InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Security Webinar: F5 BIG-IP Breach

Presented by

Sam Curry, CISO, Zscaler | Joby Menon, VP Product Management, Zscaler

About this talk

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive regarding a security breach to F5. According to the directive, nation-state threat actors broke into F5 systems and stole sensitive data including source code and information about undisclosed vulnerabilities in their BIG-IP products. This is the latest in a string of attacks on exposed IT and security infrastructure, and the breached data threatens to lead to future attacks on these tools. This trend underscores the need for a Zero Trust architecture that reduces the attack surface and enforces least-privilege access. Join Zscaler leaders for a security webinar to: 1. Understand the scope of the F5 breach and ongoing threats 2. Know how to assess and remediate any exposure 3. Learn best practices for protecting your organization using zero trust
Zscaler

Zscaler

32364 subscribers252 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics