|
|
|
|
IT and cybersecurity hit the Crescent City this October
Daniel Ballmer, Senior Transformation Analyst, Zscaler
If you have plans to be somewhere other than New Orleans this October, it is time to reconsider. Autumn breathes new vigor into the city as cool winds blow across the Louisiana Bayou. October is a celebratory month when the city hosts the NOLAxNOLA local music festival, the National Fried Chicken Fest, and Crescent City Blues & BBQ Fest in New Orleans. This year, while the rest of the city is awash with cultural celebrations, Zscaler is adding its cybersecurity-flavored spice to the mix.
Join our CTO and CISO Exchange events in New Orleans on October 17-18, and let us care for you during your stay. We will be gathering security leaders worldwide to discuss the latest developments in zero trust, AI, cyber risk management, and more. New Orleans has the best cuisine in the nation, but for two days, it will host some of your greatest friends and colleagues in cybersecurity. Meet Zscaler CEO Jay Chaudhry, get the latest threat intel from Global CISO Deepen Desai, and discover our latest innovations with CIO Patrick Foxhoven.
The concurrent Exchanges will also be joined by special guests from businesses you know and love. This October, why not spend some of your Cybersecurity Awareness Month with Zscaler in New Orleans?
See the complete agenda and register
For those outside the U.S., we have many opportunities to connect. Zscaler is bringing its flagship Zenith Live event – where progressive CXOs like Benjamin Vaughn speak – to select cities in Asia this month. We will also host an EMEA version of our CXO Exchange in Amsterdam in March 2024.
So, no matter where you reside, we hope you have the opportunity to catch us in person.
|
|
|
|
|
From the Office of the CISO:
Unnatural selection: Why cybercriminals are turning to encryption-less ransomware
Sam Curry, VP & CISO in Residence, Zscaler
There is a form of decidedly unnatural selection happening online, but it is nevertheless a selective process in an evolutionary sense. It is unnatural because it is online and driven by humans and our tools. It is selective because there is pressure to make choices and refinements towards a goal: to make more money for less investment.
This isn’t the blind pursuit of top-line at all costs, like an irresponsible startup in an economic bubble, but is rather focused on margin and efficient return on investment. This is the inexorable march of capital, and it’s happening in cybercrime today with the oxymoronic-sounding encryption-less ransomware (ELR) phenomenon.
Zscaler’s ThreatLabz team recently published first-hand data and insight into ELR, with 25 new ransomware families emerging in 2023 alone, typically around large volumes of data extraction from victims.
Find out what’s behind the rise in encryptionless ransomware.
|
|
|
|
|
Editor's Picks
Together with a representative from the NSA, California-based satellite broadband provider Viasat took to the stage at Black Hat to announce new details about a cyberattack that targeted its systems in February of last year. The company confirmed what many suspected, that it was indeed a coordinated, multi-faceted assault carried out by state-sponsored Russian actors.
How VPNs once again undermined our collective security
|
As an advocate and veteran practitioner of zero trust, I was intrigued by a recent article decrying its "vulnerability.” In fact, seeing zero trust and vulnerability in the same headline had me wondering if I overlooked some glaring flaw in past deployments. Were my previous positive experiences with zero trust a statistical anomaly? I had to find out.
Examining some wild claims about zero trust
|
“Five Eyes,” forged after WW2 to further the interests of English-speaking democracies, operated in secret for decades before coming to the public’s attention in 2005. Today, they continue their work behind a veil of secrecy, which makes their release of a report titled 2022 Top Routinely Exploited Vulnerabilities noteworthy.
What Five Eyes knows about your security vulnerabilities
|
As businesses strive to capitalize on the potential synergies between the Internet of Things (IoT)/Operational Technology (OT) and more traditional assets, mergers and acquisitions (M&A) have become a key vehicle to enhance business performance. However, merging two companies presents unique technological challenges, of which cybersecurity is the paramount concern.
Addressing key security concerns for operational technology
|
It would be inaccurate to say that CISO's roles are beginning to shift, since our responsibilities have always been a work in progress. We’re responsible for maintaining the cybersecurity or truly the defense of the organization, of course, but even this description requires some examination.
Delving into a history of shifting CISO expectations
|
VPNs continue to be a deeply problematic element in today’s enterprise security architectures. That’s the most salient finding from Zscaler’s 2023 VPN Report, created in conjunction with Cybersecurity Insiders and published earlier this month. To some degree, the report describes fallout from the COVID era.
Read a Field CTO’s analysis on Zscaler’s VPN use findings
|
|
|
|
|
|
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
|
|
The CISO’s Gambit | Ep. 28
Shannon Lietz is an award-winning security professional, patent-holder, visionary innovator, and industry leader. She joins host Sean Cordero for an in-depth discussion on lucky vs. good cybersecurity, passion-based hiring, DevSecOps, and our industry’s need for accountability and metrics.
Listen now
|
The CIO Evolution | Ep. 24
Leading authorities discuss critical infrastructure, exploring broad and pressing matters. Recorded live, this engaging panel moderated by Kavitha Mariappan, Zscaler EVP, Customer Experience & Transformation at Zscaler, includes Chris DeRusha, Federal CISO & Deputy National Cyber Director, and David Cagigal, former CIO of State of Wisconsin & CXO REvolutionary.
Listen now
|
|
|
|
|
|
|
|
|