InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The State of Encrypted Attacks

Presented by

Deepan Desai, CISO & VP Security Research Data Protection Zscaler Mark Brozek, Sr. Product Marketing Manager at Zscaler

About this talk

In a recent study, the Zscaler ThreatLabz research team observed a 314% year-over-year increase in attacks over encrypted channels—a nearly 260 percent increase from the year before. Security teams should take note: cybercriminals are increasingly savvy with their attack tactics, and regularly encrypt their communications to take advantage of lax security controls and gain access to sensitive data. Unfortunately, inspecting encrypted traffic can be prohibitively expensive and cause huge performance issues for companies using legacy security infrastructure. Join Deepen Desai, Zscaler CISO and VP of Threat Research, as he reveals the staggering findings of this study of over 20 billion blocked threats. Learn all about changes in the encrypted threat landscape, including: - The most targeted industries and geographies - Top attack vectors and tactics - Prevalent threat families - Strategies for stopping encrypted threats - How Zscaler inspects encrypted traffic at scale as part of a holistic zero trust strategy
Zscaler

Zscaler

33115 subscribers252 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics