Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

ZScaler

Below you will find reports with the source of “ZScaler”

image from Zscaler ThreatLabz 2024 Mobile, IoT, & OT Threat Report

Zscaler ThreatLabz 2024 Mobile, IoT, & OT Threat Report

In this report, the security domain of the CISO continues to expand. This area is one of the most challenging to protect as the threats that attack these devices, like mobile malware and botnets, are becoming more sophisticated. ThreatLabz found that mobile threats are becoming more targeted and sophisticated—with 29% and 111% growth in mobile banking malware and mobile spyware attacks, respectively—even as the overall volume of mobile attacks has declined.

(more available)
Added: January 23, 2025
image from Zscaler ThreatLabz 2024 Ransomware Report

Zscaler ThreatLabz 2024 Ransomware Report

ThreatLabz found that ransomware attacks increased by 17.8% year-overyear based on blocked attempts in the Zscaler cloud, while ransomware attacks identified through data leak site analysis surged by 57.8%. The findings presented in this report underscore the need for organizations to prioritize protection against the relentless tide of ransomware. The insights and strategies in the report serve as a crucial guide for improving your ransomware defenses.

(more available)
Added: September 9, 2024
image from Zscaler ThreatLabz 2024 VPN Risk Report

Zscaler ThreatLabz 2024 VPN Risk Report

Based on a survey of 647 IT professionals and cybersecurity experts, this report explores the multifaceted security and user experience challenges of VPNs to reveal the complexity of today’s access management, vulnerabilities to various cyberattacks, and their potential to impair organizations’ broader security posture. The report also outlines more advanced security models, particularly zero trust, which has firmly established itself as a robust and future-proof framework to secure and accelerate digital transformation.

(more available)
Added: May 15, 2024
image from 2022 ThreatLabz Data Loss Report

2022 ThreatLabz Data Loss Report

The basis of this report is the Zscaler ThreatLabz research team’s analysis of nearly 6 billion data loss policy violations from November 2021 through July 2022. We’ll look at what and how enterprise data is being shared, where it’s going, which malicious actors are targeting it, and how you can improve your datasharing hygiene so as to mitigate risk without stifling productivity.

(more available)
Added: May 5, 2023
image from 2023 Phishing Report

2023 Phishing Report

This report will help you recognize the social engineering tactics and sophisticated coding used in phishing attacks, so you can prevent costly data breaches. Read on for an in-depth look at the latest phishing trends and observations the ThreatLabz team collected throughout the past year, and get best practices for safeguarding your organization against ever-evolving phishing techniques.

(more available)
Added: May 5, 2023
image from VPN Risk Report 2021

VPN Risk Report 2021

The 2021 VPN Risk Report surveyed 357 cybersecurity professionals, providing insight into the current remote access environment, the state of VPN within the enterprise, the rise in VPN vulnerabilities, and the role that zero trust will play in enabling access to apps going forward.

(more available)
Added: September 29, 2022
image from The State of Encrypted Attacks

The State of Encrypted Attacks

The Zscaler Zero Trust Exchange houses the largest security data set in the world, collected from over 300 trillion signals and 160 billion daily transactions - more than 15x the volume of Google searches each day. Zscaler’s ThreatLabz threat research team analyzed this data from the last nine months of 2021, assessing threats in encrypted traffic over the span.

(more available)
Added: September 27, 2022
image from VPN Risk Report

VPN Risk Report

This report is based on the results of a comprehensive online survey of 351 IT and cybersecurity professionals, conducted in June 2022 to identify the latest enterprise adoption trends, challenges, gaps, and solution preferences related to VPN risk. The respondents range from technical executives to IT security practitioners, representing a balanced cross-section of organizations of varying sizes across multiple industries.

(more available)
Added: September 26, 2022
image from 2020 State of Encrypted Attacks

2020 State of Encrypted Attacks

This report shares key insights on how attackers are accelerating their use of SSL/TLS encryption to bypass traditional defenses.

Added: December 1, 2020
image from Definitive Guide To Secure Remote Access

Definitive Guide To Secure Remote Access

The purpose of this document is to provide answers to what to look for when choosing a security tool for remote access to internal applications.

(more available)
Added: October 26, 2018
image from Defending Government Against Ransomware Attacks

Defending Government Against Ransomware Attacks

This paper takes a look at cloud sandboxing and how that can be used to protect governments from Ransomware.

Added: October 25, 2018
image from Office 365 Survey: An Infographic

Office 365 Survey: An Infographic

This infographic reveals the details of a survey related to the security related issues in organizations that use Office 365,

(more available)
Added: October 13, 2018
image from GDPR White Paper

GDPR White Paper

This paper takes a good and definitive look at the GDPR.

Added: October 12, 2018
© Cyentia Institute 2025
Library updated: July 3, 2025 00:08 UTC (build b1d7be4)