Stories by Budd Ilic

Ensuring effective public-sector security in an interconnected world
Thu, 12th Nov 2020
#
malware
#
zero trust security
#
cybersecurity
Increasing interconnectedness is causing sweeping changes to the public sector, posing challenges and opportunities for IT security.

Six steps for effective public-sector cloud adoption in a post-COVID-19 world
Thu, 1st Oct 2020
#
malware
#
public cloud
#
risk & compliance
Australian and New Zealand governments urged to adopt comprehensive cybersecurity strategies as technology rapidly transforms the public sector.

Cybercriminals exploiting virus fears to gain access to corporate IT systems
Mon, 25th May 2020
#
advanced persistent threat protection
#
cybersecurity
#
zscaler
COVID-19 may have changed the way many people work, but this doesn’t have to mean companies must accept lower levels of security.

Cybersecurity: why responsibility needs to extend beyond the IT department
Mon, 9th Mar 2020
#
digital transformation
#
cybersecurity
#
zscaler
In the era of digital transformation, organisations must extend cybersecurity responsibility beyond the IT department to tackle evolving threats effectively.

Successful cloud transformation requires collaboration on network strategy
Fri, 13th Dec 2019
#
firewalls
#
network infrastructure
#
digital transformation
An organisation’s security team must be invited to the table when a transformation project is in the early planning stages, Zscaler says.

Why zero trust is the best security strategy for mobile computing - Zscaler
Mon, 11th Nov 2019
#
malware
#
endpoint protection
#
edr
Zero trust network access is helping organisations address the protection problem posed by mobile computing and cloud-based applications.

How SD-WAN is transforming IT departments - Zscaler
Thu, 17th Oct 2019
#
network infrastructure
#
digital transformation
#
sd-wan
The rise of SD-WAN technology will be the catalyst for significant change in IT departments around the country.

IoT devices leaving businesses open to security risks – Zscaler
Wed, 11th Sep 2019
#
malware
#
ddos
#
iot security
IDC has forecast that spending on IoT will reach US$745 billion in 2019 and surpass the US$1 trillion mark in 2022.

Cloud security changing security channel partner model - Zscaler
Mon, 12th Aug 2019
#
cloud security
#
multi-cloud
#
cloud services
Channel partners need to carve out their own space and convince enterprise customers that they are the best avenue to procure cloud services.

Security challenges posed by hybrid cloud - Zscaler
Fri, 2nd Aug 2019
#
hybrid cloud
#
cloud security
#
zscaler
Legacy security approaches can result in a poor user experience, inflated costs, and dangerous holes in protection.