Cloud Security Zero

Latest from the Blog

The True Cost of Legacy Technology: How Technical Debt Stymies Enterprise Security and Network Transformation

The first network message was sent over ARPANET in 1969. A few years later Vint Cerf and Bob Kahn introduced the Internet Protocol (IP)—the foundation for modern network communication. In 1983, NetBIOS was created as part of Windows internet naming services (WINS). In that same year the Domain Name Services (DNS) naming system was created, supplanting WINS. Why the…

The CIO Mandate for Secure Cloud Transformation

Join me and Nathan from Zscaler in this webinar The new way of work is remote, mobile-first, and cloud-based. Employees expect instant, secure access to applications, information, and resources. Meanwhile, threats proliferate, VPNs lag, hardware costs rise, and little is truly secure. Hub-and-spoke networks employing castle-and-moat security are no longer tenable, and technology leaders that…

Three Ways ZTNA Protects Against Ransomware in 2020…and Beyond

https://info.zscaler.com/webinar-three-ways-ztna-protects-against-ransomware Ransomware is now using popular remote access VPNs as a Trojan horse to gain access to enterprise networks. This is frustrating for IT teams that are being asked to enable mobility for their users. Unfortunately, the technology they invested in to protect their business has been rendered obsolete. We understand. We’ve helped hundreds of…

Get new content delivered directly to your inbox.