Stopping Log4j with guest Deepen Desai, Zscaler CISO

Stopping Log4j with guest Deepen Desai, Zscaler CISO

Anatomy of a threat with Zscaler CISO and ThreatLabz chief Deepen DesaiПодробнее

Anatomy of a threat with Zscaler CISO and ThreatLabz chief Deepen Desai

State of Cybersecurity with Deepen Desai, Global CISO and Head of Security Research at ZscalerПодробнее

State of Cybersecurity with Deepen Desai, Global CISO and Head of Security Research at Zscaler

Detect Log4J with Zscaler DeceptionПодробнее

Detect Log4J with Zscaler Deception

Deepen Desai, Zscaler | Supercloud 6Подробнее

Deepen Desai, Zscaler | Supercloud 6

Zscaler CISO Deepen Desai talks 2020 State of Encrypted Attacks report and moreПодробнее

Zscaler CISO Deepen Desai talks 2020 State of Encrypted Attacks report and more

Zscaler ThreatLabZ: Assessment strategies to mitigate emerging enterprise threatsПодробнее

Zscaler ThreatLabZ: Assessment strategies to mitigate emerging enterprise threats

Zscaler ThreatLabz Report Tracks Trends and Impacts of Ransomware Attacks - Deepen DesaiПодробнее

Zscaler ThreatLabz Report Tracks Trends and Impacts of Ransomware Attacks - Deepen Desai

Deepen Desai: A doctor in computer viruses. [CISO]Подробнее

Deepen Desai: A doctor in computer viruses. [CISO]

Zscaler Threatlabz: Assessment Strategies to Mitigate Emerging Enterprise ThreatsПодробнее

Zscaler Threatlabz: Assessment Strategies to Mitigate Emerging Enterprise Threats

July 27 ZKast with Deepen Desai of ZscalerПодробнее

July 27 ZKast with Deepen Desai of Zscaler

Restrict Attack Surface; Create Uncompromising Visibility; Adopt Zero Trust: Deepen Desai, ZscalerПодробнее

Restrict Attack Surface; Create Uncompromising Visibility; Adopt Zero Trust: Deepen Desai, Zscaler

Zscaler ThreatLabZ: Assessment strategies to mitigate emerging enterprise threatsПодробнее

Zscaler ThreatLabZ: Assessment strategies to mitigate emerging enterprise threats

How to respond to Log4j vulnerabilityПодробнее

How to respond to Log4j vulnerability

How to Find the Log4j Vulnerability Using Syft and GrypeПодробнее

How to Find the Log4j Vulnerability Using Syft and Grype

AI-Powered Phishing Campaigns on the Rise: New Research - Deepen Desai - RSA23 #2Подробнее

AI-Powered Phishing Campaigns on the Rise: New Research - Deepen Desai - RSA23 #2

The Log4j Vulnerability Exploit ExplainedПодробнее

The Log4j Vulnerability Exploit Explained

События