{"id":6059,"date":"2025-05-18T14:08:12","date_gmt":"2025-05-18T06:08:12","guid":{"rendered":"https:\/\/cicserver.com\/public-cloud-and-generative-ai-drive-the-need-for-dspm\/"},"modified":"2025-05-18T14:08:12","modified_gmt":"2025-05-18T06:08:12","slug":"public-cloud-and-generative-ai-drive-the-need-for-dspm","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/public-cloud-and-generative-ai-drive-the-need-for-dspm\/","title":{"rendered":"Public Cloud and Generative AI Drive the Need for DSPM"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The focus on data security is increasing as organizations move to public cloud environments and adopt generative AI (gen AI). Many struggle with tracking where their data is stored, leaving it unprotected and susceptible to breaches. Earlier this year, <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/www.zscaler.com\/\">Zscaler<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> introduced a <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-security\/6-best-practices-for-data-security-posture-management-dspm-\">data security posture management<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> (DSPM) solution that protects data both when it\u2019s being transferred (in motion) and when it\u2019s stored (at rest), ensuring it stays safe across channels like email, web, applications, and the cloud.<\/span><\/p>\n<p><iframe title=\"2024 ZKast #156 with Srikanth Nellore from Zscaler at AWS re:Invent\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/RDGQ73fU9WQ?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">I recently met with Srikanth Nellore, Zscaler\u2019s senior director and worldwide public cloud specialist for DSPM. In my <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/youtu.be\/RDGQ73fU9WQ?si=LA6-BN5qzKDypgha\">latest ZKast<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, we discussed how Zscaler is addressing the challenges of data protection, gen AI, and data migration to public clouds. Below are highlights of the video:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_unordered BasicList_limited\">\n<ul data-testid=\"basic-list-unordered\" class=\"BasicList-UnorderedList\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The data security market is experiencing significant growth due to two main factors\u2014cloud migration and increasing AI adoption\u2014driving demand for data security solutions. First, organizations are shifting from traditional data centers to public cloud environments. Second, many are looking for ways to ensure that sensitive data in the cloud is protected and not accidentally accessed or used by AI models.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Organizations are changing their focus on data management. In the past, the priority was stopping sensitive data from leaving their environment. However, those using cloud and software-as-a-service (SaaS) tools now realize they don\u2019t have a complete view of their data.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Zscaler addresses data security challenges through a comprehensive and centralized approach, targeting both data movement and storage. It does this by protecting data in motion and at rest. Zscaler has one system for all data, meaning it lets organizations define their sensitive data once and use the same definition everywhere\u2014whether the data is on a device, in the cloud, or moving through networks.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Zscaler provides a complete view of <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/cloud-networking\/the-pillars-of-cloud-infrastructure-security-in-2023-and-beyond\">data security<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> by checking whether databases are encrypted, exposed to the internet, or linked to virtual machines with unpatched vulnerabilities. This end-to-end view helps organizations see their sensitive data and security measures in one place.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">At the recent <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/reinvent.awsevents.com\/\">2024 AWS re:Invent event<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, Zscaler announced a partnership with AWS to help businesses tackle a common challenge: managing their AWS accounts, particularly \u201cshadow\u201d accounts. These unmanaged accounts pose risks because organizations don\u2019t know what data they contain or how it\u2019s used. Zscaler\u2019s solution identifies and secures them. For example, if a company has 100 AWS accounts but 50 are unmanaged, Zscaler identifies them and shows what\u2019s stored in them\u2014something most organizations currently lack.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Looking ahead, Zscaler envisions the <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/ai-networking\/why-ai-cybersecurity-is-so-important-for-network-teams\">AI security<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> market evolving around three key trends:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_ordered BasicList_limited\">\n<ol data-testid=\"basic-list-ordered\" class=\"BasicList-OrderedList BasicList-OrderedList_nestedLevel_0 body-normal\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">Unified data protection<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> where data is at rest and in motion will no longer be so much of a focus. Instead, the focus will shift to better understanding data and its use.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">The current siloed approach will be replaced by all-in-one platforms<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> that can locate and secure data across different environments. This change is already underway and is expected to grow quickly.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_ordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_ordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold\">AI-driven security<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> will make data protection smarter and faster. It will help monitor how employees use AI tools like ChatGPT, track their activities, and prevent the misuse of sensitive data.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ol>\n<\/div>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">In summary, the cloud continues to evolve, and using generative AI tools will create another step in adopting it. As this happens, organizations need to rethink how they protect their data. DSPM brings together data management and threat protection and should be a part of every organization\u2019s <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/cloud-networking\/getting-aggressive-with-cloud-cybersecurity\">cloud strategy<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">Zeus Kerravala is the founder and principal analyst with ZK Research.<\/span><\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">Read his other Network Computing articles\u00a0<\/span><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/author\/zeus-kerravala-founder-and-principal-analyst-with-zk-research\">here<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><span class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_bold ContentText-BodyTextChunk_italic\">.<\/span><\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>The focus on data security is increasing as organizations move to public cloud environments and adopt generative AI (gen AI). Many struggle with tracking where their data is stored, leaving it unprotected and susceptible to breaches. Earlier this year, Zscaler introduced a data security posture management (DSPM) solution that protects data both when it\u2019s being [&hellip;]<\/p>","protected":false},"author":3,"featured_media":6060,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6059","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6059","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=6059"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6059\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/6060"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=6059"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=6059"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=6059"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}