Zscaler has published its Zscaler ThreatLabz 2025 Phishing Report, analyzing over two billion blocked phishing attempts between January and December 2024 captured by the Zscaler Zero Trust Exchange, the world’s largest cloud security platform. The annual report exposes how cybercriminals are using Generative AI to launch surgical, targeted attacks againstRead More…

Zscaler has published the Zscaler ThreatLabz 2025 VPN Risk Report, commissioned by Cybersecurity Insiders, which highlights the widespread security, user experience and operational challenges posed by VPN services. The findings are based on insights from a survey of 600+ IT and security professionals. The results are stark: maintaining security andRead More…

Zscaler  has announced the introduction of Zscaler Asset Exposure Management, designed to advance how organizations manage their asset risk, commonly referred to as Cyber Asset Attack Surface Management (CAASM). Serving as a critical foundation for Zscaler’s broader Continuous Threat Exposure Management (CTEM) offerings, this innovative solution consolidates and correlates dataRead More…

Zscaler has announced its participation in LEAP 2025 from February 09-12, 2025, at the Riyadh Exhibition & Convention Center, Malham. Zscaler is located in Hall 3, Stand C40, under the theme “Zero Trust Meets AI” to showcase its cutting-edge Zero Trust Exchange platform and AI-driven innovations. As a pioneer ofRead More…

Zscaler is now offering customers its Zero Trust Network Access (ZTNA) service, natively integrated within RISE with SAP. Zscaler Private Access (ZPA) for SAP, delivered through the Zscaler Zero Trust Exchange platform, helps enable SAP customers with on-prem ERP workloads to simplify and de-risk their cloud migration, without the complexityRead More…

Zscaler has announced that Nokia is deploying the Zscaler Zero Trust Exchange platform to enhance its security, operational efficiency, and cloud capabilities. The Zscaler platform is a cloud-native security solution that connects users directly to applications and workloads without exposing the corporate network, thereby reducing the attack surface and enhancingRead More…