POPULARITY
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss the latest AI news, some worrying trends in cyber crime, and this year's largest supply chain hack, impacting hundreds of companies worldwide. Hollingworth and Croft kick things off by looking at the NSW government embracing AI and the federal government's timely move to ban deepfake “nudify” apps that are being used to bully and harrass. The pair then catch up with the latest cyber crime news, from the wide-ranging Salesloft Drift hacks that have impacted companies like Zscaler and Palo Alto Networks, to a brazen local hack that's seen delicate health data published online by unscrupulous ransomware operators. Hollingworth and Croft wind things up with some mostly good news, with an AI stethoscope potentially a game changer for heart health, and an international operation to take down a fake ID marketplace. Enjoy the episode, The Cyber Uncut team
Palo Alto Networks, Zscaler, Cloudflare, Navy Fed, AT&T, more Salesforce fallout and now these segments are officially open bar...
What's Steve W worrying about at the end of the month? Find out on this week's PlayingFTSE Show!Both Steves are ahead of the market this week – or at least, they were when we recorded this week's show! But one is more ahead than the other…The big story this week is Alphabet's antitrust case and there are two parts to it. The significance of being forced to share data with competitors is not to be underestimated.The company can, however, keep spending its way to being the default search engine on the iPhone. But does that benefit Alphabet, or Apple?M&G is a new stock for the show and Steve D has been taking a look at the company's latest update. It's one that dividend investors might want to have on their radars.A mix of insurance and asset management is a familiar one. But risk comes from not knowing what you're doing and is this something either Steve can process well enough?Rising bond yields send Legal & General shares to a 9% dividend yield. That's unusually high, so should investors seize the opportunity?Maybe. But as Steve W outlines, this isn't just a case where rising yields mean lower share prices – the bond selloff has meaningful consequences for the company's dividend cover.However we pronounce it, Zscaler is an impressive cybersecurity operation. It doesn't really make much in the way of free cash flow (after stock-based comp) but who cares?AI looks like a big threat that can drive demand for years to come, but Steve D has his eye on a lot of deferred revenue. Is this any different to Crowdstrike?Only on this week's PlayingFTSE Podcast!► Get a free share!This show is sponsored by Trading 212! To get free fractional shares worth up to 100 EUR / GBP, you can open an account with Trading 212 through this link https://www.trading212.com/Jdsfj/FTSE. Terms apply.When investing, your capital is at risk and you may get back less than invested.Past performance doesn't guarantee future results.► Get 15% OFF Fiscal.ai:Huge thanks to our sponsor, Fiscal.ai, the best investing toolkit we've discovered! Get 15% off your subscription with code below and unlock powerful tools to analyze stocks, discover hidden gems, and build income streams. Check them out at Fiscal.ai!https://fiscal.ai/?via=steve► Follow Us On Substack:Sign up for our Substack and get light-hearted, info-packed discussions on everything from market trends and investing psychology to deep dives into different asset classes. We'll analyze what makes the best investors tick and share insights that challenge your thinking while keeping things engaging.Don't miss out! Sign up today and start your journey with us.https://playingftse.substack.com/► Support the show:Appreciate the show and want to offer your support? You could always buy us a coffee at: https://ko-fi.com/playingftse(All proceeds reinvested into the show and not to coffee!)► Timestamps:0:00 INTRO & OUR WEEKS7:13 GOOGLE ANTITRUST25:45 M&G42:55 LEGAL & GENERAL59:32 ZSCALER► Show Notes:What's been going on in the financial world and why should anyone care? Find out as we dive into the latest news and try to figure out what any of it means. We talk about stocks, markets, politics, and loads of other things in a way that's accessible, light-hearted and (we hope) entertaining. For the people who know nothing, by the people who know even less. Enjoy► Wanna get in contact?Got a question for us? Drop it in the comments below or reach out to us on Instagram: https://www.instagram.com/playing_ftse/► Enquiries: Please email - playingftsepodcast@gmail(dot)com► Disclaimer: This information is for entertainment purposes only and does not constitute financial advice. Always consult with a qualified financial professional before making any investment decisions.
In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss the latest AI news, some worrying trends in cyber crime, and this year's largest supply chain hack, impacting hundreds of companies worldwide. Hollingworth and Croft kick things off by looking at the NSW government embracing AI and the federal government's timely move to ban deepfake “nudify” apps that are being used to bully and harrass. The pair then catch up with the latest cyber crime news, from the wide-ranging Salesloft Drift hacks that have impacted companies like Zscaler and Palo Alto Networks, to a brazen local hack that's seen delicate health data published online by unscrupulous ransomware operators. Hollingworth and Croft wind things up with some mostly good news, with an AI stethoscope potentially a game changer for heart health, and an international operation to take down a fake ID marketplace. Enjoy the episode, The Cyber Uncut team
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: The Salesloft breach and why OAuth soup is a problem The Salt Typhoon telco hackers turn out to be Chinese private sector, but state-directed Google says it will stand up a “disruption unit” Microsoft writes up a ransomware gang that's all-in on the cloud future Aussie firm hot-mics its work-from-home employees' laptops Youtube scam baiters help the feds take down a fraud ring This episode is sponsored by Dropzone.AI. Founder and CEO Edward Wu joins the show to talk about how AI driven SOC tools can help smaller organisations claw their way above the “security poverty line”. A dedicated monitoring team, threat hunting and alert triage, in a company that only has a couple of part time infosec people? Yes please! This episode is also available on Youtube. Show notes The Ongoing Fallout from a Breach at AI Chatbot Maker Salesloft – Krebs on Security Salesloft: The Leading AI Revenue Orchestration Platform Palo Alto Networks, Zscaler customers impacted by supply chain attacks | Cybersecurity Dive The impact of the Salesloft Drift breach on Cloudflare and our customers China used three private companies to hack global telecoms, U.S. says CSA_COUNTERING_CHINA_STATE_ACTORS_COMPROMISE_OF_NETWORKS.PDF Google previews cyber ‘disruption unit' as U.S. government, industry weigh going heavier on offense | CyberScoop Ransomware gang takedowns causing explosion of new, smaller groups | The Record from Recorded Future News Hundreds of Swedish municipalities impacted by suspected ransomware attack on IT supplier | The Record from Recorded Future News Storm-0501's evolving techniques lead to cloud-based ransomware | Microsoft Security Blog The Era of AI-Generated Ransomware Has Arrived | WIRED Between Two Nerds: How threat actors are using AI to run wild - YouTube Affiliates Flock to ‘Soulless' Scam Gambling Machine – Krebs on Security UK sought broad access to Apple customers' data, court filing suggests ICE reactivates contract with spyware maker Paragon | TechCrunch WhatsApp fixes 'zero-click' bug used to hack Apple users with spyware | TechCrunch Safetrac turned staff laptops into covert recording devices to monitor WFH Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring - Risky Business Media
The 5 things you need to know before the stock market opens today: A new ruling decided Google can keep Chrome, OpenAI is buying a product development startup for $1.1 billion, activist hedge fund Holdco is reportedly putting pressure on Comerica to sell or face a board challenge, Zscaler shares are up after strong revenue guidance, and Disney will pay $10 million to settle FTC claims it unlawfully collected children's data. Squawk Box is hosted by Joe Kernen, Becky Quick and Andrew Ross Sorkin. Follow Squawk Pod for the best moments, interviews and analysis from our TV show in an audio-first format.
Two YouTube channels help dismantle a Chinese scam operation, Cloudflare, Zscaler, and Palo Alto disclose Salesloft-related breaches, a ransomware attack disrupts vehicle production at Jaguar Land Rover, and we have a new record DDoS attack. Show notes Risky Bulletin: YouTubers unmask and help dismantle giant Chinese scam ring
Wie das vorläufige Urteil in der Kartellklage gegen Google zeigt, ist Wettbewerbsrecht schlichtweg tot. Chrome muss nicht ausgegliedert werden, und Apple darf nicht daran gehindert werden, etwa $20 Mrd. jährlich für die Voreinstellung von Google als Standard-Suchmaschine zu kassieren. Die CEOs der Magischen Sieben Tech-Riesen dürften lächeln. Ansonsten fallen die Reaktionen auf Quartalszahlen gemischt aus. Während Macy's und Zscaler profitieren, stehen die Aktien von Dollar Tree unter Druck. Notenbanker Christopher Waller, der Nachfolger von Jerome Powell werden könnte, spricht sich vor dem Opening nochmals für eine Zinssenkung im September aus. Er betont allerdings auch, dass die FED in den kommenden drei bis sechs Monaten eine Reihe von Senkungen vornehmen dürfte. Wie dem auch sei, kann es zwischen Sitzungen durchaus auch Pausen geben. Die Wall Street preist aktuell eine September- und eine Dezember-Senkung ein. Die Nadel wird dann in Richtung einer weiteren Oktober-Senkung kippen, sollten die August-Arbeitsmarktdaten schwach ausfallen. Ein Podcast - featured by Handelsblatt. +++ Jetzt kostenlos beim Börsenspiel von Société Générale anmelden! https://www.trader-boersenspiel.de/web/home?utm_source=markus-koch&utm_medium=podcast&utm_content=startseite&utm_campaign=trader +++ +++EXKLUSIVER NordVPN Deal ➼ https://nordvpn.com/Wallstreet Jetzt risikofrei testen mit einer 30-Tage-Geld-zurück-Garantie!+++ +++ Individuell, aktiv und ausgezeichnet: Die Vermögensverwaltung von DJE – mehr unter https://www.dje.de/vv +++ +++ Alle Rabattcodes und Infos zu unseren Werbepartnern findet ihr hier: https://linktr.ee/wallstreet_podcast +++ Der Podcast wird vermarktet durch die Ad Alliance. Die allgemeinen Datenschutzrichtlinien der Ad Alliance finden Sie unter https://datenschutz.ad-alliance.de/podcast.html Die Ad Alliance verarbeitet im Zusammenhang mit dem Angebot die Podcasts-Daten. Wenn Sie der automatischen Übermittlung der Daten widersprechen wollen, klicken Sie hier: https://datenschutz.ad-alliance.de/podcast.html Impressum: https://www.360wallstreet.de/impressum
Wie das vorläufige Urteil in der Kartellklage gegen Google zeigt, ist Wettbewerbsrecht schlichtweg tot. Chrome muss nicht ausgegliedert werden, und Apple darf nicht daran gehindert werden, etwa $20 Mrd. jährlich für die Voreinstellung von Google als Standard-Suchmaschine zu kassieren. Die CEOs der Magischen Sieben Tech-Riesen dürften lächeln. Ansonsten fallen die Reaktionen auf Quartalszahlen gemischt aus. Während Macy's und Zscaler profitieren, stehen die Aktien von Dollar Tree unter Druck. Notenbanker Christopher Waller, der Nachfolger von Jerome Powell werden könnte, spricht sich vor dem Opening nochmals für eine Zinssenkung im September aus. Er betont allerdings auch, dass die FED in den kommenden drei bis sechs Monaten eine Reihe von Senkungen vornehmen dürfte. Wie dem auch sei, kann es zwischen Sitzungen durchaus auch Pausen geben. Die Wall Street preist aktuell eine September- und eine Dezember-Senkung ein. Die Nadel wird dann in Richtung einer weiteren Oktober-Senkung kippen, sollten die August-Arbeitsmarktdaten schwach ausfallen. Abonniere den Podcast, um keine Folge zu verpassen! ____ Folge uns, um auf dem Laufenden zu bleiben: • X: http://fal.cn/SQtwitter • LinkedIn: http://fal.cn/SQlinkedin • Instagram: http://fal.cn/SQInstagram
Nathaniel Bradley joins Morning Movers to preview this week's earnings report from Zscaler (ZS). He believes the company's efficiency improvement displayed in margins has the needle pointing up. He does highlight Zscaler's government contract ties and the significance of maintaining a "level of demand" in the cybersecurity space. Later, Nathaniel discusses the A.I. technology implementation used in fighting cybercriminals.======== Schwab Network ========Empowering every investor and trader, every market day.Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about
Ed Butowsky is a bull when it comes to Zscaler (ZS). He sees the cybersecurity company making a strong run higher due to its "streamlined" and "cohesive" application that makes it adaptable for various clients. Ed adds that its government contracts are a "seal of approval" for the private sector that will only boost bullish momentum. Tom White later offers example options trades for Zscaler and CrowdStrike (CRWD).======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/About Schwab Network - https://schwabnetwork.com/about
When it comes to Zscaler's (ZS) earnings after the bell on Tuesday, Cory Johnson says he'll watch how the company tackles the "future of A.I." Part of that comes from interest in the company's Red Canary acquisition and utilizing agentic A.I. to fight cybersecurity threats on a mass scale. Cory urges investors to keep an eye out for any information regarding Zscaler's contracts and customers. Understanding where the money's coming from can help determine how long the revenue stream will last.======== Schwab Network ========Empowering every investor and trader, every market day. Subscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – https://twitter.com/schwabnetworkFollow us on Facebook – https://www.facebook.com/schwabnetworkFollow us on LinkedIn - https://www.linkedin.com/company/schwab-network/ About Schwab Network - https://schwabnetwork.com/about
If you like what you hear, please subscribe, leave us a review and tell a friend!
Sverige har en stark konsensuskultur och en historia av decentraliserade beslut. Det är ju trevligt att alla får tycka och tänka kring olika beslut. Men! Påverkar denna kultur säkerhetsarbetet? Konsekvenserna kan man faktiskt se om man jämför med t.ex. Japan och Frankrike. Det här måste vi titta närmare på. Tillsammans med Sebastian Kemi som är CISO på Zscaler djupdyker han ner i ämnet tillsammans med IT-säkerhetspodden. Det blir ett snack om kulturen och hur man kan tänka istället. Sedan går vi vidare med tekniksnack kring Zero trust och hur man enkelt kan komma igång. För är inte just den första tanken som kommer upp kring zero trust att det är komplicerat och kanske dyrt? Detta avsnitt av IT-säkerhetspodden är gjort i samarbete med Westcon – en ledande distributör inom cybersäkerhet. Westcon hjälper företag att skydda sina digitala miljöer genom att tillhandahålla marknadsledande säkerhetslösningar och expertstöd via vårt breda nätverk av partners.
Moinul Khan, co-founder and CEO of Aurascape, joins the show to unpack what it takes to build a cybersecurity startup in the age of AI. With decades of experience at companies like Zscaler, Palo Alto Networks, and FireEye, Moinul shares why AI demands an entirely new security stack, how agentic AI is changing the game, and why prevention—not dashboards—must be at the heart of real solutions. If you're a tech leader navigating the future of AI and security, this is a conversation you won't want to miss.Key Takeaways• Traditional security stacks can't keep up with dynamic, evolving AI tools• Prevention-focused solutions matter more than dashboards or API visibility• Agentic AI is both an opportunity and a security challenge that startups must address• CISOs are rethinking consolidation and becoming more open to best-of-breed solutions in AI security• Building with a long-term prevention mindset creates stronger, more resilient startupsTimestamped Highlights00:37 — Aurascape's mission to deliver an all-encompassing AI security solution02:27 — The “aha” moment: why legacy firewalls and proxies can't secure AI08:23 — How Aurascape's vision has evolved from public AI tools to securing private and third-party applications13:17 — Agentic AI, MCP protocols, and why startups need to secure the next wave of AI agents16:44 — Best-of-breed vs consolidation: where the security market is really heading20:37 — Advice for founders: why prevention-first is the only real path to solving security problemsA standout moment“If you try to patch what you have built in the last 20 years, you will fail. If you want to secure AI, you have to build your entire stack from the ground up.” — Moinul KhanResources MentionedAurascape.aiPro TipDon't build for a quick exit. Focus on prevention, even if it's the harder road—it's what truly solves customer problems in cybersecurity.Call to ActionIf you enjoyed this episode, share it with someone exploring AI security. Subscribe or follow the show for more conversations with the builders shaping the future of tech.
In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR.Jay's journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-mile walk to school, he went on to build five companies and pioneer the modern Zero Trust cloud security model. Zscaler, his most iconic company, was launched in 2007 with $50 million of his own capital and no VC investment - a bold bet in the middle of a market downturn, at a time when few believed enterprise security could move to the cloud.This episode is packed with powerful lessons from a founder who's played the long game. Jay talks about the mindset he carried from his early years farming with oxen, how working alongside his wife Jyoti gave him unmatched focus and alignment, and why startups should be “a foot wide and 20 feet deep.” He explains how Zscaler rewrote not just the playbook for go-to-market in security, but also the TCP/IP stack, and the early challenges of selling Zero Trust well before the term even existed. He also shares his wisdom on why most founders pivot too late when their sales motion fails. Jay provides his view of the future of cybersecurity and the Internet itself, from why the private corporate network is dying to why firewalls will eventually go the way of mainframes.Throughout it all, Jay shares a rare combination of conviction, humility, and self-discipline. Whether you're a first-time founder or running a $10 billion company, this is an absolute masterclass in how to build enduring companies and stay grounded in the process.
We speak with Andreas Hartl, Senior Vice President for the Asia-Pacific and Japan (APJ) region at Zscaler. Andreas is responsible for driving the company's growth and strategic initiatives across the region.Prior to joining Zscaler, Andreas held senior leadership positions at several leading technology companies, including Aveva, IBM & Microsoft, where he played a pivotal role in expanding market presence and achieving significant revenue growth. His extensive background in sales, business development, and strategic planning has equipped him with a deep understanding of the APJ market and its unique opportunities.Andreas is known for his ability to build and lead high-performing teams, fostering a culture of innovation and customer-centricity. His strategic vision and execution have been instrumental in driving Zscaler's success in the region, helping organizations securely transform their digital infrastructure.He holds a Bachelor's in Applied Sciences, Electrical Engineering & Information Technology from Technical University of Munich as well as a Master's from University of Applied Sciences Munich. With a strong commitment to excellence and a forward-thinking mindset, Andreas Hartl continues to shape the future of secure digital transformation in the APJ region.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
We speak with Phil Tee, Zscaler, EVP, Head of AI Innovations at Zenith Live 2025 in Las Vegas.Phil and his team are developing new AI advancements to better secure the use of AI, enabling organizations to integrate and leverage its potential. Phil is responsible for driving AI innovations at Zscaler, leveraging their unique data assets and the latest in AI technology to push forward what's possible in Sec and DevOps for Zscaler customers. His team's goal is to generate novel offerings in the cyber market and ensure that our customers benefit from the remarkable pace of AI innovation.Phil brings the experience of three decades in software and AI entrepreneurship, having founded or co-founded Micromuse, RiverSoft, Promethyan Labs, and Moogsoft. Before joining Zscaler, Phil served as the chairman and CEO of Moogsoft until its acquisition by Dell Technologies. Moogsoft was an early pioneer in the use of AI in operations, credited with founding the AIOps market segment. During his tenure, Phil was directly involved in the groundbreaking technology as a primary inventor in more than 50 patents, and authored or coauthored dozens of academic papers. Before Moogsoft, Phil's roles at RiverSoft and Micromuse—where he invented Netcool—solidified him as a serial disrupter in operations technology.In addition to his entrepreneurial activities, Phil has advised multiple startups and is an adjunct professor at ASU as well as a visiting researcher at the University of Sussex. Phil has an undergraduate degree in Physics and earned a doctorate in Informatics focused on Network Science and Information Theory from Sussex, where he also sits on the board of the School of Informatics.#ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
As we enter the era of agentic AI, we must also address its risks. At Zenith Live 2025, we speak with Ed Henry, Zscaler, Senior Data Scientist and discuss agentic AI, its potential to streamline operations, and what are some of the key security challenges. #ZL2025 #zerotrustsecurity #mysecuritytv #zscaler
A looming deadline always gets attention, and for DoD suppliers, the clock is ticking. On October 1, 2025, the Department of Defense will begin including Cybersecurity Maturity Model (CMMC) certification requirements in new contracts. This week on Feds At The Edge, four leading experts cut through the complexity and share practical guidance to help you start, or finish, your CMMC journey. Sean Frazier, Federal Chief Security Officer for Okta, explains why “Know Thy Data” is the key to applying the right level of security where it matters most. Alan Dinerman, PhD, Senior Manager, Cyber Strategy, Policy, and Privacy at Mitre, puts CMMC in context with other cybersecurity standards, noting its focus on Controlled Unclassified Information. And Jeff Adorno, Field Chief Compliance Officer at ZScaler, warns of risks in the AI era, where sensitive data can unintentionally “leak” into Large Language Models. The panel as a whole highlights how aligning with existing frameworks and using current technologies can demonstrate progress to auditors and ease compliance. Listen now on your favorite podcast platform because whether you're deep into compliance or just getting started, this conversation will help you navigate the evolving landscape of CMMC and beyond.
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
Is your company's AI strategy opening you up to massive security risks? In this powerful conversation, Claudionor Coelho, Chief AI Officer at Zscaler, reveals the hidden dangers of agentic AI—and how Fortune 500 companies are unintentionally exposing sensitive data through generative AI tools.Claudionor shares real-world examples of AI vulnerabilities, how attackers can exploit agent systems to extract private data, and why AI security must be treated with the same urgency as data security. From salary leaks to corporate data breaches, this discussion is a wake-up call for executives, CISOs, and AI teams alike.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.More than 90 state and local government organizations have been targeted in a recent wave of cyberattacks exploiting a vulnerability in Microsoft SharePoint, according to the Center for Internet Security (CIS).Traditional cyber attack methodologies - exploiting endpoints, moving laterally, escalating privileges - are increasingly outdated as enterprise IT shifts toward SaaS and browser-based access.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-2533 - a high-severity Cross-Site Request Forgery (CSRF) vulnerability in PaperCut NG/MF print management software - to its Known Exploited Vulnerabilities (KEV) catalog.Researchers at Nozomi Networks have disclosed over a dozen security flaws in Tridium's Niagara Framework, a vendor-agnostic building management platform used in sectors ranging from industrial automation to energy and smart infrastructure.Between April 2024 and April 2025, ransomware attacks on the oil and gas industry increased by an unprecedented 935%, according to new research from cybersecurity firm Zscaler.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
In this episode of "Talking Cloud," I welcome Brian Deitch, Chief Technology Evangelist at Zscaler, to discuss the ever-evolving landscape of cloud computing and cybersecurity. The conversation delves into the role of technology evangelists, the impact of AI on cybersecurity, and the importance of emotional intelligence in the digital age. Brian shares personal anecdotes and insights from his career, highlighting the challenges and opportunities in the cybersecurity industry. Our discussion continues and explores the intersection of technology, security, and human connection. Please don't forget to like, share, and subscribe for more insightful episodes! Thanks!
CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »
CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »
Effective security management has never been simple and the expanded threat landscape enhanced by AI has only widened the gap between defenders and attackers. Scott Crawford and Greg Zwakman return to discuss the managed security services market with host Eric Hanselman. Security services have been an option for enterprises since the earliest days of IT, but the need for more depth and breadth in security operations has changed market dynamics and the enterprise security calculus. Part of this shift is driven by the scope and scale of security operations. Expanded attack surfaces with more devices, more SaaS applications and hybrid infrastructure can be all the more difficult to secure. Integrated security operations patterns, like Managed Detection and Response (MDR) can provide more comprehensive services and ones that are targeted at delivering improved security outcomes, rather than just operational support. Changing security requirements are driving M&A activity, as well. Where services had been an augmentation to vendor products, some vendors now see them as a critical part of their portfolio and a key to platform aspirations. Zscaler's acquisition of Red Canary and Sophos' pick up of SecureWorks are some of the more notable transactions in this trend. Security management has shifted front of security markets. More S&P Global Content: AI for security: Agentic AI will be a focus for security operations in 2025 The evolution of security platforms – 6 centers of gravity shaping the market For S&P Global subscribers: Managed Security Services Market Monitor & Forecast For sale: MDR vendors 2025 Trends in Information Security Ending SecureWorks' search for a suitor, Sophos takes it off Dell's hands Zscaler expands its platform play into a new market by reaching for Red Canary Credits: Host/Author: Eric Hanselman Guests: Scott Crawford, Greg Zwakman Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith
Kendrick Trotter joins the show to talk about going from Uber driver to a major account executive at a public cybersecurity company, then founding his own business that created over $70 million in annualized salaries for underrepresented professionals.George K and George A talk to Kendrick about: How a Division I football scholarship and one life-changing Uber ride with an Amazon VP changed everything His game-changing approach to calling CISOs Building Us and Technology - training 13,000+ people for free and placing them at companies like Zscaler and Airtable The harsh reality of what happened to DEI initiatives and why diversity of thought drives 30% more revenueThe bottom line: Kendrick's story proves that with the right mindset, genuine human connection, and "unreasonable hospitality," you can break barriers and create opportunities for others.————
Aviatrix survey reveals only 8% of enterprises have effective Zero Trust — and why network security needs to catch up “Without all three legs, you don't have a stool — therefore, you don't really have Zero Trust.” — Doug Merritt, CEO, Aviatrix In a revealing interview with Technology Reseller News, Aviatrix CEO Doug Merritt joins publisher Doug Green to spotlight the cloud security gap most enterprises don't yet realize they have — and what Aviatrix is doing to solve it. Drawing on a just-released survey of 403 U.S. IT professionals, Merritt paints a sobering picture: only 8% of respondents believe they have an effective Zero Trust security stance in the cloud. While identity and endpoint protections have advanced, the third critical leg — network security — is largely missing. That gap, says Merritt, is what Aviatrix is closing with its Cloud Native Security Fabric (CNSF). Founded by a pioneering female Cisco engineer, Aviatrix brings deep roots in software-defined networking and cloud infrastructure. Today, the company is evolving into a cloud security leader by embedding inline network protection that adapts to cloud-native realities: atomized perimeters, ephemeral workloads, and increasingly complex DevOps pipelines. “The internet is now the enterprise network,” Merritt explains. “Your perimeter isn't five data centers — it's tens of thousands of ephemeral endpoints, APIs, and SaaS services.” Key insights from the podcast include: Why CNSF matters: CNSF forms the third leg of a Zero Trust framework alongside identity and endpoint security — bringing visibility, enforcement, and micro/macrosegmentation into cloud network traffic. Alarming survey findings: 2 out of 3 enterprises struggle with deploying cloud firewalls, over 50% cite visibility blind spots, and 85% report difficulties securing DevOps pipelines. Cloud threats on the rise: The shift to agentic AI and increasingly automated cyber threats make it essential to monitor east-west and egress traffic within the cloud — stopping lateral movement and command-and-control attacks before they spread. Channel opportunity: Aviatrix offers a partner-friendly CNSF solution that complements existing tools like CrowdStrike, Zscaler, Wiz, and cloud-native firewalls — with modular deployment, flexible integration, and a well-designed partner program. For organizations seeking to close their cloud network security blind spots, Aviatrix provides a free Network Security Blind Spot Assessment. And for those wanting to dig deeper, the full survey is available at aviatrix.com/resources. Learn more: https://aviatrix.com
פרק המאה השלושה עשר של ממרמיק, הפודקאסט של עמותת בוגרי ממרם. פותחים עונה חדשה עם, רענן רז וכפיר תשבי, המייסדים של אוולור שנמכרה ב350 מליון דולר ל z-scaler. דיברנו על השירות הצבאי המשותף של רענן וכפיר, על ההחלטה ללכת לעולמות הסייבר למרות ששניהם לא מהתחום וכמובן על המכירה לZScaler. מה האתגר הבא שלהם? תצטרכו להקשיב. ממרמיק - מספרים את הסיפור של הממר״מניקים! מנחים - יוסי מלמד ורועי אייזנמן
Welcome and Introduction- Will Townsend hosts a special standalone edition of G2 on 5G- Guests Nathan Howe and Ken Urquhart from Zscaler join the podcastZscaler Cellular Overview- Nathan explains Zscaler Cellular as the next evolution in connecting customers to Zero Trust Exchange- Enables cellular devices to connect directly to Zscaler customer policy- Provides zero trust controls and protection for cellular-connected devices globallyImplementation and Innovation- Ken highlights the straightforward yet innovative implementation using SIM technology- Eliminates need for client software or network modifications- Enables zero trust cybersecurity from the transmitter back to the InternetEnd Device Applications- Nathan discusses diverse applications, from vending machines to prisoner ankle trackers- Three main areas: headless devices, direct to Internet, and secure remote access- Unique position in brokering connections through Zscaler policy engineScalability and Device Support- Ken confirms Zscaler's ability to handle massive numbers of devices- Processes over 600 billion transactions daily with room for growth- Supports high-bandwidth applications like 4K video and remote equipment operationConsumer and Enterprise Applications- Discussion of potential consumer uses, focusing on enterprise user benefits- Multi-carrier roaming capabilities for global connectivity- Customizable data plans and pricing options for various customer needsAvailability and Contact Information- General availability announced for August 1st- Customers can reach out via sim_srm@zscaler.com for inquiries and partnershipsSecurity and Privacy Considerations- Potential for anonymizing connections through Zscaler exchange- Emphasis on proper use and adherence to local lawsClosing Remarks- Zscaler Cellular provides additional layer of protection beyond 5G encryption- Hosts encourage audience engagement and feedback for future topics
The entrepreneur grew up in a small village in the foothills of the Himalayas with no electricity.He went on to found a cloud-based cyber-security company with a value of $47 billion, trying to protect digital data for businesses and governments. Jay Chaudhry tells us about his daily battle to stay ahead of the “bad guys”.Presenter: Will Bain Producer: Amber Mehmood(Image: Jay Chaudhry giving the keynote speech at Zenith Live. Credit: Zscaler)
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401
In this episode of Great Leaders UK, we sit down with Alice Carlisle, VP UK&I at Wiz, to uncover how she rose from first-line leader to one of the most sought-after roles in the cybersecurity industry. From taking a struggling ZScaler team and transforming it in under three quarters, to embodying Wiz's values of confidence and humility, Alice's journey is proof that authenticity and unrelenting work ethic drive lasting impact. She delves into the hard lessons of leading through fear-based tactics early in her career, learning the Force Management Playbook at AppDynamics, and then applying it to close LogicMonitor's largest deal ever. Ultimately, we focus on how Alice builds culture, leading by example, caring genuinely for people, and creating internal champions, so that teams win together, not just as individuals. Whether you're scaling a hyper-growth sales org, building a new culture, or simply looking to be a better human in leadership, Alice's playbook is packed with actionable insights on driving growth through customer success and winning with authenticity.
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest, Sam Curry, global vp, CISO at Zscaler. This episode was recorded at a Zscaler event in Boston, MA. In this episode: Guardrails for decision making under fatigue Preparing for quantum threats Strategic use of generative AI Reassessing outdated knowledge Huge thanks to our sponsor, Zscaler Zscaler is a cloud-based cybersecurity company that provides secure internet access and private application access. Its platform replaces traditional network security by delivering Zero Trust architecture, protecting users, data, and applications regardless of location. Zscaler's scalable services help organizations modernize IT and reduce risk with seamless, cloud-native security solutions.
Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public internet, if security standards in telecoms are important, and what security trends we will see in enterprise networking in five years' time.
High-profile cyberattacks on major organisations are a stark reminder: the digital world is under constant threat.For every vulnerability fixed, a dozen more are found, so can the cybersecurity industry evolve to face these threats, or is it fighting a losing battle?Zscaler's Christian Bailey joins the conversation to unpack the weak points to prioritise, who's REALLY at fault for breaches, and what it truly means todefend against an invisible enemy…Don't miss this discussion, which sets the critical context for how AI might become our most formidable ally, a topic we'll explore in the follow-up to this special two-parter.In this episode, we cover:The shift from traditional network security to a zero trust modelContinuous employee education and training on cybersecurity risks, particularly with emerging AI technologies The growing complexity of securing interconnected systemsData prioritisation and automation in cybersecurityChristian Baileyhttps://www.linkedin.com/in/baileyce/Colt Technology Serviceshttps://www.colt.net/https://www.linkedin.com/company/colt-technology-services/https://www.instagram.com/colttechnologyservices/
Today, we're talking to Phil Tee, EVP & Head of AI Innovation at Zscaler. We discuss why agentic AI will change everything about the way we use technology, what it will look like to fully team up with autonomous technology, and why intelligence itself might be more malleable than we ever thought. All of this right here, right now, on the Modern CTO Podcast! To learn more about Zscaler, check out their website here.
Send us a textTim and Chris discuss major cybersecurity acquisitions and innovations, examining how these changes will impact enterprise security and cloud architecture.• Zscaler acquires Red Canary MDR (Managed Detection and Response) to fill gaps in their platform despite potential integration challenges• AWS Network Firewall now supports multiple VPC endpoints without requiring Transit Gateway deployment• AWS exits the private 5G market, pivoting to partnerships with established telecommunications providers• CheckPoint acquires Veritai Cybersecurity to enhance their Infinity platform with "virtual patching" capabilities• North Korean IT workers using sophisticated techniques to infiltrate Western companies by posing as legitimate remote employeesCheck the news document for additional stories we didn't have time to cover, including a project called MPIC focused on preventing BGP attacks with certificate validation.Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
The cybersecurity company saw its stock shoot up 10% on Friday. Is that dumb luck or something more? (00:21) Andy Cross and Asit Sharma discuss May's market bounce, plus earnings from ZScaler and Ulta Beauty. Companies discussed: ZS, NOW, ULTA, ELF Host: Andy Cross Guest: Asit Sharma Producer: Anand Chokkavelu Engineer: Dan Boyd Advertisements are sponsored content and provided for informational purposes only. The Motley Fool and its affiliates (collectively, "TMF") do not endorse, recommend, or verify the accuracy or completeness of the statements made within advertisements. TMF is not involved in the offer, sale, or solicitation of any securities advertised herein and makes no representations regarding the suitability, or risks associated with any investment opportunity presented. Investors should conduct their own due diligence and consult with legal, tax, and financial advisors before making any investment decisions. TMF assumes no responsibility for any losses or damages arising from this advertisement. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybersecurity has become top of mind for Fortune 500 companies, and yet attacks, breaches, and other incidents keep happening. Can companies really prevent cyber risks, and what approach should they be taking? Join David Young and guest Jay Chaudhry, CEO, chairman, and founder of Zscaler, to find out the three lessons his parents taught him, why Zscaler has a customer obsession, and why zero trust architecture is critical for today's cyber approach. This Leadership in Challenging Times discussion is featured as a C-Suite Perspectives podcast and a special CED Policy Watch Webcast. Leadership in Challenging Times features timely and insightful discussions with the outstanding CEOs who are recipients of CED's Distinguished Leadership Awards. Business leader honorees discuss the unprecedented challenges facing the nation and how they are helping chart a path forward for both their companies and communities in which they operate. For more from The Conference Board: CED Announces Recipients of Its 2025 Distinguished Leadership Awards CED Distinguished Leadership Awards Celebration CED Report on Securing Cyberspace
A jam-packed session unfolds across DC, earnings, and the broader market. Our Megan Cassella breaks down the political fallout from the latest tariff ruling, while Neuberger Berman CIO Joseph Amato explains why the market favors small and mid-cap names. On the earnings front, we hear from Dell, Marvell, Zscaler, Ulta Beauty, American Eagle, and Gap. Retail analyst Dana Telsey reacts to the retail names and what they reveal about the consumer. Eric Sheridan of Goldman Sachs weighs in on the tech sector's trajectory after another earnings wave. CEO Joanna Geraghty on the new partnership with United
This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Researchers at Trend Micro have uncovered a new campaign by the Fog ransomware group, notable for its use of DOGE-themed ransom notes aimed at mocking victims rather than just extorting them.In the wake of May 2024's Operation Endgame, which dismantled some of the most prominent malware droppers such as IcedID, Pikabot, SystemBC, Smokeloader, and Bumblebee, law enforcement agencies across Europe and North America have moved into a new phase targeting end users of these platforms.Zscaler researchers have recently observed Mustang Panda—also known by aliases like Bronze President, Stately Taurus, and TA416—upgrading its toolset as part of an ongoing espionage campaign, with a recent operation targeting an organization in Myanmar. Atomic macOS Stealer (AMOS), identified as one of the most impactful macOS-targeting infostealers of 2024, leverages deceptive application installers and phishing tactics to gain access to victim machines.
In this episode of Tech Talks Daily, I sit down with Marc Lueck from Zscaler to explore a security mindset shift that more businesses are beginning to embrace. The conversation revolves around the "Resilient by Design" principle, which encourages organizations to stop relying on reactive threat detection and start building systems that anticipate risk and limit impact from the outset. Marc explains how today's cyber landscape demands more than traditional firewalls and legacy systems. He breaks down why Zero Trust should no longer be seen only as a remote access solution, but as a consistent, context-driven access model for all environments. From on-premises communication to lateral traffic between applications, Marc outlines how this model helps reduce vulnerabilities and prevent attacker movement inside the network. We also dive into the challenges posed by AI-driven attacks, where phishing, malware, and reconnaissance are increasingly automated and customized to each target. With these tactics becoming more advanced, Marc stresses the importance of shifting away from pattern-based detection toward a strategy based on real-time context and intent. He shares insights into Continuous Threat and Exposure Management (CTEM), a new class of tools that help security teams understand where problems are likely to occur before they happen. This proactive focus is key to designing systems that are resilient under pressure, rather than relying on alerts after the fact. From his analogies of planning for hurricanes rather than rainstorms, to his thoughts on legacy systems and the future role of automation in threat response, Marc offers a practical look at what resilient infrastructure truly involves. So the question is, are your systems designed to recover and continue when something breaks, or are they waiting for the next emergency to arrive? Let's find out.