Category: Check Point Blog

Latest Chinese state-sponsored attacks on critical US infrastructure spies a continuation of trend, Reports Check Point Research

Last Wednesday, Microsoft issued a warning claiming Chinese state-sponsored hackers have compromised “critical” cyber infrastructure in a variety of industries, including government and communications organizations. “The United States and international cybersecurity authorities are issuing this joint Cybersecurity Advisory (CSA) to…

Mitigating Risks in Cloud Native Applications

As organizations move their operations to the cloud, they face a difficult challenge in ensuring secure configurations and consistent security posture across multiple cloud services and platforms. In addition, they must do all of this in a way that does…

Identify and Protect against Endpoint vulnerabilities

57% of ransomware attacks leverage unpatched vulnerabilities. Are you protected? By Noa Goldstein, Product Marketing Manager and Bar Yassure, Harmony Endpoint Product Manager   Endpoint vulnerabilities represent a “hole in the fence” of an operating system or application, through which…

Protecting your password: Create an unbreakable one

Brute-force attacks to obtain passwords have moved from CPUs to GPUs, improving their effectiveness by checking more than a million keys per second. Passwords now need new requirements to be truly secure: a minimum number of 12 characters, the use…

Top Considerations for Securing AWS Lambda, part 2

Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

Securing our Sustainable Future

This Earth Day 2023, people from around the world will come together to “Invest in Our Planet” to accelerate the transition to an equitable and prosperous green economy for all. From planting trees to cleaning up beaches to lobbying elected…

Top Considerations for Securing AWS Lambda, part 1

Serverless computing or function-based computing is a way by which customers can develop backend systems or event-driven pipelines without worrying about the underlying infrastructure, which is managed by the cloud provider. It is billed based on the invocations and the…

Cloud Risk Mitigation: Putting it in Context

For many cloud security teams, prioritizing alerts on a day-to-day basis can be overwhelming and impossible to manage. For every cloud application, server, and workload added, the number of alerts piles up. Security teams have no time to go into…