By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Zero-trust framework powers Zscaler’s ransomware defense – News
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > News > Zero-trust framework powers Zscaler’s ransomware defense – News
News

Zero-trust framework powers Zscaler’s ransomware defense – News

News Room
Last updated: 2025/08/10 at 2:54 PM
News Room Published 10 August 2025
Share
SHARE

As ransomware attacks evolve from encrypting data to stealing it, a zero-trust framework becomes increasingly critical. This approach replaces traditional security models with a “never trust, always verify” posture that treats every access request as a potential threat.

Zscaler Cloud implements its zero-trust framework by replacing outdated perimeter defenses with identity- and context-based access controls. These controls verify every user, device and application request as though it originates from an untrusted network, according to Deepen Desai (pictured), chief security officer of Zscaler Inc.

Zscaler’s Deepen Desai talks with theCUBE about the importance of a zero-trust framework in today’s digital landscape.

“This is one of the largest clouds where we’re protecting thousands of global customers,” he said. “Just to give an idea on the scale, we’re seeing close to 500 billion transactions daily. We’re extracting 500 trillion signals from it. Prioritizing a zero-trust framework becomes very important because you need to assume that employees may make a mistake and that identity may get compromised, that assets may get compromised. We saw about a 146% year-over-year increase in the number of ransomware attacks that were seen against these organizations that we blocked in Zscaler Cloud.”

Desai spoke with theCUBE’s Jackie McGuire at the Black Hat USA event, during an exclusive broadcast on theCUBE, News Media’s livestreaming studio. They discussed how Zscaler Cloud incorporates the zero-trust framework for enhanced cybersecurity. (* Disclosure below.)

A deeper look at the zero-trust framework

To prevent unauthorized access, limit breach impact and enhance threat detection, the zero-trust framework relies on three core principles. These principles are all deeply embedded in the Zscaler Cloud, according to Desai. 

“When I talk to my CXO peers, I always use the four critical stages of the attack when they’re planning their zero-trust journey, but at a fundamental level, there are three principles,” he said. “One is ‘never trust, always verify.’ That’s where the identity piece comes in, the posture piece comes in. ‘Least privilege access’ as the access control, adaptive access control, which is risk-based [and] very, very important. Third is ‘assume breach,’ which is where ‘assume compromise’ fundamentally comes in.” 

To prevent data theft, limit breach impact, block malware and reduce attack opportunities, the zero-trust framework follows four critical stages. They include reducing the attack surface, hindering compromise, stopping lateral movement and protecting sensitive data, according to Desai. 

“With those three principles in mind, you should look at four stages,” he said. “One is to reduce your external attack surface. Number two is preventing compromise. This is where applying consistent security control, no matter where your users or assets are, whether the user is traveling … [or] in the office. Number three is eliminating the latter propagation phase — making sure you have truly implemented zero trust architecture with segmentation, where you’re not bringing users on the same network as the crown-jewel application. The last thing is [that] everyone is after your data.”

Here’s the complete video interview, part of News’s and theCUBE’s coverage of the Black Hat USA event:

(* Disclosure: Zscaler Inc. sponsored this segment of theCUBE. Neither Zscaler nor other sponsors have editorial control over content on theCUBE or News.)

Photo: News

Support our mission to keep content open and free by engaging with theCUBE community. Join theCUBE’s Alumni Trust Network, where technology leaders connect, share intelligence and create opportunities.

  • 15M+ viewers of theCUBE videos, powering conversations across AI, cloud, cybersecurity and more
  • 11.4k+ theCUBE alumni — Connect with more than 11,400 tech and business leaders shaping the future through a unique trusted-based network.

About News Media

News Media is a recognized leader in digital media innovation, uniting breakthrough technology, strategic insights and real-time audience engagement. As the parent company of News, theCUBE Network, theCUBE Research, CUBE365, theCUBE AI and theCUBE SuperStudios — with flagship locations in Silicon Valley and the New York Stock Exchange — News Media operates at the intersection of media, technology and AI.

Founded by tech visionaries John Furrier and Dave Vellante, News Media has built a dynamic ecosystem of industry-leading digital media brands that reach 15+ million elite tech professionals. Our new proprietary theCUBE AI Video Cloud is breaking ground in audience interaction, leveraging theCUBEai.com neural network to help technology companies make data-driven decisions and stay at the forefront of industry conversations.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Cannibals ‘cooked & ate’ humans 6,000-years-ago as bite-riddled bones found
Next Article As an Android expert, here are 7 phones I don’t recommend buying right now
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Affected by United Airlines delays? Your best bet is X.
News
Free Client Information Form Templates to Streamline Onboarding
Computing
New Siri’s App Intents will make or break Apple’s Home Hub
News
Why You Should Skip The M5 MacBook Pro And Wait For The M6 Model – BGR
News

You Might also Like

News

Affected by United Airlines delays? Your best bet is X.

3 Min Read
News

New Siri’s App Intents will make or break Apple’s Home Hub

3 Min Read
News

Why You Should Skip The M5 MacBook Pro And Wait For The M6 Model – BGR

4 Min Read
News

Survey reveals more of you need to shop around for carriers, you’re missing out

5 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?