Tag: Check Point Software

The New Ransomware Threat: Triple Extortion

This article has been indexed from Check Point Software Global surge in ransomware attacks hits 102% increase this year compared to the beginning of 2020, and shows no sign of slowing down Number of organizations impacted by ransomware globally has…

Application Control in the World of Cloud and Shadow IT

Read the original article: Application Control in the World of Cloud and Shadow IT Cloud solutions are proliferating rapidly. Sometimes it seems like the pace is too fast, and is coming at the expense of security considerations. Sensitive information stored…

Moving Targets – the Growing Threat to Enterprise Mobiles

Read the original article: Moving Targets – the Growing Threat to Enterprise Mobiles Wherever legitimate business goes, criminals invariably follow to try and exploit those new opportunities.  And that was certainly true in 2020.  The COVID-enforced shift to remote working…

AWS Marketplace offerings explained: CloudGuard adds AWS GWLB

Read the original article: AWS Marketplace offerings explained: CloudGuard adds AWS GWLB By Jonathan Maresky, CloudGuard Product Manager, published April 14, 2021 Too much choice is often confusing. Think about all the different types of cereal, perfume, or even political…

Cloudified Data Centers are the New Normal

Read the original article: Cloudified Data Centers are the New Normal By Michael A. Greenberg, Product Marketing Manager, Security Platforms Ready to begin your data center transformation? Join the Webinar It is no secret, our networks and data centers have…

“The WAF Is Dead” (and we know who did it)

Read the original article: “The WAF Is Dead” (and we know who did it) TJ Gonen, Head of Cloud Security Products, Check Point The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of…

The Advantages of a Unified Approach to Cloud Data Security

Read the original article: The Advantages of a Unified Approach to Cloud Data Security By, Amit Sharon, Head of Customer Community Cloud computing is disrupting security models, leaving organizations struggling to figure out the most effective and efficient ways to…

Application Security: Why Prevention Beats Remediation

Read the original article: Application Security: Why Prevention Beats Remediation Author: Hillel Solow, Cloud Security Architect and Evangelist, Check Point Software Technologies Prevention of risk is top of mind for many in both our personal and professional lives. This holds…

What Should You Know About Cloud Security Solutions?

Read the original article: What Should You Know About Cloud Security Solutions? By, Gui Alvarenga Cloud security is a complex topic from a technical perspective, but the basics are easy to grasp. If you’re like most business decision makers, security…

New World – New Opportunities – New Offices

Read the original article: New World – New Opportunities – New Offices The coronavirus pandemic has demanded unprecedented lifestyle changes from our community. It was, and still is, a new challenge for all of us to face. As the day-to-day…

Attacks Targeting Microsoft Exchange: Check Point customers remain protected

Read the original article: Attacks Targeting Microsoft Exchange: Check Point customers remain protected On March 2nd , 2021, Volexity reported the in-the-wild exploitation of the following Microsoft Exchange Server vulnerabilities: CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065. Further investigation uncovered that an attacker was exploiting a zero-day…

Disrupting Cyber Strategies for 2021, and Beyond

Read the original article: Disrupting Cyber Strategies for 2021, and Beyond Early in 2020, few could have predicted the devastation with the spread of a biological virus. Coronavirus, SARS-CoV-2, and COVID-19 are terms we will never forget. As a counter…

Jian – The Chinese Double-edged Cyber Sword

Read the original article: Jian – The Chinese Double-edged Cyber Sword Highlights: A Chinese-affiliated attack group (APT31) cloned and actively used an American-affiliated attack group’s (Equation Group) cyber offensive tool code named “EpMe”. Both attack tools exploit a then unknown…

Why You Can’t See The App For The Microservices

Read the original article: Why You Can’t See The App For The Microservices By, Yaffa Finkelstein, Product Marketing Manager Last week, with school cancelled yet again, I watched my preschooler painstakingly build a complex bridge for his toy cars. He…

Emerging Mobile Threats and How to Prevent Them

Read the original article: Emerging Mobile Threats and How to Prevent Them By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In the new normal, your remote workforce is increasingly accessing corporate data from mobile devices. That means the exposure to…

Why You Can’t See The App For The Microservices

Read the original article: Why You Can’t See The App For The Microservices Last week, with school cancelled yet again, I watched my preschooler painstakingly build a complex bridge for his toy cars. He was immersed in the construction; precariously…

Emerging Mobile Threats and How to Prevent Them

Read the original article: Emerging Mobile Threats and How to Prevent Them By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention In the new normal, your remote workforce is increasingly accessing corporate data from mobile devices. That means the exposure to…

SOC Operations: 4 Top Challenges

Read the original article: SOC Operations: 4 Top Challenges The cyber threat landscape is ever-evolving, and as threats grow more sophisticated – so too must the strategies to prevent them. A Security Operations Center (SOC) is a centralized function within…

Why Managed Service Providers (MSPs) should think small for success: Check Point’s new Quantum Spark™ security gateways for SMBs bring major new Security-as-a-Service opportunities

Read the original article: Why Managed Service Providers (MSPs) should think small for success: Check Point’s new Quantum Spark™ security gateways for SMBs bring major new Security-as-a-Service opportunities Today’s cyber-landscape is tough for small to midsize businesses (SMBs).  Criminals and…

IoT Firmware Security: Zero-Day Exploitation & Prevention

Read the original article: IoT Firmware Security: Zero-Day Exploitation & Prevention Here’s how hackers can compromise your network via routers that aren’t protect with IoT device security Intro Security for the “Internet of Things” (or IoT) is still relatively new…

Rethinking Endpoint Security

Read the original article: Rethinking Endpoint Security Part 2: The top 5 must-have endpoint protections By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention Malicious actors worldwide are taking advantage of the sudden transition to the work from home reality, exploiting…

Are your Endpoints Affected by the SolarWinds Sunburst Attack?

Read the original article: Are your Endpoints Affected by the SolarWinds Sunburst Attack? By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention The SolarWinds Sunburst attack outburst has already affected 18,000 companies and government offices worldwide.  To help quickly determine whether…

TikTok fixes privacy issue discovered by Check Point Research

Read the original article: TikTok fixes privacy issue discovered by Check Point Research In recent months, Check Point Research teams discovered a vulnerability within the TikTok mobile application’s friend finder feature: a vulnerability that if exploited would have enabled  an…

Maintaining Security in a Multi-Cloud Environment

Read the original article: Maintaining Security in a Multi-Cloud Environment By, Kristin Manogue, Product Marketing Manager, Cloud Security Posture Management First off, we should ask: What does multi-cloud mean and how does it differ from the typical cloud approach? In…

The 5G Era: Secure your Everything

Read the original article: The 5G Era: Secure your Everything Supporting ten times more devices per km2 than 4G, higher capacity, faster connections, higher throughput and lower latency, the 5G cellular network is gearing up to become a legitimate replacement…

Infrastructure-as-Code Concepts

Read the original article: Infrastructure-as-Code Concepts By, Yaffa Finkelstein, Product Marketing Manager Cloud Application Security So what is Infrastructure-as-Code (IaC) anyway? IaC is a process that automates the provisioning and management of cloud resources. IaC software takes some input     scripts…

Rethinking Endpoint Security

Read the original article: Rethinking Endpoint Security Part 1: Five guiding principles for choosing the optimal endpoint security solution By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention With the sudden and massive shift to remote work, organizations and their endpoints…

Brand Phishing Report – Q4 2020

Read the original article: Brand Phishing Report – Q4 2020 Summary According to Check Point Research´s (CPR) analysis, Microsoft still lead the top ten-brand phishing in the last quarter of 2020, with many websites trying to impersonate Microsoft login screens…