Category: Check Point Blog

Getting to Know Natalia Vezhevatova

Natalia Vezhevatova is a territory account manager at Check Point with a background in IT account management, sales, and renewals. Read on to learn more about Natalia’s career journey and story. Tell us a bit about your background and role…

Empowering Women Through Mentoring: Meet Rebecca Frizzarin

Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…

Unveiling CNAPP+P: The Extra Mile in Cyber Defense

Introduction In the fast-evolving landscape of cyber security, where threats loom large and innovation is constant, staying ahead of the curve is imperative. At CPX 2024, a pivotal event in the realm of cyber security hosted by Check Point, a…

AI and Automation in the Race to Reduce Attack Dwell Time

Threat Detection and Incident Response (TDIR) is at the forefront of every Chief Information Security Officer’s (CISO) agenda. The relentless pace of technological advancements and the continuous evolution of cyber threats demand that security leaders stay ahead through constant innovation…

AAPI Heritage Month Spotlight: Archana Ragothaman

In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on Check Point’s AAPI employees. We sat down with Archana Ragothaman, Head of Sales Engineering, US Global Accounts, to learn about how she honors her…

5 data security concepts you need to know

Everyone is talking about data security and its importance, but what does that practically look like? Let’s take a look…   Our newly released Cloud Security Report showed a startling trend in the data. Data breaches have now surpassed misconfigurations…

Empowering Women Through Mentoring: Meet Cordelia Allway

Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…

AAPI Heritage Month Spotlight: Jenny Nguyen

In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on some of our AAPI employees. We sat down with Jenny Nguyen, a campaign operations manager in our Redwood City office, to discuss her favorite…

Drop My VPN – Are You Nuts?

If the title of this post caught your attention, maybe you’ve thought about moving on from your VPN because of performance issues or security concerns but are still researching alternatives. On the other hand, perhaps you actually do think it’s…

Spoofing Shein for Credential Harvesting

Introduction Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads. The e-commerce platform is Googled more frequently than major brands like Nike…

Extending SASE Protection Into the Browser

If you want to protect your remote workers one of the best places to start is the web browser. It’s the primary portal to our workday for accessing everything from files to SaaS applications or just browsing the web. That’s…

Check Point Named Strategic Leader in AV-Comparatives EPR Report

Check Point Harmony Endpoint has been recognized as a Strategic Leader in AV-Comparatives’ 2023 Endpoint Prevention and Response (EPR) report. This accolade underscores Harmony Endpoint’s exceptional capabilities in proactively defending against advanced cyber threats. The AV-Comparatives EPR report is a…

Protecting Against DDoS Tsunami Attacks

Quantum DDoS Protector helps defend against sophisticated Tsunami DDoS Attacks without downtime or service disruption. Check Point has a long-standing history of protecting numerous customers worldwide from large-scale web DDoS (Distributed Denial of Service) attacks, effectively handling large amounts of…

Taking Steps Toward Achieving FedRAMP

The federal, state, local government and education sectors continue to be the most targeted by cyberattacks in the United States. According to Check Point Research, education and research organizations experience 1,248 per week, on average — the most of any…

Getting to Know Netzer Shohet

Netzer Shohet is a Product Manager based in Givatayim, Israel. He joined Check Point as a developer on the IPS infrastructure team in 2005 and currently works on cloud development for our platform that enabled the launch of CloudGuard WAF,…

Earth Day 2024: Securing Our Earth

The critical role that cyber security plays in protecting our planet Cyber security solutions are the silent safeguard of our society, ensuring the smooth operation of economies, businesses, and critical infrastructure that keep the world running. While we often associate…

AI for Risk Discovery: 10 Ways to Make it Work For You

Beyond the buzz of chatbots or personalized recommendations, AI’s profound ability to anticipate and neutralize risks is gaining momentum among organizations. As the vast volumes of data surge and regulations tighten their grip, traditional risk assessment tools falter under the…

Attackers Find Your Session Cookies Irresistible

Cookies are one of the most important web technologies around, even though they are almost as old as the web browser itself. They sometimes have a bad reputation, but there’s no denying that cookies do make our lives a lot…

PyPI Inundated by Malicious Typosquatting Campaign

Highlights: PiPI is one of the largest Indexes, with more than 800,000 users Check Point CloudGuard identified a typosquatting campaign on PyPI, comprising over 500 malicious packages. Installation of these packages exposed users to potential theft of their personally identifiable…

Getting to Know Emma Pember

Emma Pember is a Lead Professional Services Consultant in the ANZ Infinity Global Services team, based in Perth, Australia. She works with customers in the APAC region, specializing in Maestro and VSX deployments. Emma has been with Check Point PS…

Phishing Through Venmo

Introduction Venmo is one of the most popular payment apps in the world. Owned by PayPal, Venmo is an easy way for friends to send money back and forth. It’s also used by many businesses, and the app’s social network…

Women and cyber security: a must to boost the future

Women represented only 25% of the cyber security workforce in 2023. 20% of Check Point Software´s Vice Presidents globally are  women, beyond the industry standard of 16%. On International Women’s Day, Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading…

Top 6 SaaS Breach Vectors and How to Prevent Them

On average, IT teams are only aware of 20% of the SaaS applications used in their organizations1. If standard controls could be easily applied to SaaS apps, then this number would be little cause for concern. However, the frequency of…

New IDC survey confirms how far CISOs have evolved

Savvy security leaders must enable the business and protect their organizations In November 2023, IDC conducted an extensive global survey with 847 security leaders across 17 countries to better identify their roles, responsibilities, and the realities they face on the…

PCI Compliance Levels: A Developer’s Guide to PCI Compliance

Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers…