Beyond the buzz of chatbots or personalized recommendations, AI’s profound ability to anticipate and neutralize risks is gaining momentum among organizations. As the vast volumes of data surge and regulations tighten their grip, traditional risk assessment tools falter under the…
Category: Check Point Blog
Securing the Financial Sector with Check Point Infinity Global Services
The digital transformation has significantly enhanced efficiency within the financial sector, but not without elevating the cyber risk landscape. Recent findings by the International Monetary Fund (IMF) reveal a stark reality: cyberattacks have more than doubled since the pandemic, spotlighting…
Microsoft and Google Top the List in Q1 2024 Phishing Attacks: Check Point Research Highlights a Surge in Cyber Threats
Airbnb’s Entry into Top 10 imitated Brands Signals Expanding Cybercriminal Horizons In the ever-evolving landscape of cyber threats, phishing attacks continue to pose a significant risk to individuals and organizations worldwide. Check Point Research (CPR), the Threat Intelligence arm of…
Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF
Navigating the Intersection of Cyber Security and Software Repositories through Standardized Safety Measures As the impact of the open-source software (OSS) community continues to expand, comprehending the interplay between OSS practices and cyber security standards has become paramount. Recentlythe Open…
Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of 2023, though a 5% increase in Q1 YoY Sustained Industry Attacks focus: The Hardware…
Check Point Supercharges Brisbane Catholic Education’s Security Stack to Improve Threat Detection and Streamline Manageability
March 2024’s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos
Attackers Find Your Session Cookies Irresistible
Protecting the weakest link: how human errors can put a company in risk
According to “The Global Risks Report 2022” 95% of cybersecurity issues originate from human errors. Check Point Software highlights essential measures that companies must implement to ensure their protection. In today’s digital age, cybersecurity has become a priority for businesses,…
Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line
DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of…
Not So Private After All: How Dating Apps Can Reveal Your Exact Location
Check Point Research (CPR) recently analyzed several popular dating applications with over 10 million downloads combined in order to understand how safe they are for users. As dating apps traditionally utilize geolocation data, offering the opportunity to connect with people…
Empowering Your Team: 5 Ways Internally Marketing Security Policies can Benefit Your Organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Top GenAI Threats – and why Zero Trust AI Access is the Future
Large Language Models (LLMs) are revolutionizing the way we interact with technology. As a result, SaaS vendors are vying for a competitive edge by integrating AI features, offering enterprises tools such as AI-based sales insights or coding co-pilots. Traditionally, zero-trust…
Empowering Your Team: 5 ways internally marketing security policies can benefit your organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Beyond Imagining – How AI is actively used in election campaigns around the world
Key Findings AI is already extensively utilized in election campaigns worldwide. Deepfakes and voice cloning have been employed in elections in three main venues: By candidates for self-promotion. By candidates to attack and defame political opponents. By foreign nation-state actors…
Check Point Software: Pioneering Vision in Endpoint Protection
We’re excited to share that Check Point has been recognized as a Visionary in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe, this recognition not only reinforces our deep understanding of the market, but also acknowledges…
World Backup Day 2024: Navigating the Future of Cyber security with Cloud Solutions
March 31st marks the celebration of World Backup Day, a timely reminder of the importance of securing critical data in today’s digital landscape. In a world where “data is the new oil’ as businesses rely heavily on information and data…
PyPI Inundated by Malicious Typosquatting Campaign
Highlights: PiPI is one of the largest Indexes, with more than 800,000 users Check Point CloudGuard identified a typosquatting campaign on PyPI, comprising over 500 malicious packages. Installation of these packages exposed users to potential theft of their personally identifiable…
Getting to Know Emma Pember
Emma Pember is a Lead Professional Services Consultant in the ANZ Infinity Global Services team, based in Perth, Australia. She works with customers in the APAC region, specializing in Maestro and VSX deployments. Emma has been with Check Point PS…
Check Point Software Technologies Recognized as a Top Leader in Frost Radar™ 2024 Global Managed Detection and Response Report
Check Point Software proudly announced that it has been named a Growth and Innovation Leader in the Frost Radar™ Global Managed Detection and Response 2024 Report. Check Point has demonstrated the impressive capabilities of its Infinity MDR/MPR, empowering organizations with…