Tag: Check Point Blog

New IDC survey confirms how far CISOs have evolved

Savvy security leaders must enable the business and protect their organizations In November 2023, IDC conducted an extensive global survey with 847 security leaders across 17 countries to better identify their roles, responsibilities, and the realities they face on the…

PCI Compliance Levels: A Developer’s Guide to PCI Compliance

Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance standard enforcement in organizations is not something software engineers are trained to do. So when the words “PCI compliance” are tossed around, for many developers…

SASE Survey Reveals User Experience Is Top of Mind

The results are in: end user experience is everything when it comes to SASE. That was the primary feedback from 650 security professionals we surveyed regarding SASE adoption. A full 71% put end user experience as their top concern. This…

2024’s Cyber Battleground Unveiled: Escalating Ransomware Epidemic, the Evolution of Cyber Warfare Tactics and strategic use of AI in defense – Insights from Check Point’s Latest Security Report

Key Takeaways: ·        Rising Threats: Cybersecurity landscape faces an unprecedented surge in ransomware attacks, with 1 in every 10 organizations globally being targeted in 2023. ·        Evolution of Tactics: Adversaries exploit zero-day vulnerabilities, employ disruptive wipers, utlise emerging RaaS (Ransomware-as-a-Service)…

Hybrid Mesh and the Check Point Infinity Platform

Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms (“Hybrid Mesh”). This blog explores what hybrid mesh is and how the Check Point Infinity Platform delivers on the promise of a cyber security strategy…

Getting to Know Muhammad Yahya Patel

Muhammad (Mo) Yahya Patel is a lead security engineer and a member of Check Point’s Office of the CTO. Before joining Check Point, Mo worked as a security consultant, designing and implementing security solutions for private and public sector organisations…

Get to Know Check Point Harmony SASE

Check Point’s new Secure Access Service Edge (SASE) offering is now called Harmony SASE. The world has changed in the last few years, and the old way of securing a standard on-premises network, with its notions of inside and outside…

Are People Problems Blocking Your Secure Cloud Migration?

Jonathan Maresky, Cloud Security Product Marketing Manager What gets in the way of successful and secure cloud migrations? Ask most CIOs, cloud architects or IT engineers that question, and their minds will probably first go to technological hurdles – like…

MalDocs in Word and Excel: A Persistent Cybersecurity Challenge

Highlights ·        Old Vulnerabilities Still Pose Risks: Despite being several years old, CVEs from 2017 and 2018 in Microsoft Word and Excel remain active threats in the cybersecurity landscape. Examples include CVE-2017-11882, CVE-2017-0199, and CVE-2018-0802. ·        Widespread Use by Cybercriminals:…