We’re proud to be named a Leader in KuppingerCole’s Leadership Compass for SASE Integrated Suites with Harmony Connect SASE receiving strong positive ratings in security and usability, among other areas. “Organizations looking for rigorous security in a SASE solution should…
Category: Check Point Blog
Understanding and Minimizing the Security Risks of the Quantum Revolution in Computing
Recently we covered the state of quantum computing and its potential societal benefits. Now we will cover the potential impact of quantum computing on cybersecurity and how we at Check Point Software are innovating to ensure our customers receive the…
Global Cyberattacks Continue to Rise with Africa and APAC Suffering Most
Highlights: Global weekly attacks rose by 7% in Q1 2023 versus same quarter last year, , with each organization facing an average of 1248 attacks per week. Education/Research sector faced the highest number of attacks, rising to an average of…
When Cyberattacks Have Nothing to Do with You – The Escalation of DDoS Cyberattacks due to Hacktivism
Hacktivist attacks have been escalating across the world in recent years with reputed hacktivist groups growing in both size and influence. Last year, a Malaysia-linked hacktivist group attacked targets in India, seemingly in reprisal for a representative of the ruling…
Top Considerations for Securing AWS Lambda, part 2
Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…
Join Check Point at RSA Conference in San Francisco
The RSA Conference is just around the corner, and the Check Point team has a full agenda planned for you to make the most of your visit. In addition to the conference sessions, we will host breakout and theater sessions,…
Check Point Software Technologies and BBT.live Join Forces to Bring Enhanced Cybersecurity to Remote Networks with Secure SD-WAN Solution
At Check Point, we understand that cybersecurity is more important than ever in today’s digital world. As businesses and individuals become more reliant on digital technology, they become more vulnerable to cyber threats such as hacking, phishing, and malware. To…
Check Point Research uncovers rare techniques used by Iranian-affiliated threat actor, targeting Israeli entities
Highlights: Check Point Research reveals new findings related to Phosphorus APT group, an Iranian APT group operating in the Middle East and North America. CPR dubbed this activity cluster Educated Manticore Educated Manticore has substantially enhanced its toolkit by incorporating…
Securing our Sustainable Future
This Earth Day 2023, people from around the world will come together to “Invest in Our Planet” to accelerate the transition to an equitable and prosperous green economy for all. From planting trees to cleaning up beaches to lobbying elected…
Top Considerations for Securing AWS Lambda, part 1
Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…
Cloud Risk Mitigation: Putting it in Context
For many cloud security teams, prioritizing alerts on a day-to-day basis can be overwhelming and impossible to manage. For every cloud application, server, and workload added, the number of alerts piles up. Security teams have no time to go into…
The 3Cs of Best Security: Comprehensive, Consolidated, and Collaborative
Cybercriminals are constantly finding new ways to exploit governments, major corporations and small to medium sized businesses. Motivated by political, financial, or social gain, criminal groups are taking advantage of both the rising geopolitical tensions and the volatile economic climate.…