Category: Check Point Blog

Why a Value-Driven Approach Makes Women Strong Leaders

In business, the path to value creation requires more than strategic planning and execution—it demands an ability to connect the dots, anticipate needs, and understand the human elements that drive progress. Women often demonstrate these capabilities through their natural inclination…

Five Reasons Retail Chains Can’t Ignore SASE

Retailers have always relied on technology to improve operations and enhance many aspects of the shopping experience – and that’s truer than ever today. From AI-powered predictive analytics to automated customer service, retailers are increasingly using digital innovations to stay…

Five Reasons to Choose Secure SD-WAN from Check Point

In today’s fast-paced digital landscape, businesses are increasingly in need of reliable, secure, and high-performance connectivity. Check Point’s secure SD-WAN solutions offer a comprehensive approach by combining top-notch security with optimized internet and network connectivity, ensuring safe and uninterrupted operations.…

Migrating from Hub and Spoke Network to Azure Virtual WAN

Azure Virtual WAN is a robust network service that combines networking, security, and routing functionalities into a single operational interface. This innovative approach simplifies the complexity of managing multiple connectivity types such as VNet, VPN, remote user, and ExpressRoute connectivity.…

How hunting for vulnerable drivers unraveled a widespread attack

Attackers are increasingly targeting vulnerabilities in drivers, which operate in kernel mode with the highest permissions, to bypass security measures and facilitate further infections. To prevent the abuse of vulnerable drivers, Microsoft’s 2015 policy required new drivers to be signed…

Cyber Criminals Using URL Tricks to Deceive Users

Overview: In a newly observed scam, Check Point researchers found 200,000 phishing emails that abused URL information to obfuscate phishing links. The scam was first observed on January 21st, and remains ongoing, although the daily threat volume is decreasing. Geographically,…