The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Tag: Check Point Blog
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Check Point Software Technologies Expands SecureAcademy™ Program in Canada with Eight New Universities and Colleges to Empower the Next-Generation of Cybersecurity Professionals
The cybersecurity education program provides programming to academic institutions across the country, including Sheridan College, Willis College, and, most recently, the University of Calgary. Canadian organizations across all sectors are being targeted by cyberattacks. As the incidence of cybercrime continues…
Navigating the Terrain: GPT’s Journey into Malware Analysis
Key Takeaways: We delve into the inherent strengths and common challenges that GPT (OpenAI’s GPT-4 henceforth “GPT”) encounters when engaged in the realm of malware analysis, providing tangible examples for clarity. Examining the root cause and structure of the ‘ceiling’…
Check Point Awarded Silver Stevie for Achievement in Developing and Promoting Women
We are proud to be awarded the 2023 Silver Stevie for Achievement in Developing and Promoting Women! At Check Point, we believe that a diverse workforce encourages a wider variety of skills, talents, and viewpoints, leading to further creativity and…
Check Point Honors U.S. Active Military and Veterans with Launch of Employee Resource Group (ERG)
Check Point is proud to unveil its new U.S. Active Military, Veterans, and Allies Employee Resource Group (ERG), a valuable resource for all US employees – veterans and non-veterans alike. This initiative signifies more than a corporate addition, as it…
Data Posture Management in Action: Meet the New Check Point CloudGuard
Traditionally, securing sensitive data begins with scanning your environment and classifying the data, allowing you to pinpoint where sensitive information resides. This audit process instills confidence by enabling you to establish policies to prevent data breaches. However, it is crucial…
Keeping Up with Today’s Top Mobile Spyware Threat Trends
You’re doing all you can to build a hardened cybersecurity fortress around your digital assets. But are you leaving a backdoor open to attackers without realizing it? Mobile devices are central to how we all work today, but they’re also…
A Hole in the (fire) Wall: Check Point Research reveals technique allowing attackers to bypass Firewall rules designed to stop NTLM credential thefts, and provides protection methods
Highlights: Check Point Research (CPR) reveals a technique abusing Microsoft Access’s feature (Part of the Office suite) that might allow attackers to bypass Firewall rules designed to stop NTLM (NetNTLM) credential theft. Attacks against NTLM vary between brute force attacks…
October 2023’s Most Wanted Malware: NJRat Jumps to Second Place while AgentTesla Spreads through new File Sharing Mal-Spam Campaign
Check Point Research reported that NJRat climbed four places into second spot last month. Meanwhile a new mal-spam campaign was discovered involving AgentTesla, the sixth most used malware, being delivered via corrupted file attachments Our latest Global Threat Index for…
Elevating Cybersecurity Prevention: Check Point Software’s Innovative MSSP Program Redefines Security Collaboration
Simplified, Scalable, and Forward-Thinking Advancements for Managed Security Services Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has enhanced its MSSP Partner Program. This move addresses the critical workforce shortage in cybersecurity and…
Cloud Security in Action: Meet Check Point CloudGuard
Digital transformation and the widespread adoption of cloud technologies are creating mega-shifts across all industries. The adoption of cloud is far from straightforward and linear, as companies navigate their cloud adoption journey in phases. Moreover, the range of technologies employed…
Check Point Recognized on the 2023 CRN Edge Computing 100 List
Today, accelerated cloud adoption and hybrid work require security to expand beyond the traditional network perimeter, making edge security a paramount focus. CRN’s fourth-annual Edge Computing 100 list honors trailblazing vendors leading the channel with next-generation technology that helps build…
Getting to Know Zehra Hussain
Zehra Hussain is an Incident Response Analyst based in Sydney, Australia. Her role involves responding to security incidents and ensuring the protection of sensitive data and systems. With a background in digital forensics and satellite engineering, Zehra brings unique expertise…
“The Big Bully : Importance of detecting and preventing cyberbullying”
Check Point Software highlights the growth of cyberbullying among young people and the need to take measures to reduce it. In the United States, nearly 50% of teenagers between the ages of 13 and 17 had experienced cyberbullying. Our society…
Why OSS Packages Can’t Scale without New Security Measures
In the vibrant arena of software development, open-source software (OSS) has emerged as a vital catalyst for spurring innovation, nurturing collaboration, and boosting cost efficiency. OSS projects have seen explosive growth, with millions of dedicated developers contributing to a jaw-dropping…
Unraveling the Scarred Manticore Saga: A Riveting Epic of High-Stakes Espionage Unfolding in the Heart of the Middle East
Highlights: 1. Silent Intruders: Scarred Manticore, an Iranian cyber threat group linked to MOIS (Ministry of Intelligence & Security), is quietly running a stealthy sophisticated spying operation in the Middle East. Using their latest malware tools framework, LIONTAIL, they have…