The Role of Cybersecurity Training in Compliance

Learn about the role of cybersecurity training in compliance. Discover how OffSec’s training can contribute to a strong compliance posture. The post The Role of Cybersecurity Training in Compliance appeared first on OffSec. This article has been indexed from OffSec…

CVEs Targeting Remote Access Technologies

In this first quarter of 2024, threat actors have been particularly busy in exploiting vulnerabilities (0-days but also old unpatched flaws) targeting traditional remote access technologies. In this blog post I summarized the main CVEs exploited so far in 2024.…

Getting to Know Netzer Shohet

Netzer Shohet is a Product Manager based in Givatayim, Israel. He joined Check Point as a developer on the IPS infrastructure team in 2005 and currently works on cloud development for our platform that enabled the launch of CloudGuard WAF,…

Taking Steps Toward Achieving FedRAMP

The federal, state, local government and education sectors continue to be the most targeted by cyberattacks in the United States. According to Check Point Research, education and research organizations experience 1,248 per week, on average — the most of any…