POPULARITY
Moinul Khan, co-founder and CEO of Aurascape, joins the show to unpack what it takes to build a cybersecurity startup in the age of AI. With decades of experience at companies like Zscaler, Palo Alto Networks, and FireEye, Moinul shares why AI demands an entirely new security stack, how agentic AI is changing the game, and why prevention—not dashboards—must be at the heart of real solutions. If you're a tech leader navigating the future of AI and security, this is a conversation you won't want to miss.Key Takeaways• Traditional security stacks can't keep up with dynamic, evolving AI tools• Prevention-focused solutions matter more than dashboards or API visibility• Agentic AI is both an opportunity and a security challenge that startups must address• CISOs are rethinking consolidation and becoming more open to best-of-breed solutions in AI security• Building with a long-term prevention mindset creates stronger, more resilient startupsTimestamped Highlights00:37 — Aurascape's mission to deliver an all-encompassing AI security solution02:27 — The “aha” moment: why legacy firewalls and proxies can't secure AI08:23 — How Aurascape's vision has evolved from public AI tools to securing private and third-party applications13:17 — Agentic AI, MCP protocols, and why startups need to secure the next wave of AI agents16:44 — Best-of-breed vs consolidation: where the security market is really heading20:37 — Advice for founders: why prevention-first is the only real path to solving security problemsA standout moment“If you try to patch what you have built in the last 20 years, you will fail. If you want to secure AI, you have to build your entire stack from the ground up.” — Moinul KhanResources MentionedAurascape.aiPro TipDon't build for a quick exit. Focus on prevention, even if it's the harder road—it's what truly solves customer problems in cybersecurity.Call to ActionIf you enjoyed this episode, share it with someone exploring AI security. Subscribe or follow the show for more conversations with the builders shaping the future of tech.
In this episode of Inside the Network, we sit down with Jay Chaudhry, founder and CEO of Zscaler, one of the most valuable cybersecurity companies in the world with a market cap of over $40 billion and $3 billion in ARR.Jay's journey is unlike any other. Raised in a remote Indian village with no electricity, no running water, and a two-and-a-half-mile walk to school, he went on to build five companies and pioneer the modern Zero Trust cloud security model. Zscaler, his most iconic company, was launched in 2007 with $50 million of his own capital and no VC investment - a bold bet in the middle of a market downturn, at a time when few believed enterprise security could move to the cloud.This episode is packed with powerful lessons from a founder who's played the long game. Jay talks about the mindset he carried from his early years farming with oxen, how working alongside his wife Jyoti gave him unmatched focus and alignment, and why startups should be “a foot wide and 20 feet deep.” He explains how Zscaler rewrote not just the playbook for go-to-market in security, but also the TCP/IP stack, and the early challenges of selling Zero Trust well before the term even existed. He also shares his wisdom on why most founders pivot too late when their sales motion fails. Jay provides his view of the future of cybersecurity and the Internet itself, from why the private corporate network is dying to why firewalls will eventually go the way of mainframes.Throughout it all, Jay shares a rare combination of conviction, humility, and self-discipline. Whether you're a first-time founder or running a $10 billion company, this is an absolute masterclass in how to build enduring companies and stay grounded in the process.
A looming deadline always gets attention, and for DoD suppliers, the clock is ticking. On October 1, 2025, the Department of Defense will begin including Cybersecurity Maturity Model (CMMC) certification requirements in new contracts. This week on Feds At The Edge, four leading experts cut through the complexity and share practical guidance to help you start, or finish, your CMMC journey. Sean Frazier, Federal Chief Security Officer for Okta, explains why “Know Thy Data” is the key to applying the right level of security where it matters most. Alan Dinerman, PhD, Senior Manager, Cyber Strategy, Policy, and Privacy at Mitre, puts CMMC in context with other cybersecurity standards, noting its focus on Controlled Unclassified Information. And Jeff Adorno, Field Chief Compliance Officer at ZScaler, warns of risks in the AI era, where sensitive data can unintentionally “leak” into Large Language Models. The panel as a whole highlights how aligning with existing frameworks and using current technologies can demonstrate progress to auditors and ease compliance. Listen now on your favorite podcast platform because whether you're deep into compliance or just getting started, this conversation will help you navigate the evolving landscape of CMMC and beyond.
At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler
Is your company's AI strategy opening you up to massive security risks? In this powerful conversation, Claudionor Coelho, Chief AI Officer at Zscaler, reveals the hidden dangers of agentic AI—and how Fortune 500 companies are unintentionally exposing sensitive data through generative AI tools.Claudionor shares real-world examples of AI vulnerabilities, how attackers can exploit agent systems to extract private data, and why AI security must be treated with the same urgency as data security. From salary leaks to corporate data breaches, this discussion is a wake-up call for executives, CISOs, and AI teams alike.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.More than 90 state and local government organizations have been targeted in a recent wave of cyberattacks exploiting a vulnerability in Microsoft SharePoint, according to the Center for Internet Security (CIS).Traditional cyber attack methodologies - exploiting endpoints, moving laterally, escalating privileges - are increasingly outdated as enterprise IT shifts toward SaaS and browser-based access.The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-2533 - a high-severity Cross-Site Request Forgery (CSRF) vulnerability in PaperCut NG/MF print management software - to its Known Exploited Vulnerabilities (KEV) catalog.Researchers at Nozomi Networks have disclosed over a dozen security flaws in Tridium's Niagara Framework, a vendor-agnostic building management platform used in sectors ranging from industrial automation to energy and smart infrastructure.Between April 2024 and April 2025, ransomware attacks on the oil and gas industry increased by an unprecedented 935%, according to new research from cybersecurity firm Zscaler.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
In this episode of "Talking Cloud," I welcome Brian Deitch, Chief Technology Evangelist at Zscaler, to discuss the ever-evolving landscape of cloud computing and cybersecurity. The conversation delves into the role of technology evangelists, the impact of AI on cybersecurity, and the importance of emotional intelligence in the digital age. Brian shares personal anecdotes and insights from his career, highlighting the challenges and opportunities in the cybersecurity industry. Our discussion continues and explores the intersection of technology, security, and human connection. Please don't forget to like, share, and subscribe for more insightful episodes! Thanks!
CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »
CyberRatings, a non-profit that performs independent testing of security products and services, has released the results of comparative tests it conducted on Secure Service Edge, or SSE, services. Tested vendors include Cisco, Cloudflare, Fortinet, Palo Alto Networks, Skyhigh Security, Versa Networks, and Zscaler. We look at what was tested and how, highlight results, and discuss... Read more »
Effective security management has never been simple and the expanded threat landscape enhanced by AI has only widened the gap between defenders and attackers. Scott Crawford and Greg Zwakman return to discuss the managed security services market with host Eric Hanselman. Security services have been an option for enterprises since the earliest days of IT, but the need for more depth and breadth in security operations has changed market dynamics and the enterprise security calculus. Part of this shift is driven by the scope and scale of security operations. Expanded attack surfaces with more devices, more SaaS applications and hybrid infrastructure can be all the more difficult to secure. Integrated security operations patterns, like Managed Detection and Response (MDR) can provide more comprehensive services and ones that are targeted at delivering improved security outcomes, rather than just operational support. Changing security requirements are driving M&A activity, as well. Where services had been an augmentation to vendor products, some vendors now see them as a critical part of their portfolio and a key to platform aspirations. Zscaler's acquisition of Red Canary and Sophos' pick up of SecureWorks are some of the more notable transactions in this trend. Security management has shifted front of security markets. More S&P Global Content: AI for security: Agentic AI will be a focus for security operations in 2025 The evolution of security platforms – 6 centers of gravity shaping the market For S&P Global subscribers: Managed Security Services Market Monitor & Forecast For sale: MDR vendors 2025 Trends in Information Security Ending SecureWorks' search for a suitor, Sophos takes it off Dell's hands Zscaler expands its platform play into a new market by reaching for Red Canary Credits: Host/Author: Eric Hanselman Guests: Scott Crawford, Greg Zwakman Producer/Editor: Adam Kovalsky Published With Assistance From: Sophie Carr, Feranmi Adeoshun, Kyra Smith
Kendrick Trotter joins the show to talk about going from Uber driver to a major account executive at a public cybersecurity company, then founding his own business that created over $70 million in annualized salaries for underrepresented professionals.George K and George A talk to Kendrick about: How a Division I football scholarship and one life-changing Uber ride with an Amazon VP changed everything His game-changing approach to calling CISOs Building Us and Technology - training 13,000+ people for free and placing them at companies like Zscaler and Airtable The harsh reality of what happened to DEI initiatives and why diversity of thought drives 30% more revenueThe bottom line: Kendrick's story proves that with the right mindset, genuine human connection, and "unreasonable hospitality," you can break barriers and create opportunities for others.————
Aviatrix survey reveals only 8% of enterprises have effective Zero Trust — and why network security needs to catch up “Without all three legs, you don't have a stool — therefore, you don't really have Zero Trust.” — Doug Merritt, CEO, Aviatrix In a revealing interview with Technology Reseller News, Aviatrix CEO Doug Merritt joins publisher Doug Green to spotlight the cloud security gap most enterprises don't yet realize they have — and what Aviatrix is doing to solve it. Drawing on a just-released survey of 403 U.S. IT professionals, Merritt paints a sobering picture: only 8% of respondents believe they have an effective Zero Trust security stance in the cloud. While identity and endpoint protections have advanced, the third critical leg — network security — is largely missing. That gap, says Merritt, is what Aviatrix is closing with its Cloud Native Security Fabric (CNSF). Founded by a pioneering female Cisco engineer, Aviatrix brings deep roots in software-defined networking and cloud infrastructure. Today, the company is evolving into a cloud security leader by embedding inline network protection that adapts to cloud-native realities: atomized perimeters, ephemeral workloads, and increasingly complex DevOps pipelines. “The internet is now the enterprise network,” Merritt explains. “Your perimeter isn't five data centers — it's tens of thousands of ephemeral endpoints, APIs, and SaaS services.” Key insights from the podcast include: Why CNSF matters: CNSF forms the third leg of a Zero Trust framework alongside identity and endpoint security — bringing visibility, enforcement, and micro/macrosegmentation into cloud network traffic. Alarming survey findings: 2 out of 3 enterprises struggle with deploying cloud firewalls, over 50% cite visibility blind spots, and 85% report difficulties securing DevOps pipelines. Cloud threats on the rise: The shift to agentic AI and increasingly automated cyber threats make it essential to monitor east-west and egress traffic within the cloud — stopping lateral movement and command-and-control attacks before they spread. Channel opportunity: Aviatrix offers a partner-friendly CNSF solution that complements existing tools like CrowdStrike, Zscaler, Wiz, and cloud-native firewalls — with modular deployment, flexible integration, and a well-designed partner program. For organizations seeking to close their cloud network security blind spots, Aviatrix provides a free Network Security Blind Spot Assessment. And for those wanting to dig deeper, the full survey is available at aviatrix.com/resources. Learn more: https://aviatrix.com
פרק המאה השלושה עשר של ממרמיק, הפודקאסט של עמותת בוגרי ממרם. פותחים עונה חדשה עם, רענן רז וכפיר תשבי, המייסדים של אוולור שנמכרה ב350 מליון דולר ל z-scaler. דיברנו על השירות הצבאי המשותף של רענן וכפיר, על ההחלטה ללכת לעולמות הסייבר למרות ששניהם לא מהתחום וכמובן על המכירה לZScaler. מה האתגר הבא שלהם? תצטרכו להקשיב. ממרמיק - מספרים את הסיפור של הממר״מניקים! מנחים - יוסי מלמד ורועי אייזנמן
Welcome to this week's edition of “MI&S Datacenter Podcast.” Join Moor Insights & Strategy co-hosts Matt, Will, and Paul as they analyze the week's top datacenter and datacenter edge news. They talk compute, cloud, security, storage, networking, operations, data management, AI, quantum, and more! We will be talking on this week's show about: Palo Alto Networks & Okta Partnership https://x.com/WillTownTech/status/1945223993096655338 Microsoft, Atom Computing, & Magne https://www.qunorth.com AWS Summit & The Agentic Lifecycle https://www.linkedin.com/feed/update/urn:li:activity:7351302065609994240/ Zscaler's Zero Trust Solution Scales https://www.linkedin.com/posts/wstownsend_zscaler-extends-zero-trust-platform-to-enable-activity-7348392046908358658-1XcG?utm_source=share&utm_medium=member_desktop&rcm=ACoAAAAdOCkB7GSD8YuNAaXuDKP_xFHkrnLbNFk Next-Gen Naval Nav https://thequantuminsider.com/2025/07/16/q-ctrls-new-maritime-quantum-navigation-solution-successfully-undergoes-first-defense-trials-at-sea/ IBM Power11 & TAM Expansion https://www.forbes.com/sites/patrickmoorhead/2025/07/14/ibm-aims-to-expand-its-infrastructure-market-reach-with-power11/ Disclaimer: This show is for information and entertainment purposes only. While we will discuss publicly traded companies on this show. The contents of this show should not be taken as investment advice.
Welcome and Introduction- Will Townsend hosts a special standalone edition of G2 on 5G- Guests Nathan Howe and Ken Urquhart from Zscaler join the podcastZscaler Cellular Overview- Nathan explains Zscaler Cellular as the next evolution in connecting customers to Zero Trust Exchange- Enables cellular devices to connect directly to Zscaler customer policy- Provides zero trust controls and protection for cellular-connected devices globallyImplementation and Innovation- Ken highlights the straightforward yet innovative implementation using SIM technology- Eliminates need for client software or network modifications- Enables zero trust cybersecurity from the transmitter back to the InternetEnd Device Applications- Nathan discusses diverse applications, from vending machines to prisoner ankle trackers- Three main areas: headless devices, direct to Internet, and secure remote access- Unique position in brokering connections through Zscaler policy engineScalability and Device Support- Ken confirms Zscaler's ability to handle massive numbers of devices- Processes over 600 billion transactions daily with room for growth- Supports high-bandwidth applications like 4K video and remote equipment operationConsumer and Enterprise Applications- Discussion of potential consumer uses, focusing on enterprise user benefits- Multi-carrier roaming capabilities for global connectivity- Customizable data plans and pricing options for various customer needsAvailability and Contact Information- General availability announced for August 1st- Customers can reach out via sim_srm@zscaler.com for inquiries and partnershipsSecurity and Privacy Considerations- Potential for anonymizing connections through Zscaler exchange- Emphasis on proper use and adherence to local lawsClosing Remarks- Zscaler Cellular provides additional layer of protection beyond 5G encryption- Hosts encourage audience engagement and feedback for future topics
En este episodio hablamos de los eventos más relevantes relacionados a los mercados financieros de Estados Unidos durante la semana laboral que terminó el jueves 3 de julio de 2025.En la empresa de la semana hablamos de Zscaler $ZS (06:50)Y en la sección educativa hablamos sobre el Big Beautiful Bill (10:36)Les dejo la liga a nuestro canal de youtube donde podrán encontrar los audiogramas y videos educativos: https://www.youtube.com/channel/UC6thsV8Y_m2DgYPOqjLVfSQY también dejo la liga del blog donde estaremos subiendo las transcripciones de los episodios: www.ramonlog.com
The entrepreneur grew up in a small village in the foothills of the Himalayas with no electricity.He went on to found a cloud-based cyber-security company with a value of $47 billion, trying to protect digital data for businesses and governments. Jay Chaudhry tells us about his daily battle to stay ahead of the “bad guys”.Presenter: Will Bain Producer: Amber Mehmood(Image: Jay Chaudhry giving the keynote speech at Zenith Live. Credit: Zscaler)
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-401
In this episode, Mandy Logan, Summer Craze Fowler, Jason Albuquerque, and Jeff Pollard of Forrester discuss the challenges and strategies for CISOs in navigating volatility in the security landscape. They emphasize the importance of building relationships within the organization, particularly with the CFO, to manage budgets effectively. The conversation also covers the significance of communicating security needs in terms of compliance and customer requirements, maximizing budget through flex spending, and the role of automation and AI in enhancing security operations. Additionally, they highlight the need for effective data management to reduce costs and improve efficiency. In pre-recorded interviews from RSAC, learn the following! With the power of zero trust and AI, Zscaler help organizations strengthen and automate IT and security, reduce costs, and minimize complexity. Zscaler helps reduce the attack surface, block threats via full TLS inspection, and eliminate lateral threat movement. This segment is sponsored by Zscaler. Visit https://securityweekly.com/zscalerrsac to learn more about them! The modern workspace, increasingly reliant on cloud-based applications, browser-first access, and AI integration, faces significant security challenges that outpace the capabilities of traditional tools. Legacy solutions, including VPNs and even early ZTNA implementations, are proving vulnerable to sophisticated attacks leading to data breaches and operational disruptions. The fundamental shift in how we work demands a new approach, one that closes the gaps left by the platform approach. We need the ability to 'trust nothing and click on anything with zero risk.' We need to take zero trust beyond the network that we operate and control. Future of Browser Security Webinar with Google: https://www.menlosecurity.com/resources/2025-prediction-the-future-of-browser-security-lessons-from-the-pioneers Browser security report: https://www.menlosecurity.com/resources/state-of-browser-security-report Global Cyber Gangs report: https://www.menlosecurity.com/resources/global-cyber-gangs-supported-and-sheltered-by-state-sponsors-and-getting-smarter-every-day-report Everywhere Access White Paper: https://www.menlosecurity.com/resources/everywhere-access-the-zero-trust-revolution-for-hybrid-work-white-paper This segment is sponsored by Menlo Security. Visit https://securityweekly.com/menlorsac to learn more about them! Show Notes: https://securityweekly.com/bsw-401
In this episode of Great Leaders UK, we sit down with Alice Carlisle, VP UK&I at Wiz, to uncover how she rose from first-line leader to one of the most sought-after roles in the cybersecurity industry. From taking a struggling ZScaler team and transforming it in under three quarters, to embodying Wiz's values of confidence and humility, Alice's journey is proof that authenticity and unrelenting work ethic drive lasting impact. She delves into the hard lessons of leading through fear-based tactics early in her career, learning the Force Management Playbook at AppDynamics, and then applying it to close LogicMonitor's largest deal ever. Ultimately, we focus on how Alice builds culture, leading by example, caring genuinely for people, and creating internal champions, so that teams win together, not just as individuals. Whether you're scaling a hyper-growth sales org, building a new culture, or simply looking to be a better human in leadership, Alice's playbook is packed with actionable insights on driving growth through customer success and winning with authenticity.
All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is our sponsored guest, Sam Curry, global vp, CISO at Zscaler. This episode was recorded at a Zscaler event in Boston, MA. In this episode: Guardrails for decision making under fatigue Preparing for quantum threats Strategic use of generative AI Reassessing outdated knowledge Huge thanks to our sponsor, Zscaler Zscaler is a cloud-based cybersecurity company that provides secure internet access and private application access. Its platform replaces traditional network security by delivering Zero Trust architecture, protecting users, data, and applications regardless of location. Zscaler's scalable services help organizations modernize IT and reduce risk with seamless, cloud-native security solutions.
High-profile cyberattacks on major organisations are a stark reminder: the digital world is under constant threat.For every vulnerability fixed, a dozen more are found, so can the cybersecurity industry evolve to face these threats, or is it fighting a losing battle?Zscaler's Christian Bailey joins the conversation to unpack the weak points to prioritise, who's REALLY at fault for breaches, and what it truly means todefend against an invisible enemy…Don't miss this discussion, which sets the critical context for how AI might become our most formidable ally, a topic we'll explore in the follow-up to this special two-parter.In this episode, we cover:The shift from traditional network security to a zero trust modelContinuous employee education and training on cybersecurity risks, particularly with emerging AI technologies The growing complexity of securing interconnected systemsData prioritisation and automation in cybersecurityChristian Baileyhttps://www.linkedin.com/in/baileyce/Colt Technology Serviceshttps://www.colt.net/https://www.linkedin.com/company/colt-technology-services/https://www.instagram.com/colttechnologyservices/
Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public internet, if security standards in telecoms are important, and what security trends we will see in enterprise networking in five years' time.
Today, we're talking to Phil Tee, EVP & Head of AI Innovation at Zscaler. We discuss why agentic AI will change everything about the way we use technology, what it will look like to fully team up with autonomous technology, and why intelligence itself might be more malleable than we ever thought. All of this right here, right now, on the Modern CTO Podcast! To learn more about Zscaler, check out their website here.
Send us a textTim and Chris discuss major cybersecurity acquisitions and innovations, examining how these changes will impact enterprise security and cloud architecture.• Zscaler acquires Red Canary MDR (Managed Detection and Response) to fill gaps in their platform despite potential integration challenges• AWS Network Firewall now supports multiple VPC endpoints without requiring Transit Gateway deployment• AWS exits the private 5G market, pivoting to partnerships with established telecommunications providers• CheckPoint acquires Veritai Cybersecurity to enhance their Infinity platform with "virtual patching" capabilities• North Korean IT workers using sophisticated techniques to infiltrate Western companies by posing as legitimate remote employeesCheck the news document for additional stories we didn't have time to cover, including a project called MPIC focused on preventing BGP attacks with certificate validation.Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
The cybersecurity company saw its stock shoot up 10% on Friday. Is that dumb luck or something more? (00:21) Andy Cross and Asit Sharma discuss May's market bounce, plus earnings from ZScaler and Ulta Beauty. Companies discussed: ZS, NOW, ULTA, ELF Host: Andy Cross Guest: Asit Sharma Producer: Anand Chokkavelu Engineer: Dan Boyd Advertisements are sponsored content and provided for informational purposes only. The Motley Fool and its affiliates (collectively, "TMF") do not endorse, recommend, or verify the accuracy or completeness of the statements made within advertisements. TMF is not involved in the offer, sale, or solicitation of any securities advertised herein and makes no representations regarding the suitability, or risks associated with any investment opportunity presented. Investors should conduct their own due diligence and consult with legal, tax, and financial advisors before making any investment decisions. TMF assumes no responsibility for any losses or damages arising from this advertisement. Learn more about your ad choices. Visit megaphone.fm/adchoices
Cybersecurity has become top of mind for Fortune 500 companies, and yet attacks, breaches, and other incidents keep happening. Can companies really prevent cyber risks, and what approach should they be taking? Join David Young and guest Jay Chaudhry, CEO, chairman, and founder of Zscaler, to find out the three lessons his parents taught him, why Zscaler has a customer obsession, and why zero trust architecture is critical for today's cyber approach. This Leadership in Challenging Times discussion is featured as a C-Suite Perspectives podcast and a special CED Policy Watch Webcast. Leadership in Challenging Times features timely and insightful discussions with the outstanding CEOs who are recipients of CED's Distinguished Leadership Awards. Business leader honorees discuss the unprecedented challenges facing the nation and how they are helping chart a path forward for both their companies and communities in which they operate. For more from The Conference Board: CED Announces Recipients of Its 2025 Distinguished Leadership Awards CED Distinguished Leadership Awards Celebration CED Report on Securing Cyberspace
Donald Trump betont in einem Post auf Truth Social, dass die Handelsgespräche mit China nicht gemäß den Erwartungen verlaufen. Man sei bei den Gesprächen in Genf „Mr. Nice Guy“ gewesen, während sich China an die dort getroffenen Absprachen nun absolut nicht halten würde. Die Wall Street leidet unter diesen Kommentaren genauso, wie unter den zumeist negativen Reaktionen auf die seit gestern Abend gemeldeten Quartalszahlen. Bis auf die Aktien von Zscaler und Ulta Beauty, tendieren Dell, Marvell Technology, NetApp, Elastica, Costo und insbesondere GAP schwächer. Abonniere den Podcast, um keine Folge zu verpassen! ____ Folge uns, um auf dem Laufenden zu bleiben: • X: http://fal.cn/SQtwitter • LinkedIn: http://fal.cn/SQlinkedin • Instagram: http://fal.cn/SQInstagram
Werbung | Handelsblatt mit 30 % Rabatt – exklusiv für unsere Hörer: Sichert euch jetzt das Handelsblatt – gedruckt oder digital – für 12 Monate mit 30 % Rabatt. Alle Infos zum Angebot findet ihr unter: www.handelsblatt.com/wallstreet30 Donald Trump betont in einem Post auf Truth Social, dass die Handelsgespräche mit China nicht gemäß den Erwartungen verlaufen. Man sei bei den Gesprächen in Genf „Mr. Nice Guy“ gewesen, während sich China an die dort getroffenen Absprachen nun absolut nicht halten würde. Die Wall Street leidet unter diesen Kommentaren genauso, wie unter den zumeist negativen Reaktionen auf die seit gestern Abend gemeldeten Quartalszahlen. Bis auf die Aktien von Zscaler und Ulta Beauty, tendieren Dell, Marvell Technology, NetApp, Elastica, Costo und insbesondere GAP schwächer. Ein Podcast - featured by Handelsblatt. +++Erhalte einen exklusiven 15% Rabatt auf Saily eSIM Datentarife! Lade die Saily-App herunter und benutze den Code wallstreet beim Bezahlen: https://saily.com/wallstreet +++ +++EXKLUSIVER NordVPN Deal ➼ https://nordvpn.com/Wallstreet Jetzt risikofrei testen mit einer 30-Tage-Geld-zurück-Garantie!+++ +++ Alle Rabattcodes und Infos zu unseren Werbepartnern findet ihr hier: https://linktr.ee/wallstreet_podcast +++ Der Podcast wird vermarktet durch die Ad Alliance. Die allgemeinen Datenschutzrichtlinien der Ad Alliance finden Sie unter https://datenschutz.ad-alliance.de/podcast.html Die Ad Alliance verarbeitet im Zusammenhang mit dem Angebot die Podcasts-Daten. Wenn Sie der automatischen Übermittlung der Daten widersprechen wollen, klicken Sie hier: https://datenschutz.ad-alliance.de/podcast.html
A jam-packed session unfolds across DC, earnings, and the broader market. Our Megan Cassella breaks down the political fallout from the latest tariff ruling, while Neuberger Berman CIO Joseph Amato explains why the market favors small and mid-cap names. On the earnings front, we hear from Dell, Marvell, Zscaler, Ulta Beauty, American Eagle, and Gap. Retail analyst Dana Telsey reacts to the retail names and what they reveal about the consumer. Eric Sheridan of Goldman Sachs weighs in on the tech sector's trajectory after another earnings wave. CEO Joanna Geraghty on the new partnership with United
This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices
This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda's latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They also discovered two custom keyloggers, PAKLOG and CorKLOG, and an EDR evasion tool, SplatCloak, highlighting the group's focus on surveillance, persistence, and stealth in cyberespionage operations.4o. The research can be found here: Latest Mustang Panda Arsenal: ToneShell and StarProxy | P1 Latest Mustang Panda Arsenal: PAKLOG, CorKLOG, and SplatCloak | P2 Learn more about your ad choices. Visit megaphone.fm/adchoices
Vi får besøg af Casper Klynge - Danmarks første techambassadør og tidligere europæisk Microsoft-topchef. I dag sidder han i toppen af cybersikkerhedsfirmaet Zscaler. Vi taler om Microsoft, der nu - på ordre fra Washington - angiveligt har lukket chefanklagerens mailkonto ved Den Internationale Straffedomstol, ICC, i Haag. Er det her den smoking gun, der viser, at Trump kan lamme Europa teknologisk, hvis han vil? Dernæst ser vi på jagten efter generel kunstig intelligens - AI, der kan alt, hvad mennesker kan. Musk, Altman og co. mener, det sker lige om lidt. Måske allerede i år. Men en ny artikel i New York Times stiller spørgsmål ved hele idéen. Til at hjælpe os med at skille drøm fra virkelighed har vi Serge Belongie i studiet - professor i datalogi på KU og leder af Pioneer Centre for AI. Til sidst vender vi Trumps charmeoffensiv i Mellemøsten. Med sig havde han en stribe techbosser såsom Nvidias Jensen Huang og Sam Altman. Turen handler om milliarder, mikrochips og AI-datacentre midt i den varme ørken - men også om at isolere Kina. Værter: Marcel Mirzaei-Fard, techanalytiker, og Casper Klynge, vicepræsident i Zscaler.
In this episode, Misha Kuperman, Chief Reliability Officer at Zscaler joins the podcast to discuss the past and recent developments in enterprise networking, whether the current geopolitical situation has had any impact on the way enterprises think about security, what's behind the ‘zero trust' concept and how this works in real life.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Researchers at Trend Micro have uncovered a new campaign by the Fog ransomware group, notable for its use of DOGE-themed ransom notes aimed at mocking victims rather than just extorting them.In the wake of May 2024's Operation Endgame, which dismantled some of the most prominent malware droppers such as IcedID, Pikabot, SystemBC, Smokeloader, and Bumblebee, law enforcement agencies across Europe and North America have moved into a new phase targeting end users of these platforms.Zscaler researchers have recently observed Mustang Panda—also known by aliases like Bronze President, Stately Taurus, and TA416—upgrading its toolset as part of an ongoing espionage campaign, with a recent operation targeting an organization in Myanmar. Atomic macOS Stealer (AMOS), identified as one of the most impactful macOS-targeting infostealers of 2024, leverages deceptive application installers and phishing tactics to gain access to victim machines.
In this episode, Avanish and Mike discuss:Mike's journey from his early tech roots in Silicon Valley to his role as CRO at Zscaler, including his transformative work growing ServiceNow from $500M to $6B in the Americas regionThe importance of always viewing platform strategy through the customer's lens - helping them achieve outcomes rather than managing multiple point solutionsHow a successful platform requires breaking down silos not just within your own organization, but often within your customer's organizationThe "one team" concept of the three-legged stool: customer, vendor, and partner, all working together toward shared successWhy ecosystem partners are mission-critical, providing industry expertise and customer insights that vendors can't replicateThe role of security in enabling productive AI adoption, with Zscaler helping customers leverage generative AI safely at scaleHow to develop meaningful metrics with partners beyond just pipeline generation, focusing on mutual success plans and regular reviewsThe importance of playing the long game with partners - "It's not how you behave when things are going great, it's how you behave when things hit the fan"Host: Avanish SahaiAvanish Sahai is a Tidemark Fellow and has served as a Board Member of Hubspot since April 2018 and of Birdie.ai since April 2022. Previously, Avanish served as the vice president, ISV and Apps partner ecosystem of Google from 2019 until 2021. From 2016 to 2019, he served as the global vice president, ISV and Technology alliances at ServiceNow. From 2014 to 2015, he was the senior vice president and chief product officer at Demandbase. Prior to Demandbase, Avanish built and led the Appexchange platform ecosystem team at Salesforce, and was an executive at Oracle and McKinsey & Company, as well as various early-to-mid stage startups in Silicon Valley.About Mike RichMike Rich is a highly accomplished technology sales professional with a career spanning more than 30 years.During his tenure as President, Americas at ServiceNow from 2011–2023, Mike played a pivotal role in the company's success. Under his leadership, the AMS region experienced unprecedented revenue growth, catapulting from $500 million to $6 billion+.Mike focused on initiatives like vertical industries that enabled customer-facing teams to partner closely with customers. During his time, the company's overall growth skyrocketed from $80 million to $8 billion. Throughout his career, Mike has kept customer satisfaction as the north star, ensuring that every business decision aligns with the goal of providing unparalleled value to clients and career advancement for employees.Before ServiceNow, Mike held leadership roles at enterprise software companies Borland, Rational Software, and Kana.Mike's leadership philosophy revolves around building diverse teams that prioritize achieving desired mutual outcomes. His passion is fostering environments where collaboration, mutual respect, and teamwork are paramount.About TidemarkTidemark is a venture capital firm, foundation, and community built to serve category-leading technology companies as they scale. Tidemark was founded in 2021 by David Yuan, who has been investing, advising, and building technology companies for over 20 years. Learn more at www.tidemarkcap.com.LinksFollow our guest, Mike RichFollow our host, Avanish SahaiLearn more about Tidemark
April 17, 2025: Ryan Winn, CISO at AdventHealth, and Tamer Baker, Healthcare CTO at Zscaler, discuss zero-trust solutions and questions in this webinar recording. The conversation explores AdventHealth's remarkable four-month implementation journey and the surprising benefits beyond security they've discovered. They discuss practical approaches to medical device security, strategies for gaining organization-wide buy-in, and why framing security initiatives as business enablers rather than technical mandates leads to success. As healthcare organizations face mounting technical debt and evolving threats, this discussion offers a refreshing roadmap to simplification and a more secure environment. Key Points: 08:48 Zero Trust Hospital: Concepts and Implementation 13:42 Challenges and Opportunities in Zero Trust 21:19 The Impact of Zero Trust on Patient Care 27:49 Implementing Zero Trust 33:58 Final Thoughts and Q&A Want to get your copy of the new book "Zero Trust Hospital: The CXO Vision" by Zscaler? Order now X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
In this episode of Tech Talks Daily, I sit down with Marc Lueck from Zscaler to explore a security mindset shift that more businesses are beginning to embrace. The conversation revolves around the "Resilient by Design" principle, which encourages organizations to stop relying on reactive threat detection and start building systems that anticipate risk and limit impact from the outset. Marc explains how today's cyber landscape demands more than traditional firewalls and legacy systems. He breaks down why Zero Trust should no longer be seen only as a remote access solution, but as a consistent, context-driven access model for all environments. From on-premises communication to lateral traffic between applications, Marc outlines how this model helps reduce vulnerabilities and prevent attacker movement inside the network. We also dive into the challenges posed by AI-driven attacks, where phishing, malware, and reconnaissance are increasingly automated and customized to each target. With these tactics becoming more advanced, Marc stresses the importance of shifting away from pattern-based detection toward a strategy based on real-time context and intent. He shares insights into Continuous Threat and Exposure Management (CTEM), a new class of tools that help security teams understand where problems are likely to occur before they happen. This proactive focus is key to designing systems that are resilient under pressure, rather than relying on alerts after the fact. From his analogies of planning for hurricanes rather than rainstorms, to his thoughts on legacy systems and the future role of automation in threat response, Marc offers a practical look at what resilient infrastructure truly involves. So the question is, are your systems designed to recover and continue when something breaks, or are they waiting for the next emergency to arrive? Let's find out.
Welcome and Introduction- Will Townsend and Anshel Sag discuss the latest insights on 5G technology.- Episode 221 of G2 on 5G, covering six topics in about 20 minutes.AT&T and Celona Partnership for Neutral Host- Announcement of AT&T and Celona collaboration for neutral host solutions.- Discussion on the viability and monetization of neutral host technology.- Stanford Healthcare highlighted as a use case for private networking and neutral host solution.HP Go's New Connected PC 5G Experience- Introduction of HP Go's connected PC 5G experience announced at HP Amplify.- Multi-carrier solution integrating AT&T, Verizon, and T-Mobile services.- Simplified activation process and management for IT departments.Dallas Cowboys and AT&T's Dynamic Defense- Exploration of the Dallas Cowboys' implementation of AT&T's Dynamic Defense.- Discussion on the importance of security for high-profile sports franchises.- Emphasis on the layered approach to security and complementary controls.Disney and T-Mobile 5G Collaboration- T-Mobile 5G used in the production of Disney's new Lilo and Stitch live-action film.- Benefits of 5G in film production, including improved speed and cost-efficiency.- Discussion on the long-standing relationship between Disney and T-Mobile.T-Mobile and Zscaler Partnership for Mobile Network Security- T-Mobile partners with Zscaler to enhance overall mobile network security.- Importance of layered security approach in mobile networks.- Discussion on the significance of digital experience monitoring for subscribers.Hyundai's Smart Factory in Georgia- Hyundai opens a massive smart factory in Georgia, leveraging 5G and AI technologies.- Overview of the factory's capabilities, including production capacity and automation features.- Discussion on the future of manufacturing and the role of automation in the automotive industry.Closing Remarks- Invitation for viewers and listeners to reach out about specific 5G topics for future podcasts.- Contact information provided for Will Townsend and Anshel Sag on social media.
Before Zscaler was a $32B cloud security giant, it was just 10 engineers—half in Bangalore, half in a borrowed U.S. office.As founder and CEO of Zscaler, Jay Chaudhry bet $50M of his own money on one radical idea: secure the internet in the cloud.Born in a Himalayan village with no electricity, he built Zscaler into one of the world's top cybersecurity giants.In this episode, Jay breaks down why 50% of the Fortune 500 trusts Zscaler, why he still interviews candidates, and how he's incubating the company's next big AI bet.Chapters:00:00 Trailer00:42 Introduction01:21 His fifth company04:26 Entrepreneurs' existential fear10:53 Customer engagement and new innovations12:46 No private jets, no business class19:34 “I never used money”23:38 Born and raised in India26:17 Hiring legends30:35 Walking on water35:09 “Dolphining”39:55 Areas of weakness42:11 Passionate even on the weekends44:56 Work during roller coasters47:35 The weight of the world is on your shoulders49:21 Leveraging AI56:20 OutroMentioned in this episode: Elon Musk, Microsoft, Bill Gates, BlackBerry, Steve Ballmer, Satya Nadella, Hewlett-Packard (HP), IBM, John Fellows Akers, Steve Jobs, NeXT, Inc., Linux, Cisco, United Airlines, San Francisco International Airport, Sundar Pichai, Ravi Mhatre, Lightspeed Venture Partners, Six Flags, AI (artificial intelligence), securityLinks:Connect with JayLinkedInConnect with JoubinXLinkedInEmail: grit@kleinerperkins.com Learn more about Kleiner Perkins
S3E3: What's Trending NOW is HIMSS25 in Las Vegas. Host Shahid Shah recorded live with Tamer Baker, CTO and Steve Hajny, Healthcare Principal Sales Engineer from Zscaler. Tamer and Steve discuss their recently released e-books on Zero Trust for hospitals. https://www.zscaler.com/ To stream our Station live 24/7 visit www.HealthcareNOWRadio.com or ask your Smart Device to “….Play Healthcare NOW Radio”. Find all of our network podcasts on your favorite podcast platforms and be sure to subscribe and like us. Learn more at www.healthcarenowradio.com/listen
Scott Wapner and the Investment Committee debate the latest tariff news and what it means to the market and your money. Plus, the desk discusses financials as Jefferies falls after releasing negative guidance. And later, Josh Brown says Zscaler is on the verge of a breakout, it's one of the stocks he has on his “Best Stocks in the Market” list.Investment Committee Disclosures
Today, we're talking to Sam Curry, Global VP, CISO in Residence at Zscaler. We discuss the AI threat landscape in 2025, why fighting AI with AI may not be your best strategy, and how to position yourself in a community to become a better leader. All of this right here, right now, on the Modern CTO Podcast! To learn more about Zscaler, check out their website here. Produced by ProSeries Media: https://proseriesmedia.com/ For booking inquiries, email booking@proseriesmedia.com
March 14, 2025: This is the sixth episode of the Zero Trust Hospital Series. Tamer Baker, Healthcare CTO at Zscaler, explores the critical aspects of promoting a zero-trust culture in healthcare organizations. How can healthcare leaders effectively communicate the strategic value of zero trust to their boards? What approaches yield the best results when tailoring messages to different stakeholders like CNOs and CMOs? The conversation delves into the transformative impact of zero trust on mergers and acquisitions, potentially reducing integration time while enhancing security. Want to get your copy of the new book "Zero Trust Hospital: The CXO Vision" by Zscaler? Pre-Order nowDon't miss our webinar after all six Zero Trust Hospital Series episodes! Register now: www.thisweekhealth.com/zerotrustKey Points:01:03 Communicating Zero Trust to the Board03:34 Engaging Internal Stakeholders09:32 The Avalanche Effect of Zero TrustSubscribe: This Week HealthTwitter: This Week HealthLinkedIn: This Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Former Ford CEO Mark Fields weighs in what the one-month delay in auto tariffs means for the stocks. Former Boston Fed President Eric Rosengren breaks down the Beige Book, jobs, and Fed policy after the latest economic data. Vital Knowledge's Adam Crisafulli and Wilmington Trust's Meghan Shue analyze the market landscape, and we cover key earnings from Marvell, MongoDB, Victoria's Secret, and Zscaler. Plus, Christopher Rolland of Susquehanna on Marvell's earnings.
Guest: George Kurian, CEO of NetAppFor almost 10 years, George Kurian has been CEO of the data infrastructure firm NetApp, overseeing its pivot to cloud services. After he took the job — a surprise promotion dropped on him just days before it was announced — he had to learn on the job how the job could be.“ There are a lot more stakeholders that a CEO has to deal with than a chief product officer,” George says, referring to his previous role. “There's also a lot more external commitment ... It was a really all-consuming effort to get the company turned around.”He said the CEO job can be “fairly lonely” because you may want to be peers or friends with your team and your board — but in fact, they are sometimes your subordinates and your superiors, respectively.“ We wouldn't be here without others having contributed significantly on the journey,” George says. “[But] there are times when you have to step back and say, ‘I see a pattern that my team is not seeing,' or ‘Do I think that we can do a better job than we are doing?'”Chapters:(01:10) - Commuting to Sunnyvale (04:49) - Growing up in India (08:04) - Protect the child (09:33) - Raising kids in Silicon Valley (12:44) - Money motivation (15:04) - NetApp's renaissance (21:39) - Writing new chapters (23:15) - Culture shifts (26:38) - Coming to NetApp (29:41) - Surprise! You're the CEO (32:41) - Making sacrifices (35:04) - Work vs. family tension (37:18) - Doubt & lonely decisions (42:38) - The data wave (45:27) - Enterprise AI (51:36) - Starting your own company (53:33) - Navigating difficulty (56:28) - Who NetApp is hiring (57:11) - What “grit” means to George Mentioned in this episode: EMC, OpenAI, DeepSeek, CalTrain, the San Francisco 49ers, Princeton University, Subway, Vons, Thomas Kurian, Google Cloud, Stanford University, Brian Cox, Oliver Jay, the Quakers, Jay Chaudhry, zScaler, Manmohan Singh, Oracle, IBM, Sun, Amazon, Microsoft, Glean, Kobe Bryant, Steph Curry, McKinsey, Akamai, Cisco, Gwen McDonald, and the San Francisco Friends School.Links:Connect with GeorgeLinkedInConnect with JoubinTwitterLinkedInEmail: grit@kleinerperkins.com Learn more about Kleiner PerkinsThis episode was edited by Eric Johnson from LightningPod.fm
February 28, 2025: This is the fifth episode in the Zero Trust Hospital Series. Tamer Baker, Healthcare CTO at Zscaler, covers the first steps hospitals can take in their zero trust journey. Through practical insights, Tamer challenges traditional security thinking, demonstrating how organizations can achieve significant risk reduction even on day one, all while maintaining operational efficiency. Key Points:02:18 Step Zero: Identity Management03:44 Step One: Visibility07:15 Zero Trust Maturity Models09:13 High-Risk Users and Remote AccessWant to get your copy of the new book "Zero Trust Hospital: The CXO Vision" by Zscaler?Pre-Order nowDon't miss our webinar after all six Zero Trust Hospital Series episodes! Register now: www.thisweekhealth.com/zerotrustSubscribe: This Week HealthTwitter: This Week HealthLinkedIn: This Week HealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer
February 21, 2025: This is the fourth episode in the Zero Trust Hospital Series. Tamer Baker, Healthcare CTO for Zscaler, dives into the myths surrounding zero trust implementation in healthcare settings. As healthcare systems grapple with digital transformation, what really stands between organizations and successful zero trust adoption? Through their discussion of real-world examples and strategic partnerships, they challenge conventional wisdom about vendor relationships and implementation timelines. Want to get your copy of the new book "Zero Trust Hospital: The CXO Vision" by Zscaler?Pre-Order nowDon't miss our webinar after all six Zero Trust Hospital Series episodes! Register now: www.thisweekhealth.com/zerotrustKey Points:01:36 Zero Trust Implementation04:45 Vendor Myths 08:47 Healthcare Operations