We practice daily routines like brushing our teeth and washing our hands to maintain our physical health. Similarly, the digital landscape has become a breeding ground for sophisticated cyber threats, each requiring specific ‘sanitization’ strategies. Your Organization Must Scrub…
Category: Check Point Blog
April 2024’s Most Wanted Malware: Surge in Androxgh0st Attacks and the Decline of LockBit3
Researchers recently identified a spike in Androxgh0st attacks, a Trojan that targets Windows, Mac and Linux platforms, which saw it jump straight into second place in the top malware list. Meanwhile, LockBit3 narrowly remains the top ransomware group, despite a…
Five business use cases for evaluating Azure Virtual WAN security solutions
Are you using Microsoft Azure Virtual WAN, or considering using it? If so, what is the best way to secure your Virtual WAN deployments? This is not a trivial question, because not all firewalls are equal or even similar in…
Stop Chasing Breaches: Build a Resilient Security Architecture
You assume your security architecture is secure, it’s not always the case Cyber security vendors play a critical role in protecting the digital landscape. However, security products, too, are not immune from targeted exploits by bad actors. Cyberattacks can happen…
Check Point Protects Enterprises by Accelerating Security for Networks and AI Cloud Infrastructure, in Collaboration with NVIDIA
As cyber threats expand rapidly, enterprises can trust Check Point to deliver accelerated network and cloud security solutions, in collaboration with NVIDIA. By combining Check Point’s experience in advanced threat prevention with NVIDIA’s cutting-edge accelerated computing platforms, enterprises can get…
AAPI Heritage Month Spotlight: Jenny Nguyen
In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on some of our AAPI employees. We sat down with Jenny Nguyen, a campaign operations manager in our Redwood City office, to discuss her favorite…
Drop My VPN – Are You Nuts?
If the title of this post caught your attention, maybe you’ve thought about moving on from your VPN because of performance issues or security concerns but are still researching alternatives. On the other hand, perhaps you actually do think it’s…
Spoofing Shein for Credential Harvesting
Introduction Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads. The e-commerce platform is Googled more frequently than major brands like Nike…
Unpacking the New DHS Guidelines for Securing Critical Infrastructure from AI-related Threats
Under President Biden’s Executive Order regarding the safe development and use of Artificial Intelligence, the Department of Homeland Security published new guidelines about how to secure critical infrastructure from AI-related threats. The guidelines are focused on three key categories. The…
Extending SASE Protection Into the Browser
If you want to protect your remote workers one of the best places to start is the web browser. It’s the primary portal to our workday for accessing everything from files to SaaS applications or just browsing the web. That’s…
Infinity Global Services’ Cyber Park Introduces “Nemesis” – A Cyber Security Adventure Awaits!
Welcome to a world where every click can lead to an adventure, and every challenge conquered is a step closer to becoming a cyber guardian. Infinity Global Services’ or ‘IGS’ Cyber Park is thrilled to unveil our latest escapade into…
Celebrating 5 Years of Excellence with Check Point’s Hacking Point Program
As we mark the 5th anniversary of the Hacking Point program, a pivotal component of Check Point Infinity Global Services’ (IGS) MASTER pillar, it’s a moment of reflection, celebration, and anticipation. The journey of Hacking Point has been nothing short…
7 Essentials Every Data Security Posture Management (DSPM) Must Have
An interesting side-effect of the proliferation of cloud-native software development is the blurred lines between the roles of InfoSec and DevOps teams in protecting application and user data. Until recently, DevSecOps was mostly about securing and protecting the code, the…
Check Point Awarded AI Security Innovator of the Year at GISEC
In a year marked by rapidly evolving cyber threats, Check Point is thrilled to receive the edge Security Leadership Award for AI Security Innovator of the Year! The edge Security Leadership Award shines a spotlight on industry visionaries who are…
Check Point Named Strategic Leader in AV-Comparatives EPR Report
Check Point Harmony Endpoint has been recognized as a Strategic Leader in AV-Comparatives’ 2023 Endpoint Prevention and Response (EPR) report. This accolade underscores Harmony Endpoint’s exceptional capabilities in proactively defending against advanced cyber threats. The AV-Comparatives EPR report is a…
Protecting Against DDoS Tsunami Attacks
Quantum DDoS Protector helps defend against sophisticated Tsunami DDoS Attacks without downtime or service disruption. Check Point has a long-standing history of protecting numerous customers worldwide from large-scale web DDoS (Distributed Denial of Service) attacks, effectively handling large amounts of…
Taking Steps Toward Achieving FedRAMP
The federal, state, local government and education sectors continue to be the most targeted by cyberattacks in the United States. According to Check Point Research, education and research organizations experience 1,248 per week, on average — the most of any…
Getting to Know Netzer Shohet
Netzer Shohet is a Product Manager based in Givatayim, Israel. He joined Check Point as a developer on the IPS infrastructure team in 2005 and currently works on cloud development for our platform that enabled the launch of CloudGuard WAF,…
Earth Day 2024: Securing Our Earth
The critical role that cyber security plays in protecting our planet Cyber security solutions are the silent safeguard of our society, ensuring the smooth operation of economies, businesses, and critical infrastructure that keep the world running. While we often associate…
Miercom NGFW Security Benchmark 2024: Why It Matters for Cloud Network Security
As businesses increasingly transition to the cloud, cloud security is a top priority. Customers tell us that the greater their confidence in their cloud security, the faster they will migrate, and the more workloads they will move to the cloud.…