As public transportation evolves, bus systems face new risks. Many systems still rely on older technology (outdated OT devices – such as standalone diagnostic tools), which wasn’t built to handle today’s complex cyber attacks. While modern buses use technologies like…
Tag: Check Point Blog
Harmony SaaS Delivers Next-Level SaaS Security for Google Cloud Customers
Your organization relies on a growing portfolio of SaaS applications to drive productivity. But this shift has brought with it a shadow of complexity and risk. Shadow IT, misconfigured apps, and third-party integrations now form a fragmented, often-invisible attack surface—one…
Securing a Hyperconnected World: The Case for Check Point’s Hybrid Mesh Security Architecture
Introduction: AI is reshaping cybersecurity—accelerating both innovation and attack sophistication. As enterprises expand across cloud, remote, and on-prem environments, cybercriminals are leveraging generative AI to launch faster, more convincing, and more damaging campaigns. Traditional firewalls and siloed solutions cannot keep…
March 2025: Malware Spotlight – FakeUpdates and RansomHub Ransomware Group Dominate Cyber Threats
Our latest Global Threat Index for March 2025 shows the continued dominance of FakeUpdates, a downloader malware that remains the most prevalent cyber threat worldwide. This sustained threat comes as RansomHub ransomware campaigns gain traction, marking a growing concern in…
Check Point Cloud Firewalls Achieve Industry Best 100% Block Rate and Accuracy: CyberRatings.Org Test Results Confirm
Organizations demand uncompromising protection against today’s sophisticated threats while ensuring minimal disruption to legitimate business operations. Check Point CloudGuard Network Security has just set a new industry benchmark—achieving a 100% exploit block rate including evasions in independent testing conducted by…
6 Reasons to Visit Check Point at RSAC 2025
The RSA Conference is where the cyber security world comes together, and this year, Check Point’s presence will be greatly felt. From breakthrough AI defenses to exclusive executive gatherings, we’re bringing innovation, insight, and hands-on experiences to the show floor.…
World Health Day 2025: When Cyber Security Fails, So Does Public Health
On World Health Day 2025, we are reminded that health is not only about biology and behavior—it’s about infrastructure, access, and now, cyber security. As this important critical sector grows increasingly digital, it also becomes increasingly vulnerable. Patient lives, sensitive…
Why AI-Powered Cyber Security is Essential in a Hyperconnected World
In today’s digital landscape, the boundaries of the corporate network have expanded far beyond the traditional data center. The rapid adoption of cloud, remote work, IoT, and mobile devices has reshaped how organizations operate—and how they must defend themselves against…
Tax Season Scams: How to Protect Yourself from Cyber Security Threats
Tax season is a critical time of year, not only for tax authorities but also for cyber criminals who seize the opportunity to launch targeted attacks. Individuals filing their taxes or dealing with tax-related matters become easy targets for attackers…
Celebrate World Cloud Security Day with our new Zero Trust and Hybrid Cloud Security eBook
Today, we recognize the value of cloud security. As more and more of our daily lives, business processes, and critical infrastructure are mediated by the cloud, ensuring ironclad cloud security takes on critical importance. From email and data storage to…
The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
The Weaponization of PDFs : 68% of Cyberattacks begin in your inbox, with 22% of these hiding in PDFs
Over 400 billion PDF files were opened last year, and 16 billion documents were edited in Adobe Acrobat. Over 87% of organizations use PDFs as a standard file format for business communication, making them ideal vehicles for attackers to hide…
Employee Spotlight: Getting to Know Vanessa Johnson
Vanessa, can you tell us a bit about yourself? I’m a proud Texas native with a passion for learning and helping others grow. I have a Bachelor’s degree in Marketing and a Master’s in Management and Administrative Sciences, which led…
What’s Next For Attack Surface Management? Perspectives From The Market Leader
We are delighted to announce that Cyberint, a Check Point company, was recently named a Leader and an Outperformer in the GigaOm Attack Surface Management Radar report. To read the full analysis, download the report here. In light of this…
Advanced Network Security with Check Point CloudGuard and Nutanix Cloud Platform
As businesses continue to migrate to the cloud, delivering the highest level of network security becomes increasingly challenging due to infrastructure and workload complexity. Check Point CloudGuard Network Security offers a comprehensive solution with Nutanix Cloud Platform to support advanced…
You Can Stockpile Food—But You Can’t Stockpile Trust
Why the EU’s Crisis Preparedness Needs a Digital Backbone The European Union recently urged its citizens to stock up on essentials—water, food, torches, medicine—for at least 72 hours in case of a major disruption. The recommendation, outlined in a report…
Backup Data Resiliency: Backups Alone Aren’t Enough
Every year, March 31st marks another World Backup Day—a timely reminder to check if our data protection strategies are truly ready for today’s volatile cyber landscape. It is an illusion to think that cyber attacks on any industry can be…
NIS2: What do we know so far about the EU’s expanded cyber security regulation?
When it comes to security, potent emerging threats on the horizon are causing regulators to be more proactive than ever. For organizations, this means constant reorientation to new compliance frameworks, obligations, and risks. At the forefront of this regulatory churn…
Transforming Security Management with AI Agents and Assistants
Attackers are already using AI, but you can return fire by deploying your own AI-powered cyber security tools. Turning to general use LLMs like ChatGPT or DeepSeek is not an option for security management as they are not specialized for…
Leveraging AI in Financial Services with Resilience and Security
The financial services sector is at a critical juncture as it faces increasing pressure to adopt cutting-edge technologies like AI to stay competitive and relevant. Financial services and financial technology companies are rapidly embracing AI advancements, particularly large language models…