Highlights The Education sector has been the most targeted industry this year to date, with an average of 3,086 attacks per organization per week, marking a 37% increase compared to 2023 The APAC region has witnessed the greatest number of…
Tag: Check Point Blog
Check Point and Cybrary: Empowering Customers with Cutting-Edge Cyber Security Training
In a world where cyber threats are constantly evolving, staying ahead of the curve is crucial for any organization. As a matter of fact, Check Point research shows a 30% Increase in Q2 of 2024 in global cyber attacks, which…
Digital Pioneers: Why Today’s Youth is the Best Generation to Support Cyber Security of the Future
Not only are participation and development integral themes in this year’s International Youth Day, but they are essential components in addressing the challenges posed by evolving cyber threats and emerging technologies On this year’s International Youth Day, celebrated on Monday…
How MSSPs Can Navigate the Regulatory Landscape: Ensuring Compliance
As regulatory bodies continuously update standards to address emerging security threats, Managed Security Service Providers (MSSPs) face significant challenges in keeping up with changing regulations. Consequently, they must not only practice vigilance and agility but also adopt a proactive approach…
Infinity Global Services and Cysurance Launch a Comprehensive Insurability Assessment Program
Check Point recently teamed up with Cysurance, a leader in next-generation risk mitigation, to launch a joint Insurability Assessment program. This innovative program is designed to help businesses proactively identify and mitigate potential cyber security risks, ensuring they meet stringent…
Unlock the Power of GenAI with Check Point Software Technologies
The GenAI Revolution is Already Here Generative AI applications like ChatGPT and Gemini are here to stay. But as they make users’ lives much simpler, they also make your organization’s life much harder. While some organizations have outright banned GenAI…
Securing Data in the AI Era: Introducing Check Point Harmony Endpoint DLP
In today’s digital landscape, data is the lifeblood of organizations. With the rapid adoption of Generative AI tools to boost productivity, data is being shared at unprecedented rates. While this revolution in AI promises immense benefits, it also introduces new…
New Generative AI-Powered Solutions to Secure the Workspace
Attending Black Hat? Join us at booth #2936 to get a glimpse of all our newest capabilities to secure your workspace and beyond. The risk of falling victim to ransomware attacks and leaking data to shadow software as a service (SaaS)…
Securing Data in the AI Era: Introducing Check Point Harmony DLP
In today’s digital landscape, data is the lifeblood of organizations. With the rapid adoption of Generative AI tools to boost productivity, data is being shared at unprecedented rates. While this revolution in AI promises immense benefits, it also introduces new…
Getting to Know Check Point Olympian: Ron Darmon
Get to know Ron Darmon, a former Olympic triathlete and now a data scientist on our XDR security content team. Discover how his Olympic experience has shaped his mindset and prepared him for a career in data science. Ron, how…
Getting to Know Tim Otis
Tim Otis, Head of Incident Response (IR) and Managed Detection and Response (MDR), brings 28 years of cyber security expertise to Check Point, where he has dedicated the past 17 years. His extensive experience spans roles in help desk, systems…
Over 20,000 Ubiquiti Cameras and Routers are Vulnerable to Amplification Attacks and Privacy Risks
Check Point Research (CPR) assessed the popular Ubiquiti G4 Instant Camera, a compact, wide-angle, WiFi-connected camera with two-way audio, along with the accompanying Cloud Key+ device that supports the application. Key Highlights CPR conducted an attack surface assessment, discovering two…
Are You Getting the Most Value from Your Existing CNAPP Solution?
As many organizations feel overwhelmed by increasing cloud complexity, Cloud Native Application Protection Platforms (CNAPPs) have emerged as a resource to ensure comprehensive and streamlined security. However, a robust CNAPP solution like Check Point CloudGuard offers so many features and…
Protecting Your Cloud Application Against Unknown Risks
Cloud native security measures are primarily focused on safeguarding against identifiable threats, employing innovative technologies like big data and AI to monitor and preempt potential attacks. Despite these efforts, however, no system can ever be completely impervious to threats. Even…
Check Point Research Reveals Q2 2024 Brand Phishing Trends: Microsoft Tops List While New Entries Signal Shifting Threat Landscape
Check Point Research ranks Microsoft as primary target in phishing attacks and notes the introduction of Adidas, WhatsApp and Instagram into the Top 10 Phishing attacks remain one of the most pervasive cyber threats and are often the entry point…
The Hidden Menace of Phantom Attackers on GitHub by Stargazers Ghost Network
Key Summary Never Seen Before Discovery: Check Point Research has uncovered the Stargazers Ghost Network, a sophisticated operation of ghost accounts on GitHub distributing malware through phishing repositories, marking the first time such an operation has been identified on this…
Why MSSPs Should Transition from Fear-Based Sales Strategies to a Value-Centric Approach
Shifting the Cyber security Sales Paradigm In cyber security sales, fear has long been the go-to approach. From warnings of impending cyber threats to fearmongering predictions of catastrophic breaches, the industry has often relied on fear-based ‘boogieman’ tactics to drive…
Empowering Women Through Mentoring: Meet Laura Hidalgo
Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…
Transforming MSSPs into Thought Leaders
A New Paradigm for Sales Motions Managed Security Service Providers (MSSPs) know that the Quarterly Business Review (QBR) with clients often masquerades as an opportunity to pitch new services, upsell existing ones, and raise bottom line. However, as the cybersecurity…
CrowdStrike Disruptions – Ensuring Business Continuity
In the last few hours, major disruptions on CrowdStrike’s Falcon platform causing significant productivity impacts due to inaccessible documents have been reported. The CrowdStrike Falcon update has led to a “blue screen of death” globally, severely impacting business operations dependent…