cyber-101
What is a Proxy Auto-Configuration (PAC) file and how does it work?
A quick description of how PAC files work.
cyber-101
Exploring a foundation of identity service.
cyber-101
A quick walk-through of HEC.
coding-101
A brief intro to a big topic.
cyber-101
A quick exploration of risk management.
cyber-101
A walkthrough of various DLP techniques.
coding-101
A quick explanation of popular casing styles.
cyber-101
Unpacking the deployment methodology for ZPA.
devops
A helpful technique for extracting contents from minimal containers.
networking-101
Simple principles for optimizing connectivity to M365.
Cybersecurity and devops questions. Answered.
Let's discuss the thought process for defining and implementing bandwidth control in Zscaler.
Clarifying the differences between a couple similar terms.
How do we know that file type is REALLY that file type?
How picky can we be with Zscaler cloud app control?
Understanding the ingredients for risk...
A brief walk-through of the recommended phases to rollout TLS inspection.
A very brief intro to comparing these AI systems.
How can Zscaler client connector tell it's on a trusted network?
Sequential steps and thought process for deploying the Zscaler client connector app.
A quick recap of what things the client connector can look for to assess local security state of an endpoint.
Defining agility of change updates on ZCC.
Exploring features and functionality for the client connector