Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    Zscaler Uses Integrated Platform to Combat Ransomware

    Zscaler’s CISO discusses trends in ransomware – and how to combat this malicious technology.

    By
    Zeus Kerravala
    -
    August 15, 2022
    Share
    Facebook
    Twitter
    Linkedin
      compliance and security

      Ransomware is on the rise and it’s coming from multiple sources. Additionally, whether the goal is to collect ransom for data or disrupt a company’s supply chain, these attacks are growing in sophistication.

      Zscaler is a security company that closely follows existing and emerging cyberthreats. Zscaler’s  Zero Trust Exchange is a security cloud that processes more than 200 billion transactions and 150 million blocked attacks daily. This integrated platform of services protects users and workloads using zero trust, which involves applying security policies to control access.

      In a recent ZKast, I discussed the evolution of ransomware and other cyberthreats with Deepen Desai, Chief Information Security Officer and VP of Security Research at Zscaler. Desai also explained how Zscaler’s security research arm, ThreatLabz, uses insights from the Zero Trust Exchange to understand emerging threats and improve its platform. Highlights of the ZKast interview, done in conjunction with eWEEK eSPEAKS, are below.

      Also see: Secure Access Service Edge: Big Benefits, Big Challenges

      • ThreatLabz consists of more than 100 security experts located in seven countries across the globe. Their job is to track the evolving threat landscape through the Zero Trust Exchange. Zscaler has aligned its ThreatLabz team across four critical stages of the attack chain:
      • The first group is focused on the initial delivery vector, where the attackers are trying to gain entry into a company’s environment. This team proactively tracks phishing campaigns, drive-by download attacks, and malicious websites where attacks start.
      • The second group is responsible for vulnerability exploit coverage. There are often gaps when patching is applied to systems, creating a window of opportunity for attackers. This group reduces that window by adding detections for organizations that are applying patches.
      • The third group is responsible for malware tracking—both crimeware and other malware families. The team comes across half a million unique payloads every day. It leverages artificial intelligence (AI) and automation to process a large volume of malware payloads.
      • The fourth group is focused on the command and control stage. When a system gets infected, it attempts to communicate with the attacker’s server. The team has developed automation that emulates this activity and provides access to real-time intelligence to block the attack.
      • ThreatLabz has observed several trends since the start of COVID-19. Early in the pandemic, the focus was on remote work. Many organizations were vulnerable to attacks due to having to support a large remote workforce. Now, the focus has shifted to hybrid work, with apps and workloads residing in public clouds.
      • Ransomware continues to be one of the more prevalent threats, despite law enforcement and government crackdown. Over the last three years, attackers have been using tools and tactics to target organizations by encrypting data and demanding ransom. Even if an organization is able to recover from backups, stolen data can remain in the hands of cybercriminals. This is the case with double extortion attacks.
      • Zscaler’s recently published 2022 ThreatLabz State of Ransomware Report found an 80 percent increase in ransomware attacks year-over-year. This is a new record for both the volume of attacks and the cost of damages. Eight out of the top 11 ransomware families are leveraging ransomware as a service (RaaS), where non-technical threat actors use infrastructure to launch attacks.
      • The other trend examined in Zscaler’s report is a rise in supply chain attacks that inflict significant damage on organizations. Historically, supply chain attacks took advantage of geopolitical conflicts like the latest Russia-Ukraine war. Going forward, Zscaler predicts an increase in more sophisticated ransomware that targets supply chains.
      • Phishing as a service (PhaaS) is also becoming more popular. Similar to what’s happening in ransomware, threat actors are rebranding themselves to get around the government and regional crackdowns on cybercrime. That’s why every organization should have a response plan in place to proactively deal with these threats.
      • Organizations that want to protect themselves from ransomware should first reduce the external attack surface by not being visible to threat actors. Second, they should prevent compromise by applying consistent security policies using technologies like sandboxing browser isolation. Third, they can decrease the attacker’s blast radius by implementing micro segmentation.
      • Zscaler offers endpoint deception, which reduces the blast radius and blocks insider threat activity or compromised activity as the attack is happening. If a user tries to access an app, they’re redirected to a decoy farm and all access to critical apps is cut off. It’s an effective way to protect against ransomware by deceiving threat actors into thinking they’re going after the corporate environment.
      • Zscaler takes a platform approach with endpoint deception by providing it as a “one click” option integrated with existing deployments. Zscaler is able to protect against the loss of data across all users and locations—including workloads running in the public cloud—through full inline secure sockets layer (SSL) inspection.

      Also see: Top Digital Transformation Companies

      Zeus Kerravala
      https://zkresearch.com/
      Zeus Kerravala is an eWEEK regular contributor and the founder and principal analyst with ZK Research. He spent 10 years at Yankee Group and prior to that held a number of corporate IT positions. Kerravala is considered one of the top 10 IT analysts in the world by Apollo Research, which evaluated 3,960 technology analysts and their individual press coverage metrics.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×