The critical role that cyber security plays in protecting our planet Cyber security solutions are the silent safeguard of our society, ensuring the smooth operation of economies, businesses, and critical infrastructure that keep the world running. While we often associate…
Category: Check Point Blog
Miercom NGFW Security Benchmark 2024: Why It Matters for Cloud Network Security
As businesses increasingly transition to the cloud, cloud security is a top priority. Customers tell us that the greater their confidence in their cloud security, the faster they will migrate, and the more workloads they will move to the cloud.…
AI for Risk Discovery: 10 Ways to Make it Work For You
Beyond the buzz of chatbots or personalized recommendations, AI’s profound ability to anticipate and neutralize risks is gaining momentum among organizations. As the vast volumes of data surge and regulations tighten their grip, traditional risk assessment tools falter under the…
Securing the Financial Sector with Check Point Infinity Global Services
The digital transformation has significantly enhanced efficiency within the financial sector, but not without elevating the cyber risk landscape. Recent findings by the International Monetary Fund (IMF) reveal a stark reality: cyberattacks have more than doubled since the pandemic, spotlighting…
Microsoft and Google Top the List in Q1 2024 Phishing Attacks: Check Point Research Highlights a Surge in Cyber Threats
Airbnb’s Entry into Top 10 imitated Brands Signals Expanding Cybercriminal Horizons In the ever-evolving landscape of cyber threats, phishing attacks continue to pose a significant risk to individuals and organizations worldwide. Check Point Research (CPR), the Threat Intelligence arm of…
Enhancing Open-Source Software Security: Implementing NIST SP800-204d and Leveraging OpenSSF
Navigating the Intersection of Cyber Security and Software Repositories through Standardized Safety Measures As the impact of the open-source software (OSS) community continues to expand, comprehending the interplay between OSS practices and cyber security standards has become paramount. Recentlythe Open…
Shifting Attack Landscapes and Sectors in Q1 2024 with a 28% increase in cyber attacks globally
Recurring increase in cyber attacks: Q1 2024 saw a marked 28% increase in the average number of cyber attacks per organization from the last quarter of 2023, though a 5% increase in Q1 YoY Sustained Industry Attacks focus: The Hardware…
Check Point Supercharges Brisbane Catholic Education’s Security Stack to Improve Threat Detection and Streamline Manageability
March 2024’s Most Wanted Malware: Hackers Discover New Infection Chain Method to Deliver Remcos
Attackers Find Your Session Cookies Irresistible
Protecting the weakest link: how human errors can put a company in risk
According to “The Global Risks Report 2022” 95% of cybersecurity issues originate from human errors. Check Point Software highlights essential measures that companies must implement to ensure their protection. In today’s digital age, cybersecurity has become a priority for businesses,…
Mastering The DevOps Toolchain: 10 Essential to Build a DevOps Assembly Line
DevOps is more than just a buzzword and the dev behind the magic is more than just a tech wizard who orchestrates software delivery single-handedly. Behind the curtains is an assembly line of toolchains that makes DevOps possible. 44% of…
Not So Private After All: How Dating Apps Can Reveal Your Exact Location
Check Point Research (CPR) recently analyzed several popular dating applications with over 10 million downloads combined in order to understand how safe they are for users. As dating apps traditionally utilize geolocation data, offering the opportunity to connect with people…
Empowering Your Team: 5 Ways Internally Marketing Security Policies can Benefit Your Organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Top GenAI Threats – and why Zero Trust AI Access is the Future
Large Language Models (LLMs) are revolutionizing the way we interact with technology. As a result, SaaS vendors are vying for a competitive edge by integrating AI features, offering enterprises tools such as AI-based sales insights or coding co-pilots. Traditionally, zero-trust…
Empowering Your Team: 5 ways internally marketing security policies can benefit your organization
The History: Why the frustration User frustration with company security policies is a tale as old as the policies themselves. Initially, security measures were rudimentary, often involving simple password protection and basic access controls. However, as technology advanced and cyber…
Beyond Imagining – How AI is actively used in election campaigns around the world
Key Findings AI is already extensively utilized in election campaigns worldwide. Deepfakes and voice cloning have been employed in elections in three main venues: By candidates for self-promotion. By candidates to attack and defame political opponents. By foreign nation-state actors…
Check Point Software: Pioneering Vision in Endpoint Protection
We’re excited to share that Check Point has been recognized as a Visionary in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms. We believe, this recognition not only reinforces our deep understanding of the market, but also acknowledges…
World Backup Day 2024: Navigating the Future of Cyber security with Cloud Solutions
March 31st marks the celebration of World Backup Day, a timely reminder of the importance of securing critical data in today’s digital landscape. In a world where “data is the new oil’ as businesses rely heavily on information and data…
PyPI Inundated by Malicious Typosquatting Campaign
Highlights: PiPI is one of the largest Indexes, with more than 800,000 users Check Point CloudGuard identified a typosquatting campaign on PyPI, comprising over 500 malicious packages. Installation of these packages exposed users to potential theft of their personally identifiable…
