olympic-sized swimming pools500 billion trees could cover an area the size of the United States500 billion dollar bills laid on their side would reach 1.3 times around the EarthCounting from 1 to 500 billion at a rate of one number per second would take more than 15,700 years……fortunately Zscaler can handle 500 billion a little faster than that!&nbsp;Threats and OpportunitiesSo how does having such a high transaction count help Zscaler and its customers? First and foremost, traffic inspection at this scale helps identify threats, established and zero day, that have the potential to do real damage.Zscaler blocks over 150M threats every day, amounting to approximately 57 billion threats over a recent one-year period. That’s perhaps an even more important number than the transaction count, demonstrating real-world threat avoidance that could have impacted organizations around the world. As our recent&nbsp;ThreatLabz report showed, threats continue to escalate, leading to a 17.8% increase in ransomware attacks over the past year. What we learn as we discover threats we are able to pass on for the benefit of all.On the flip side, the metadata created as a result of the relentless increase in transactions through the Zero Trust Exchange helps inform Zscaler’s Digital Experience Monitoring tool (ZDX) and strengthen defenses through better risk management. In 2024, operating the world’s largest security cloud means having the broadest data set with which to take the fight back to the criminals exploiting AI for nefarious purposes.Relentless Focus on Performance and AvailabilityStaying on top of cloud service demand is a top priority for Zscaler, so we continue to invest in new data centers around the world to ensure ample capacity is available where it’s most needed. The global distribution of these data centers, aligned with population centers, leads to shorter round-trip delays and better performance for our customers, who can use the Zscaler Digital Experience (ZDX) toolset to troubleshoot any issues that arise.The bold claims we make for our cloud are backed by rigorous&nbsp;service level agreements (SLAs) that are based on percentage of lost transactions as a result of downtime or slowness, rather than time the service is unavailable, as is typical with other vendors. In other words, Zscaler focuses on actual business impact, because we know that’s what our customers ultimately care about.SummaryAt Zscaler, it is our passion to provide a dependable, secure SaaS cloud service that eliminates cyberthreats around the clock and helps our customers stay confidently focused on what they do best. We wouldn’t have reached this incredible milestone without the faith that more than 8,500 organizations around the world put in us every day.Get in touch or or reach out to your account team to learn more about how our security cloud reliably protects your most valuable data, wherever your employees are located. And if Business Continuity is on your radar, be sure to sign-up for this webinar where we'll be covering enhancements to our already industry-leading resilience solutions.]]></description>
            <dc:creator>Lidor Pergament (Director, Product Management)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The public sector needs more disruptors]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-public-sector-needs-more-disruptors</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-public-sector-needs-more-disruptors</guid>
            <pubDate>Wed, 18 Sep 2024 12:44:10 GMT</pubDate>
            <description><![CDATA[According to Zscaler’s most recent ‘State of Encrypted Attacks Report’, the public sector experienced a sharp rise in encrypted attacks, with a 185% year-over-year increase globally. Government entities are an attractive target for cybercriminals due to their pivotal role in shaping and safeguarding national interests and personal data of inhabitants. Only the&nbsp;education sector topped government entities with a surge of 276% year-over-year in encrypted attacks. As this sector continues to embrace digital transformation, adopting innovative systems and tools to handle vast amounts of sensitive student data, it faces the prospect of becoming a key target for attackers due to its expanded attack surface.In order to prevent public sector organizations from becoming easy prey for attackers who are using modern AI technology to drive their malware campaigns,&nbsp; IT security decision makers are well advised to take action and modernize their security infrastructure to better combat these new tactics. However, government bodies, municipalities, educational or healthcare institutions are not known to be among early adopters of new technologies in general. They stick to&nbsp; legacy technology and keep investing into security hardware, as this is&nbsp; their comfort zone. Inertia is unfortunately the enemy of security, as malware actors keep innovating their tools and tactics continuously. In order to break that vicious cycle and shift away from traditional methods and towards new innovative approaches, the public sector needs more disruptors among their IT security decision makers.Disruptors pave the way to transformationDisruptors have the innate understanding that in order for things to change or transform they require a different approach. They are willing to change their mindset and look for new ways of working, even against the resistance of the broader team. Starting a transformative process is not an easy task as the disruptor has to be prepared to force their organization to accept this journey of change at the beginning.&nbsp;First of all, it takes a certain curiosity to explore the benefits of a new technology approach like zero trust. A certain tech nerdiness helps to translate the benefits of a new solution into something that other people are willing to get involved with. When it comes to making a move to the cloud, one of the biggest concerns has always been security. These concerns tend to be even greater among public sector organizations, given the value and nature of the data residing within their systems. Hence a change to a cloud-based security platform is a hard sell internally, even if a zero trust approach - based on the principles of the least privileged access permission - proves to be able to become a game changer.End users want simplificationThe biggest hurdle in any technology transformation is to fight against the human habit of sticking to known processes. Moving away from everything an administrator has ever known makes them feel uncomfortable in the first place. A disruptor has to be able to inspire a vision for the internal tech community in order to support the change. And one important driver for transformation that should not be underestimated in the decision process is the end user itself.&nbsp;If IT is made simple for the end user and allows them to be more productive and more effective at the same time then they can become an internal advocate for a technology change. Nothing is more helpful than the end user community who stands up and speaks for a technology. They are the greatest case study for innovation and simplification to those involved in either the buying process or the rollout. At the beginning it might feel like having to fight and force the transformational process through the IT teams and business units, until the technology can advocate for itself by demonstrating its value.&nbsp;Disruptors at the GovTech SummitAt the upcoming GovTech Summit the topic of encouraging a culture of change to combat the ever increasing cyberthreat landscape is only one of the topics at a panel discussion I will attend. We will also be taking a look at the current cyber threats and the attack vectors that are going to increase their impact on public sector organizations and discuss defense strategies. Zscaler enables the public sector to fully embrace the cloud and modernize IT by leveraging zero trust—securely connecting users to applications regardless of device, location, or network.Being a disruptor might feel like a lonely role, but it is one of the most important jobs that an IT decision maker will take on. In the long run, a cloud-based zero trust approach will make a difference. Our&nbsp;Zero Trust Exchange™ enables the seamless, secure exchange of information, transforming the way the public sector work today and tomorrow. As a former public sector CISO I can only encourage the IT function to stop doing what they have always done and approach security differently. Not only will the end user appreciate the simplification but the security posture will as well.Join me for the panel discussion at GovTech on Tuesday 24th of September 11:30.am.]]></description>
            <dc:creator>Mike Culshaw (Sales Engineer)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The NIS2 directive as an opportunity to overcome legacy infrastructure: A business perspective ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-nis-2-directive-as-an-opportunity-to-overcome-legacy-infrastructure-a-business-perspective</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-nis-2-directive-as-an-opportunity-to-overcome-legacy-infrastructure-a-business-perspective</guid>
            <pubDate>Fri, 06 Sep 2024 10:23:04 GMT</pubDate>
            <description><![CDATA[In our hyperconnected, dynamic, and distributed world, the traditional security perimeter is vanishing. Applications are moving into the cloud, and users are connecting from everywhere, on all kinds of devices. IoT and OT traffic are exploding, and apps are communicating with each other across clouds. In effect, the network connecting employees, apps, workloads, and devices today is the internet itself. The cloud and data centers have become destinations, with the internet as the transport layer for traffic.The Zero Trust Exchange provides a platform of services for securing all enterprise traffic and routing it intelligently through the fastest channels. It's the foundation for secure digital transformation, delivering the agility, security, automation, and experiences your organization needs to move ahead.The architectural principles underpinning a cloud platform allows to improve negative impacts on the business as well:Connect users to resources (not to the network!)Dynamic, shortest, secure path to resourcesCloud native&nbsp;Full proxy architectureOutbound tunnelsThe Zero Trust Exchange is the only solution able to address all the business outcomes showed in the diagram above. It can mitigate risk and cost, speed up the time to market of new services, improve both the customer and employee satisfaction and, last, but not least, optimize Environmental, Social and Governance requirements.The comprehensive ZTE platform is instrumental to achieve a secure digital transformation. However, organizations should bear in mind that the road to unlocking the full potential of zero trust is not a straightforward one and requires a level of engagement from the senior leadership to promote and nurture it. Eventually, it will be very rewarding.Reduction of complexityWith its increased level of visibility and control, a zero trust based architecture removes the complexity of modern IT and allows organizations to focus on getting the outcomes they need from their technology, from higher performance and an enhanced user experience to reduced costs.Here are some practical examples to demonstrate how business outcomes can be achieved with saving a massive amount of time. Imagine that you want to test the launch of a new service in a specific geography, either an existing location of your organization or a single country. The reasons could be manifold: a new emerging market or a new application that you want to test in a controlled environment.&nbsp;Whatever the motivation would be, in a few moments an organization can customize a policy that matches their&nbsp; requirements for the geography of their interest; if then everything works as expected maybe the service can be extended elsewhere, or withdrawn in minutes. The huge availability of Public Service Edges across the world of the ZTE and the fact that the policies are downloaded only on the nodes of interest for an individual organization makes the above test easy and hasno impact on the overall performance of the IT infrastructure.The M&A scenarioAnother scenario that is often the cause of headaches for IT teams: a merge and acquisition activity (M&A). Weaving together workforces and working models, application hosting environments, and shared access to resources across a new ecosystem - and doing so securely - is an incredible architectural and engineering effort, and every delay can set you farther back from your targets deadlines. Often such activities last between 12 and 18 months and consumes a huge amount of internal resources. The ZTE platform would simplify such operations by connecting the resources across your organization with no need to address underlying network complexity. Moreover, it protects the company by containing any acquired vulnerabilities or potential compromises instantly when you overlay your risk posture on the acquired network. The bottom line is to be able to deliver seamless access to any cross-organization apps and resources in a secure and timely fashion.The CIO and CISO have a vital role to play to bring the expanded message of the zero trust boardroom, focusing on how it aligns with business strategy. The decision for what emerging technologies to pursue should be driven by the overall business vision and the organization’s current and future needs, not trends or “cool” factors. Zero trust is here to secure and perform connectivity requirements of emerging trends. So, once the mindset has acknowledged that zero trust is a true business enabler how should organizations go about ensuring a zero trust architecture that successfully achieves these business outcomes?&nbsp;A zero-trust architecture (ZTA) to enable a secure digital transformation is the answer: a cloud native service that provides employees, partners, and customers with fast, direct, and secure access to external and internal applications, regardless of location, device, or network.To learn more how Zscaler can support the transformation with the Zero Trust Exchange, read the whitepaper:&nbsp;Working towards NIS2 compliance.]]></description>
            <dc:creator>Stefano Alei (Transformation Architect)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Secure and leverage your data with Zscaler at the Gartner Security & Risk Management Summit 2024]]></title>
            <link>https://www.zscaler.com/blogs/company-news/secure-and-leverage-your-data-with-zscaler-at-the-gartner-security-and-risk-management-summit-2024</link>
            <guid>https://www.zscaler.com/blogs/company-news/secure-and-leverage-your-data-with-zscaler-at-the-gartner-security-and-risk-management-summit-2024</guid>
            <pubDate>Wed, 04 Sep 2024 09:58:35 GMT</pubDate>
            <description><![CDATA[Data is very much the competitive advantage of every commercial organisation. It's not just an asset; it's arguably the only truly strategic, irreplaceable asset you have. Everything else? Tactical at best. The data you process about your customers, your know-how – that's the strategic gold mine we need to protect.But here's the challenge: as data becomes more valuable, it also becomes more vulnerable. Bad actors, once content with disrupting operations or encrypting data for ransom, are now setting their sights on outright data theft. Why? Because they've realised that threatening to disclose confidential data can be far more damaging to an organisation's reputation and competitive position – and therefore also far more motivating in terms of an organisation’s response. On top of this, rogue data transfer has never been easier. Modern high bandwidth networks connecting clouds and data centres present convenient highways for bad actors to swiftly download vast volumes of sensitive information.The AI factor: a new dimension of risk and opportunityIn recent years AI has been thrown into this already complex mix. It's easy to lose sensitive data in AI models, in many cases through something as trivial as an unfiltered prompt. The challenge? Unlike traditional databases where you can search and remove problematic data, deep learning models essentially dissolve data into billions of floating-point numbers. You can't just tell a neural network to "forget" something – you'd have to wipe it and start its training from scratch. Then, what happens if a bad actor obtains this data? Believe me, they are trying.But it's not all doom and gloom. AI is also revolutionising how we approach data security. At Zscaler, we're leveraging AI to provide unprecedented insights and protection. With our&nbsp;Zero Trust Exchange™ processing over 500 billion transactions daily, we have access to a vast pool of high-quality data to train our AI models. This allows us to stay ahead of emerging threats and provide more robust protection for our customers.Come find us at the Gartner Security & Risk Management Summit 2024On September 24, at the&nbsp;Gartner Security & Risk Management Summit&nbsp;in London (Theatre 1, 1pm), we’ll be hosting a presentation that explores exactly why data security has become such a critical strategic concern and how AI is reshaping both the challenges and solutions in this space.&nbsp;Using findings from Zscaler’s unique threat research, we will provide you with valuable perspective into the new realities of data security in an AI-powered world, such as:The data classification conundrum: How to classify data faster than it's created.The multiplying channels of data loss: From USB ports to cloud storage and encrypted messaging apps.AI-powered threats and defences: Understanding how bad actors use AI and how we can leverage it for protection.Legal and ethical implications: What happens when AI outputs potentially infringe on intellectual property rights?Additionally, Zscaler CEO and Founder Jay Chaudhry will be taking to the stage on September 23 (Capital Suite 9, 12pm) to talk with a customer about their secure transformation journey.Don't miss this opportunity to gain actionable insights from both sessions that can shape your organisation's data security strategy.&nbsp;To learn more about the Summit and register to attend, click&nbsp;here.&nbsp;We look forward to seeing you there!]]></description>
            <dc:creator>Yaroslav Rosomakho (Chief Scientist)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Introducing Zscaler’s Experience Center ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/introducing-zscaler-s-experience-center</link>
            <guid>https://www.zscaler.com/blogs/company-news/introducing-zscaler-s-experience-center</guid>
            <pubDate>Thu, 29 Aug 2024 14:00:01 GMT</pubDate>
            <description><![CDATA[We live in an era marked by a proliferation of cybersecurity point products. Just one lap around the event hall of the annual RSA Conference will leave your head spinning with options for products, services, and vendors. While the explosion of point products offers many potential tools to aid defenders in theory, it brings with it the risk of security gaps, inefficiency, and management complexity.&nbsp;Recently, the cybersecurity market has seen a growing trend away from point products toward consolidated platforms. However, platforms cannot be built by simply bolting on acquired capabilities, but are instead built on a foundation that allows integration and extensibility. Zscaler has not only embraced this platform approach with its APIs, but has been at the forefront of innovation in zero trust with the industry’s first cloud-native security platform.&nbsp;Zscaler has been rapidly evolving its industry leading zero trust platform over the past 14 years, pioneering new capabilities and setting the standard for others to follow. Today, the cloud native Zero Trust Exchange protects workforces, workloads, devices, and third parties without relying on vulnerable, redundant security point products like firewalls and VPNs.One Platform: Driving Towards Simplicity, Control, and EfficiencyNo great security platform is complete without a consolidated, intuitive, and outcome-driven user interface, so we’re thrilled to announce the new Experience Center. This user-friendly unified console enables administrators to deliver comprehensive cyberthreat and data protection outcomes, providing system-wide analytics and GenAI-driven interactive experiences to streamline day-to-day administration.Let’s look at the three key benefits of the new experience:&nbsp;1) Radical simplicity to start your zero trust journeyMany organizations are embracing zero trust as the best way to improve their security in an increasingly hostile online environment. Others are beginning to see mandates driving adoption of a zero trust framework. The challenge is always the same: getting started. Whatever the spark for security transformation, the Experience Center provides an intuitive window into the tools that make it a reality.&nbsp;IT teams can now onboard users, set up traffic forwarding, and configure Zscaler security policies using an easy point-and-click workflow. A guided walkthrough integrates identity, automates distribution of endpoint agents, and configures zero trust security policies, including advanced threat and data protection, following industry best practices.With this, organizations can enable their zero trust journeys without the complexity of juggling multiple tools, configuration techniques, and onboarding processes.&nbsp;2) Boost user experience and cybersecurity efficiency with advanced managementUnified management of a comprehensive security platform&nbsp;An integrated platform has always been the guiding star at Zscaler, and with this first release of the Experience Center, we are bringing together management for internet and SaaS applications, private applications, digital experience monitoring (DEM), and endpoint agents. The Experience Center leverages a unified identity layer with granular role-based access control (RBAC) for admin users, featuring persona-driven workflows to cater to a wider range of user types and organizations. It provides one place to define comprehensive security policies across endpoints, cloud, locations, and workloads.&nbsp;A common policy framework for access controls, cybersecurity, data protection, and digital experience managementSeamless management of cybersecurity policies for internet, SaaS, and private applications&nbsp;Simplified workflows for IT and security personasBy simplifying workflows around a common policy framework across internet security, SaaS applications, and private applications, the Zscaler Experience Center improves productivity for IT personas as they go about their work, and drives real-world outcomes. Anyone from CISOs/CIOs to networking and cybersecurity practitioners can leverage the console to manage their day-to-day operations efficiently.&nbsp;3) Analytics and AI to drive efficiency in cybersecurity&nbsp;The new interface delivers a cohesive and dynamic experience, featuring an intuitive layout that facilitates persona focused analytics views, as well as interactive experiences powered by a generative AI copilot.Unified analytics&nbsp;Unified analytics make it a breeze to navigate across consolidated views, from users to cyber and data protection, ensuring administrators and IT leaders can quickly snapshot events across their organization.Gain deep insights into the performance and health of the zero trust infrastructure. Analyze traffic pattern trends across users, geographic locations, and application connectors. Understand sources of traffic origination and optimize your zero trust infrastructure with a unified view serving both internet/SaaS and private traffic.&nbsp;Stay ahead of cyber threats.&nbsp;Actively monitor cyber threat trends, including blocked malicious transactions, your organization’s ability to handle zero day threats, gaps in encrypted traffic inspection, and blocked exploits.Unify silos with digital experience monitoring. Get a complete view of your organizations’ overall digital experience from users to applications and network. Enhance your understanding of end user experiences by examining data from diverse sources such as ISP outages, Wi-Fi hotspots, and latency summaries.&nbsp;Generative AI-powered copilot reduces IT burden&nbsp;The Experience Center incorporates an AI-driven virtual assistant designed to simplify and enhance IT operations through an advanced conversational interface. By integrating AI into the core of our network and security operations tools, the copilot allows users to interact with their systems using natural language. For example, It’s a great superpower for a service desk team to simply be able to ask for the cause of a network slowdown, and get an answer quickly, based on the parsing of multiple data sources (e.g. Wi-Fi, LAN, ISP, cloud).ConclusionIn today's challenging threat landscape, cybersecurity leaders and practitioners need to move fast, as well as find ways to increase efficiency and consolidate to drive cost savings. These common issues are driving greater focus on multifaceted platforms that reduce risk and streamline workflows. Zscaler is a leader in helping customers securely transform, and the Experience Center enables us to deliver even greater improvements to security and IT teams’ day-to-day operations.The Experience Center begins rolling out to Zscaler customers now, and will continue to evolve. To see a demo and discuss your migration to the new console, reach out to your account team today, or if you’re just getting started use our&nbsp;contact form to get in touch.&nbsp;]]></description>
            <dc:creator>Sree Koratala (VP, Product Management - Platform)</dc:creator>
        </item>
        <item>
            <title><![CDATA[Understanding the Digital Operational Resilience Act (DORA)	]]></title>
            <link>https://www.zscaler.com/blogs/company-news/understanding-the-digital-operational-resilience-act-dora</link>
            <guid>https://www.zscaler.com/blogs/company-news/understanding-the-digital-operational-resilience-act-dora</guid>
            <pubDate>Thu, 29 Aug 2024 09:27:51 GMT</pubDate>
            <description><![CDATA[I live in Sweden, where&nbsp;10% or fewer of purchases&nbsp;are made with cash. Few carry cash regularly, and it can often be difficult to find places that accept it. This means that if I lose my phone or internet connection, simple tasks like paying for my coffee are exceedingly difficult.&nbsp; And I am in no way unique in this aspect; at least half of Europeans prefer this type of transaction. Here, we even have our passports on our mobile phones! Our collective reliance on digital infrastructure in day-to-day life cannot be understated, and is only going to expand further.&nbsp;With our growing digital footprint, the financial sector faces unprecedented challenges and opportunities. The increased reliance on digital technologies has brought about great advancements in financial services, but it has also exposed institutions to an ever growing number of cyber threats and operational risks. Recognizing the critical role digital infrastructure has on the everyday lives of EU Citizens, the European Union has introduced the Digital Operational Resilience Act (DORA). This regulatory initiative aims to ensure that financial entities can withstand, respond to, and recover from a wide array of operational disruptions, thereby safeguarding the stability and integrity of the financial system. In this blog post, we will examine the key aspects of DORA, including who is affected, the core requirements for organizations, and practical steps for achieving compliance by the&nbsp;deadline of 17 January 2025.&nbsp;Who is Affected by DORA?DORA applies to all financial institutions in the European Union, including in its scope = traditional financial organizations, non-traditional financial entities and supporting service and infrastructure providers.The affected organizations include:Banks and Credit Institutions: Traditional and digital banks.Investment Firms: Companies involved in trading, investment management, and advisory services.Insurance and Reinsurance Firms: Entities providing various insurance products and services.Payment Service Providers: Companies facilitating digital payments, including e-money institutions.Crypto-Asset Service Providers: Firms dealing with cryptocurrencies and digital assets.Market Infrastructures: Entities like stock exchanges and clearing houses.Critical third-party information services: Including credit rating services and data analytics providers.Third-party ICT Service Providers: Companies providing critical technology services to financial institutions, such as cloud computing and data analytics.While the above is not an exhaustive list, it is notable that DORA also applies to some third party service providers which are critical to the operations of the entities in scope. While these organizations are not traditionally subject to financial regulations, it highlights the interconnected nature of modern financial infrastructure.Key Requirements for OrganizationsDORA sets out comprehensive requirements to ensure financial entities can withstand, respond to, and recover from operational disruptions, separated into five basic pillars. The key requirements include:ICT Risk Management: Establishing robust internal processes to identify, assess, and manage risks associated with information and communication technology.Incident Reporting: Implementing procedures for timely and efficient reporting of significant ICT-related incidents to competent authorities.Digital Resilience Testing: Regular testing of the ICT systems to assess their resilience against potential threats and vulnerabilities.Information Sharing: Encouraging the exchange of cyber threat information and intelligence among financial institutions to bolster collective defense mechanisms.Third-party Risk Management: Ensuring that third-party service providers comply with DORA’s standards, including contractual agreements that mandate adherence to these requirements.Where Should Organizations Start?For financial institutions embarking on their journey to comply with DORA, the following steps are crucial:Conduct a Gap Analysis: Assess current ICT risk management practices against DORA’s requirements to identify gaps and areas needing improvement.Develop a Compliance Roadmap: Create a strategic plan outlining the necessary steps, timelines, and resources required to achieve compliance.Enhance Incident Reporting Mechanisms: Implement or upgrade systems to ensure timely and accurate reporting of ICT-related incidents.&nbsp;Strengthen Third-party Relationships: Work closely with your third-party ICT service providers to ensure they can help you to meet DORA’s compliance standards.Invest in Training and Awareness: Include Resiliency and what to do in the event of an emergency into your user training.&nbsp;Engage in Continuous Testing: Regularly test ICT systems to identify vulnerabilities and ensure resilience against potential cyber threats and outages.How can Zscaler Help?Zscaler’s Zero Trust Exchange can help organizations on the path to DORA compliance by providing a solid, defensible architecture based upon Zero Trust principles to defend your users and data against cyber threats. Enabling organizations to securely connect users, both internal and third party, to the applications they need, without overprovisioning. Additionally Zscaler provides a complete set of&nbsp;resilience capabilities, to ensure business continuity during network or cloud disruptions.&nbsp;What’s next?As the January 2025 deadline approaches, financial institutions across the EU must prepare for the stringent requirements of DORA. Leveraging Zscaler's advanced solutions can help ensure compliance, enhance resilience, and protect against ICT-related risks. By adopting a proactive approach to digital operational resilience, financial entities can navigate the complexities of DORA and safeguard their operations in an increasingly digital world. Zscaler is committed to helping its customers through this process. Reach out to your local Zscaler representative and ask to meet with a member of the CISO team to understand how we can help.&nbsp;]]></description>
            <dc:creator>James Tucker (Head of CISO, International)</dc:creator>
        </item>
        <item>
            <title><![CDATA[The NIS2 directive as an opportunity to overcome legacy infrastructure ]]></title>
            <link>https://www.zscaler.com/blogs/company-news/the-nis-2-directive-as-an-opportunity-to-overcome-legacy-infrastructure</link>
            <guid>https://www.zscaler.com/blogs/company-news/the-nis-2-directive-as-an-opportunity-to-overcome-legacy-infrastructure</guid>
            <pubDate>Wed, 28 Aug 2024 09:53:48 GMT</pubDate>
            <description><![CDATA[By now, all the CISO and C-Level executives in the EU should be aware of the upcoming NIS2 Directive deadline: 17 October 2024. Member states must adopt and publish the measures necessary to comply with the directive by 18 October 2024. Belgium, France, Germany and Italy already issued the decrees to transpose the directive, although some are still preliminary work. The good news is that&nbsp; things are progressing with the pending deadline.We are all aware that the NIS2 objective is to expand the scope and strengthen security requirements across all EU countries, increase the baseline protection, harmonize the communications sharing and enforce compliance; and that not only by imposing fines but also with potential legal consequences for the senior leadership.&nbsp;We see different levels of maturity of adoption, understanding, and funding to become compliant across the EU. However, most of those in charge of NIS2 compliance initiatives are confident about the ultimate result of raising the security posture of their organization.The Directive can even give the impetus that can potentially lead to a mindshift change of how to approach security overall and result. If organizations come across major gaps in their security infrastructure, the following aspects can be helpful for a redesign of the security setup.In the following we cover two aspects as foundation for a new tactical or even strategic approach to security.I’d like to start explaining why the Zscaler Zero Trust Exchange platform is properly suited to help organizations to accomplish the short time goal of compliance and secondly why it has further potential as business enabler to move one step higherThe compliance goal can go along with a technology swapThe Zscaler platform fits the requirements of NIS2. In the directive is in fact written (preamble 89) that: “Essential and important entities should adopt a wide range of basic cyber hygiene practices, such as zero trust principles, software updates, device configuration, network segmentation, identity and access management or user awareness, organise training for their staff and raise awareness concerning cyber threats, phishing or social engineering techniques”.You may immediately notice that the zero trust framework is what is highlighted, while, all across the document, no mention of VPN (Virtual Private Network) is reflected: it’s commonly known that this incumbent technology, that served customers well for many years,&nbsp; has now become a security weakness. The latest&nbsp;Zscaler ThreatLabz 2024 VPN Risk Report points out the dangers of dated technology. 92% of the respondents are concerned about third parties serving as potential backdoors into their networks through VPN access.&nbsp;Third party management is a key aspect of NIS2, because the whole value chain must be protected by every involved stakeholder. That’s why the NIS2 mandates to validate the entire supply chain before using it and exercise due diligence to avoid the risks coming from it. In the Zscaler report&nbsp;NIS2 & Beyond: Risk, Reward & Regulation Readiness from April 2024, we discovered that more than 95% of organizations have started to deploy zero trust solutions or, at least, planned to do it.To comply with NIS2, enterprises don’t only need a new technology; rather, they need to improve their procedures and educate their workforce. It’s a matter of “people, process and technology”. The ZTE platform clearly addresses most of the technical specifications covered in the Article 21 of the directive, but Zscaler can also help to provide guidance and best practice on the procedures to follow leveraging our Professional Services expertise.One of the most common difficulties faced by organizations is the fact that NIS2&nbsp; “measures shall be based on an all-hazards approach that aims to protect network and information systems”. That’s something that is very hard to achieve with a single technology, hence you risk experiencing vendor sprawling with an ever increasing complexity to manage. The ZTE is a comprehensive platform that can provide whatever you need to&nbsp;secure,&nbsp;simply, and help&nbsp;transform your business. You may enable the functionalities of interest, whenever your organization is ready to adopt it, by just enabling some licenses. For examples, you can secure Internet/SaaS traffic or access to private applications, monitoring from device to network to applications with data protection, CASB, and logging. Then, maybe you may want to deploy a zero trust SD-WAN, risk management, and identity protection—the list goes on.The Zscaler ZTE platform can greatly support customers in accomplishing their goal of security, but it doesn’t just protect infrastructure—it simplifies it, too. Complex environments are generally hard to manage, pretty expensive, difficult to troubleshoot, and require longer time to release new services.The ultimate purpose of the Zero Trust Exchange is to maximize the value delivered to business and support the digital transformation through enabling the critical resources that allow their business (people, apps, device/things, and data) to operate in the most efficient, scalable and secure way possible, abstracting away traditional IT complexity, providing the visibility and insight the business needs to make timely decisions, while minimizing business risk and maximizing profit in the process.The Zero Trust Exchange eliminates the attack surface by making applications invisible to the internet. Furthermore, because the traffic never touches your network directly, lateral movement is impossible. Ultimately, this approach significantly reduces the organization's risk of falling victim to ransomware and other malware, accidental or malicious data loss, and more.&nbsp;]]></description>
            <dc:creator>Stefano Alei (Transformation Architect)</dc:creator>
        </item>
    </channel>
</rss>