What the Client Does The end user’s browser only ever connects to https://app1.cordero.me → TCP 443. That’s the real traffic...
JoinedMay 2, 2023
Articles673
20+ years of experience and proven performance in large scale enterprise network infrastructure architecture, design, implementation, migration, security, operation, troubleshooting, leading/managing teams, and budgets. I have a BS in Cybersecurity and a Master's from the University of Florida.
ZPA to Palo Alto Terminology Mapping ZPA Concept Palo Alto Firewall Equivalent Technical Alignment Notes Application Address Object (FQDN or...
The Problem You’re hitting the 6,000-application limit per App Connector because your current configuration sends all apps to every connector...
Focus: What Geoffrey Hinton thinks about job disruption, timelines, and how individuals & societies can stay ahead. 1. Why This...
What Happens When Zscaler Issues a High-Risk Security Fix? When Zscaler identifies and releases a high-risk security update: The fix...
ZIA: Overview Zscaler Internet Access (ZIA) is a cloud-delivered secure internet and web gateway designed to protect users, applications,...
1. Start With an Application Inventory (Even If It’s Incomplete) Why: You can’t segment what you don’t understand. Gather...
Managing dynamic threat indicators across firewalls can be challenging—especially when you’re juggling multiple sources of threat intelligence. Palo Alto Networks...
This guide provides detailed information about upgrading Zscaler App Connectors on Red Hat Linux, clarifying processes, terminology, and roles for...