Read the original article: Our New Year’s Resolution for You: Protect Your IoT Networks and Devices! By, Mitch Muro, Product Marketing Manager Can 2020 just be over yet?! I mean, come on. Not only have we been struck with one…
Tag: Check Point Software
AESI Acumen Engineered Solutions International Inc./ AESI-US Inc. (‘AESI’) simplifies mission-critical security operations with Check Point Software
Read the original article: AESI Acumen Engineered Solutions International Inc./ AESI-US Inc. (‘AESI’) simplifies mission-critical security operations with Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software A consulting company gains cloud-based…
Scalable remote access with VMSS enhances Azure security, while working from home
Read the original article: Scalable remote access with VMSS enhances Azure security, while working from home By Hezi Bahry, CloudGuard Product Manager, published December 30, 2020 In the early stages of the Coronavirus pandemic, many customers contacted us with concerns…
Best Practice: Identifying And Mitigating The Impact Of Sunburst
Read the original article: Best Practice: Identifying And Mitigating The Impact Of Sunburst Introduction During the closing weeks of 2020 a Cyber Security attack became one of the main headline news stories of what had already been a news-rich year.…
10 Must-have Cyber Security Resources as You Plan for 2021
Read the original article: 10 Must-have Cyber Security Resources as You Plan for 2021 In looking back at 2020, organizations saw an increase in the most devastating forms of ransomware, botnets spreading threats to IoT devices, a shocking set of…
SolarWinds Sunburst Attack: What Do You Need to Know and How Can You Remain Protected
Read the original article: SolarWinds Sunburst Attack: What Do You Need to Know and How Can You Remain Protected On the week of December 13th , US government offices exposed they were targeted by a series of mega cyber attacks,…
SolarWinds Sunburst Attack: What do you need to know and how can you remain protected
Read the original article: SolarWinds Sunburst Attack: What do you need to know and how can you remain protected On the week of December 13th , US government offices exposed they were targeted by a series of mega cyber attacks,…
The Cyber Pandemic is Here – Protect Your Organization
Read the original article: The Cyber Pandemic is Here – Protect Your Organization The COVID-19 pandemic has had a dramatic effect on organizations globally. As previously reported, threat actors will always seek to take advantage of major events or changes…
Check Point CloudGuard is a launch partner for AWS Outposts to Enhance AWS Hybrid-Cloud Security
Read the original article: Check Point CloudGuard is a launch partner for AWS Outposts to Enhance AWS Hybrid-Cloud Security By Jonathan Maresky, CloudGuard Product Marketing Manager, published December 14, 2020 Check Point is a launch partner for Amazon Web Services…
Check Point CloudGuard is a launch partner for AWS Outposts to Enhance AWS Hybrid-Cloud Security
Read the original article: Check Point CloudGuard is a launch partner for AWS Outposts to Enhance AWS Hybrid-Cloud Security By Jonathan Maresky, CloudGuard Product Marketing Manager Check Point is a launch partner for Amazon Web Services (AWS) Outposts. This recognizes…
Eye on the Eye – Increasing Security and Visibility for your IP Cameras
Read the original article: Eye on the Eye – Increasing Security and Visibility for your IP Cameras Adi Ikan, Network Research & Protection Group Manager Oren Koren, Senior Cyber Security Product Manager Ibrahim Shibli, Security Expert IP cameras, a type…
Covid-19 ‘Vaccines’ Touted for Just $250 on Darknet
Read the original article: Covid-19 ‘Vaccines’ Touted for Just $250 on Darknet Range of counterfeit coronavirus vaccines and medicines offered on Darknet Vaccine-related phishing campaigns take advantage of the global race to deliver the shots Covid vaccine-related domains show sharp…
Game over? Vulnerabilities on Valve’s Steam put hundreds of thousands gamers at risk
Read the original article: Game over? Vulnerabilities on Valve’s Steam put hundreds of thousands gamers at risk Highlights: CP<R> found four major vulnerabilities in the popular Valve games networking library. All vulnerabilities were acknowledged and received CVE’s. If exploited, an…
Aligning Secure Remote Access to NIST Guidelines
Read the original article: Aligning Secure Remote Access to NIST Guidelines With 80% of security professionals scaling up their remote access infrastructure, per Check Point research, certain controls should be applied to ensure that security is not compromised. Below are…
November 2020’s Most Wanted Malware: Notorious Phorpiex Botnet Returns As Most Impactful Infection
Read the original article: November 2020’s Most Wanted Malware: Notorious Phorpiex Botnet Returns As Most Impactful Infection Check Point Research reports new surge in attacks using the Phorpiex Botnet delivering the Avaddon ransomware in malicious spam campaigns Our latest Global…
The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organizations’ Security Priorities for 2021 and Beyond
Read the original article: The ‘New Normal’ is Here to Stay for Some Time: New Survey Reveals Organizations’ Security Priorities for 2021 and Beyond As 2020 draws to a close, we are approaching a milestone on the pathway through the…
AWS Instance Metadata Service (IMDS) Best Practices
Read the original article: AWS Instance Metadata Service (IMDS) Best Practices Omer Shliva Cloud Guard Dome9 Research Introduction Metadata is “data that provides information about other data” (Wikipedia). In other words, Metadata is “data about data”. In AWS, Instance Metadata…
Living in a Post-quantum Cryptography World
Read the original article: Living in a Post-quantum Cryptography World By Julia Rabinovich, Architect, Network Security Products Today, it is pretty expected from what we can see in the way hackers go after their victims. Whether through social engineering, phishing…
ARSAT Migrates to Check Point Software in Record Time
Read the original article: ARSAT Migrates to Check Point Software in Record Time By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Empresa Argentina de Soluciones Satelitales Sociedad Anónima (ARSAT) is one of the largest ISPs…
40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk?
Read the original article: 40% of the World’s Mobile Devices are Inherently Vulnerable. Is your Corporate Data at Risk? By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention These days you use your smartphone to do your job more than ever…
Widespread android applications still exposed to vulnerability on google play core library
Read the original article: Widespread android applications still exposed to vulnerability on google play core library High profile android apps still exposed to a CVE reported in August, patched in April If exploited, attacker can grab credentials, steal 2FA codes,…
Check Point IoT Protect Firmware
Read the original article: Check Point IoT Protect Firmware A complete end-to-end solution for all your firmware security needs. By Mor Ahuvia, Product Marketing Manager and Bob Bent, Technical Marketing Manager To build connected devices that are ‘secure by design’…
Telecommunication Service Providers Secure Businesses Using Check Point’s Comprehensive Portfolio of Security Services
Read the original article: Telecommunication Service Providers Secure Businesses Using Check Point’s Comprehensive Portfolio of Security Services The Telecommunications Industry is undergoing a number of significant changes which are reshaping the market. The demand for more bandwidth and higher throughput…
Where’s the package I’m expecting? Watch out for shipping and delivery-related phishing emails that try to track YOUR details
Read the original article: Where’s the package I’m expecting? Watch out for shipping and delivery-related phishing emails that try to track YOUR details The CDC (The Centers for Disease Control and Prevention) classified “shopping at crowded stores just before, on or…
The Must See List. A Look at AWS re:Invent 2020
Read the original article: The Must See List. A Look at AWS re:Invent 2020 AWS re:Invent is here, and although this is a change from the usual single week of learning and innovation in Las Vegas, the enriched three weeks…
Preventing the Unknown with Static Analysis
Read the original article: Preventing the Unknown with Static Analysis This blog provides insights into zero-day unknown threats – what are they, and why is it a challenge to protect against them. Also, it covers Check Point SandBlast Agent’s approach,…
Check Point Software Revolutionize Its Cyber Security Certification Program
Read the original article: Check Point Software Revolutionize Its Cyber Security Certification Program CHECK POINT to launch CCSM ELITE certification, as part of a vast certification update The Check Point Learning & Training department is excited to announce its new…
Beware of WAPDropper, the mobile malware that subscribes users to Premium Rate Services
Read the original article: Beware of WAPDropper, the mobile malware that subscribes users to Premium Rate Services None of us likes to receive a bill that’s much larger than we were expecting – especially when we have no knowledge of…
Microsoft & Google Impersonation Attacks Are on the Rise – How to Stay Safe
Read the original article: Microsoft & Google Impersonation Attacks Are on the Rise – How to Stay Safe Do you feel that your inbox is burdened with an increasing number of phisy-looking emails, now more than ever before? Well, that’s…
Check Point Software Partners with (ISC)² to Further Develop C level executives Key Cyber Security Skills
Read the original article: Check Point Software Partners with (ISC)² to Further Develop C level executives Key Cyber Security Skills (ISC)² cyber-security courses and programs will soon be available via Check Point’s training portal, helping to address the global shortage…
Achieving K8 Security @ The Speed & Scale of DevOps
Read the original article: Achieving K8 Security @ The Speed & Scale of DevOps By, Yaffa Finkelstein, Product Marketing How many workloads is your organization running? How are you keeping your cloud native applications – the drivers of your business…
Who’s Calling? How to Avoid Being Hooked by Vishing – the New Old-School Phone Scam
Read the original article: Who’s Calling? How to Avoid Being Hooked by Vishing – the New Old-School Phone Scam FBI and CISA warn against surge in voice phishing campaigns targeting employees working remotely Hackers profile and target employees using information…
Enhancing Cloud Security Posture for AWS Network Firewall
Read the original article: Enhancing Cloud Security Posture for AWS Network Firewall By, Trisha Paine, Head of Cloud Product Marketing Amazon Web Services (AWS) just announced the availability of the AWS Network Firewall, a managed service that makes it easy…
Phishing emails double in November in run-up to Black Friday and Cyber Monday
Read the original article: Phishing emails double in November in run-up to Black Friday and Cyber Monday This year has already been a record-breaker in terms of online shopping as a result of Covid-19 related restrictions and concerns, and more…
Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant
Read the original article: Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant Check Point Software Technologies is proud to be named a Leader in the 2020 Magic Quadrant for Network Firewalls (NFW). This…
Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch
Read the original article: Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch By Jonathan Maresky, CloudGuard Product Marketing Manager, published November 10, 2020 Cloud security is not a trivial practice of “click-and-deploy”, “one-size-fits-all” or even “my cloud…
Check Point Software´s predictions for 2021: Securing the ‘next normal’
Read the original article: Check Point Software´s predictions for 2021: Securing the ‘next normal’ “Life is what happens while you’re making other plans,” said John Lennon. And the events of 2020 have shown how right he was. If you had…
Critical Vulnerability in Windows OS – Check Point customers remain protected
Read the original article: Critical Vulnerability in Windows OS – Check Point customers remain protected Only five days after Google disclosed information about a critical vulnerability in the Microsoft Windows operating system (CVE-2020-17087), Check Point has officially released protection to…
Check Point Presents the First Autonomous Threat Prevention System
Read the original article: Check Point Presents the First Autonomous Threat Prevention System How many hours have you or your security admins spent on managing and configuring threat prevention policies? And how long did it take to get conversant enough…
New Check Point R81 is Industry’s First Cyber Security Platform with Autonomous Threat Prevention
Read the original article: New Check Point R81 is Industry’s First Cyber Security Platform with Autonomous Threat Prevention By Michael A. Greenberg, Product Marketing Manager, Security Platforms Watch the Webinar Replay Managing cyber security today is complex, there are so…
October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks
Read the original article: October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks Check Point researchers report that Trickbot and Emotet top the Global Threat Index, and are being used for distributing ransomware against…
Who’s Calling? Gaza and West-Bank Hackers Exploit and Monetize Corporate VoIP Phone System Vulnerability Internationally
Read the original article: Who’s Calling? Gaza and West-Bank Hackers Exploit and Monetize Corporate VoIP Phone System Vulnerability Internationally Hackers have targeted Sangoma and Asterisk VoIP phone systems at nearly 1,200 organizations worldwide in past 12 months Main purpose of…
Check Point Software Joins Microsoft OCP FY21 Q1 Winners Circle Program
Read the original article: Check Point Software Joins Microsoft OCP FY21 Q1 Winners Circle Program Check Point is proud to announce that Microsoft has awarded us ‘Top Azure P2P IP Co-Sell by an ISV partner’ for the Microsoft OCP FY21…
Infrastructure as Code assessment with Terraform
Read the original article: Infrastructure as Code assessment with Terraform Security is of utmost importance for any piece of code or infrastructure The traditional security approach was based on a ticketing system to provision a piece of infrastructure. This method…
Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks
Read the original article: Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks Healthcare is the most targeted industry, by ransomware, in the US in October October saw a 71% increase in Ransomware attacks against the healthcare sector in the…
Don’t Let Hackers Throw Your Brand Integrity Down the Drain
Read the original article: Don’t Let Hackers Throw Your Brand Integrity Down the Drain By Yaelle Harel and Yair Herling, Technical Product Marketing Social Phishing attacks remain the most successful methods used to execute attacks and steal data. Lookalike domains…
Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak
Read the original article: Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak Check Point Software’s Learning and Training department’s main mission is to make cyber security knowledge accessible to everyone. In just a few months, students…
Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data
Read the original article: Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point IMC Companies provides supply chain expertise to customers across…
Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild
Read the original article: Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild Adi Ikan, Network Research & Protection Group Manager On Tuesday October 20, 2020, the NSA published a detailed report informing the public of…
Use Case: Automated Endpoint Detection & Response
Read the original article: Use Case: Automated Endpoint Detection & Response By Yaelle Harel, Technical Product Marketing Manager Only 22% of Security and IT professionals strongly believe that their organization is fully ready to respond to a cyber-attack or a…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #8: 5 Must Have Protections for Office 365 and G Suite The COVID-19 pandemic has had a dramatic effect on every organization since it came on…
5G: Better, Always-on Connectivity Demands Better, Always-on Security
Read the original article: 5G: Better, Always-on Connectivity Demands Better, Always-on Security Protecting the new generation of 5G-based applications against advanced cyber-attacks How fast is your Internet connection right now? No matter what speeds you’re currently getting, they’re just a…
Check Point Software and Splunk Showcase Automated Threat Response at Splunk .conf20
Read the original article: Check Point Software and Splunk Showcase Automated Threat Response at Splunk .conf20 20–21 October | AMER 21–22 October | EMEA & APAC Comprehensive security has never been more important than today with the significant increase in…
Enhancing Threat Hunting with MITRE ATT&CK
Read the original article: Enhancing Threat Hunting with MITRE ATT&CK By Yaelle Hare, Technical Product Marketing Manager Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involved searching for indicators of compromise…
Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets
Read the original article: Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets By Jonathan Maresky, CloudGuard Product Marketing Manager, published October 21, 2020 When it comes to security in the cloud, companies face constant, daily threats. This…
Five Reasons to Reevaluate Your Endpoint Protection
Read the original article: Five Reasons to Reevaluate Your Endpoint Protection By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention These days, endpoint security plays a major role in maintaining high security posture. However, a study conducted in mid-2020 revealed that…
Cloud Threat Hunting: Attack & Investigation Series- Privilege Escalation via Lambda
Read the original article: Cloud Threat Hunting: Attack & Investigation Series- Privilege Escalation via Lambda Author: Maya Levine, Technical Marketing Engineer Cloud breaches are becoming increasingly prevalent in this modern digital era. One of the more dangerous strategies attackers deploy…
Microsoft is Most Imitated Brand for Phishing Attempts in Q3 2020
Read the original article: Microsoft is Most Imitated Brand for Phishing Attempts in Q3 2020 Check Point Research issues Q3 Brand Phishing Report, highlighting the brands that hackers imitated the most to lure people into giving up personal data Our…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #7: What Can a Malicious Email Do? The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late…
Paschoalotto gains Scalable Call Center Security with Check Point Software
Read the original article: Paschoalotto gains Scalable Call Center Security with Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point READ MORE > Paschoalotto Financial Services is a leading supplier of call-center and…
Notice the unnoticed: Threat Hunting by SandBlast Agent
Read the original article: Notice the unnoticed: Threat Hunting by SandBlast Agent By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involves searching for indicators of…
Check Point and Ansible Showcase Automated Security Management at AnsibleFest 2020
Read the original article: Check Point and Ansible Showcase Automated Security Management at AnsibleFest 2020 Security landscapes and threats are rapidly evolving, driven by the rise of virtualized networks, public and private clouds, SDN, and the Internet of Things (IoT).…
As the 2020 US presidential election approaches, cybersecurity risks abound
Read the original article: As the 2020 US presidential election approaches, cybersecurity risks abound Election-related domains are 56% more likely to be malicious than other new domains 16% of all election-related domains created in September were malicious 24% increase in…
Secure Your Containers Like Your Apps Depend On It
Read the original article: Secure Your Containers Like Your Apps Depend On It By, Yaffa Finkelstein, Product Marketing Manager Security professionals are all too aware that their container environments are enormous. Assessing its true scale is virtually impossible. On top…
Ransomware: How to Avoid the Dangerous Wave of Attacks
Read the original article: Ransomware: How to Avoid the Dangerous Wave of Attacks By Yaelle Harel, Technical Product Marketing Manager The average cost to rectify the impacts of most recent ransomware attacks is US$732,520 for organizations that don’t pay the…
How SandBlast Mobile’s integration with Google Cloud enhances your Mobile Security Posture
Read the original article: How SandBlast Mobile’s integration with Google Cloud enhances your Mobile Security Posture By Hagay Sharon, Mobile Solutions Product Manager Mobile Security is no longer optional. The working from home routine, where employees are increasingly accessing corporate…
How to avoid the dangerous wave of ransomware attacks
Read the original article: How to avoid the dangerous wave of ransomware attacks By Yaelle Harel, Technical Product Marketing Manager The average cost to rectify the impacts of most recent ransomware attacks is US$732,520 for organizations that don’t pay the…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #6: 5 Principles for Selecting the Optimal Mobile Security Solutions The COVID-19 pandemic has had a dramatic effect on every organization since it came on the…
Looking forward to Amazon Prime Day? Be cautious: Hackers are too
Read the original article: Looking forward to Amazon Prime Day? Be cautious: Hackers are too Millions of consumers are eagerly anticipating Amazon’s annual online shopping extravaganza, Amazon Prime Day. This year, Amazon is offering more than 1 million deals through…
Enhancing Serverless Security with Check Point CloudGuard and AWS Lambda Extensions
Read the original article: Enhancing Serverless Security with Check Point CloudGuard and AWS Lambda Extensions By, Hillel Solow, Serverless Security R&D With no compute, VM, container, or network, serverless computing offers the ultimate reduction in security attack surface. With the…
September 2020’s Most Wanted Malware: New Info-stealing Valak Variant Enters Top 10 Malware List For First Time
Read the original article: September 2020’s Most Wanted Malware: New Info-stealing Valak Variant Enters Top 10 Malware List For First Time Check Point researchers find sharp increase in attacks using new Valak malware, while the Emotet trojan remains in 1st…
Global Surges in Ransomware Attacks
Read the original article: Global Surges in Ransomware Attacks In Q3 2020, Check Point Research saw a 50% increase in the daily average of ransomware attacks, compared to the first half of the year Countries with the most number of…
Check Point Software and NVIDIA Partner to Secure the Datacenter with Infinity Next
Read the original article: Check Point Software and NVIDIA Partner to Secure the Datacenter with Infinity Next Infinity Next Nano Agent Security integrated with NVIDIA SmartNICs with Bluefield-2 DPUs As enterprises become more distributed with the hybrid cloud, artificial intelligence…
Cloud Security: 12 Myths vs Facts
Read the original article: Cloud Security: 12 Myths vs Facts By, Gui Alvarenga, Cloud Security Product Marketing As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads…
Cloud Security: 12 Myths vs Facts
Read the original article: Cloud Security: 12 Myths vs Facts By, Gui Alvarenga, Cloud Security Product Marketing As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #4: 5 Principles for Choosing the Right Endpoint Security The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene…
Check Point Software Offers a FREE online course on SMB security technologies and solutions
Read the original article: Check Point Software Offers a FREE online course on SMB security technologies and solutions Check Point Software is excited to offer a free 2 hour self-paced online jump start course for SMBs, as part of our…
#InstaHack: how researchers were able to take over the Instagram App using a malicious image
Read the original article: #InstaHack: how researchers were able to take over the Instagram App using a malicious image Instagram is one of the most popular social media platforms globally, with over 100+ million photos uploaded every day, and nearly…
Check Point Protects Microsoft Azure vWAN from Sophisticated Cyber Attacks
Read the original article: Check Point Protects Microsoft Azure vWAN from Sophisticated Cyber Attacks Microsoft Ignite featuring CloudGuard Connect as Trusted Security Partner for Microsoft Azure Check Point is a Microsoft featured Partner for the Microsoft Ignite online conference Sept…
The Trend Toward Serverless: What, Why, and How?
Read the original article: The Trend Toward Serverless: What, Why, and How? Serverless has been taking the web development world by storm. Many developers opt to pursue serverless functions in new application architectures where a microservice approach would support more…
RampantKitten: An Iranian Surveillance Operation unraveled
Read the original article: RampantKitten: An Iranian Surveillance Operation unraveled Check Point Research has unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were…
Focus on Microsoft Ignite: What Check Point’s Azure Integrations Mean for the Future of Enterprise Business
Read the original article: Focus on Microsoft Ignite: What Check Point’s Azure Integrations Mean for the Future of Enterprise Business By Paul Ardoin, Cloud Alliance Marketing Manager, published September 17, 2020 Check Point is no stranger to shaping the future…
Cloud Threat Hunting: Attack & Investigation Series- Breach of Major Financial Institution
Read the original article: Cloud Threat Hunting: Attack & Investigation Series- Breach of Major Financial Institution By, Maya Levine, Technical Marketing Engineer Probably the most infamous breach of this past year against a major financial institution did not utilize the…
Not for higher education: cybercriminals target academic & research institutions across the world
Read the original article: Not for higher education: cybercriminals target academic & research institutions across the world Across the USA, Europe and Asia, there was an increase in the number of attacks targeting the education and research sector in recent…
How SandBlast Mobile’s Zero-Touch Deployment enhances your Mobile Workforce Security
Read the original article: How SandBlast Mobile’s Zero-Touch Deployment enhances your Mobile Workforce Security By Yaelle Harel, Threat Prevention Technical Product Manager Mobile Security is no longer optional. The working from home routine, where employees are increasingly accessing corporate data…
CloudGuard Intelligence & Threat Hunting
Read the original article: CloudGuard Intelligence & Threat Hunting Transform your Logs into Actionable Security Logic By, CloudGuard Research team Many companies shifting to the cloud still rely on traditional SIEM solutions and analytics tools to understand cloud logs, activities,…
For the third consecutive time, Check Point named a Leader in the IDC MarketScape for Mobile Threat Management
Read the original article: For the third consecutive time, Check Point named a Leader in the IDC MarketScape for Mobile Threat Management We are proud to announce that Check Point, with its SandBlast Mobile security solution, is recognized as a…
Top Cloud Security Challenges in 2020
Read the original article: Top Cloud Security Challenges in 2020 By, Trisha Paine, Head of Cloud Marketing Programs Migration to the cloud has accelerated recently, especially in light of the COVID-19 outbreak. This global shift towards a nearly 100% remote…
August 2020’s Most Wanted Malware: Evolved Qbot Trojan Ranks On Top Malware List For First Time
Read the original article: August 2020’s Most Wanted Malware: Evolved Qbot Trojan Ranks On Top Malware List For First Time Check Point researchers find dangerous new Qbot variant is spreading via malspam campaign to execute credentials theft, ransomware installation and…
8-Part Video Guide: How to Secure your Remote Workforce, part #2
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce, part #2 Part #2: 3 key principles to securing your remote workforce The COVID-19 pandemic has had a dramatic effect on every organization since it came on…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #1: Cyber Threats to Remote Employees in 2020 The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in…
Check Point is the Microsoft US Partner Award Winner for Azure Commercial Marketplace
Read the original article: Check Point is the Microsoft US Partner Award Winner for Azure Commercial Marketplace By Jonathan Maresky, CloudGuard Product Marketing Manager, published September 4, 2020 Looking back on Microsoft’s 2020 financial year (“FY20”), which ended June 30,…
Check Point Awarded Microsoft US Partner of the Year Award for Azure Marketplace
Read the original article: Check Point Awarded Microsoft US Partner of the Year Award for Azure Marketplace By Jonathan Maresky, CloudGuard Product Marketing Manager, published September 4, 2020 Looking back on Microsoft’s 2020 financial year (“FY20”), which ended June 30,…
8-Part Video Guide: How to Secure your Remote Workforce
Read the original article: 8-Part Video Guide: How to Secure your Remote Workforce Part #1: Cyber Threats to Remote Employees in 2020 The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in…
Education in a Pandemic: Protect Your Kids from Virtual Back-to-school Threats
Read the original article: Education in a Pandemic: Protect Your Kids from Virtual Back-to-school Threats July and August means back-to-school for many, with millions of children gearing up to return to the classroom. However, this year, back-to-school will be different,…
A CISO takes a look at consolidating security solutions in their shop
Read the original article: A CISO takes a look at consolidating security solutions in their shop By Brian Gleeson, Head of Infinity Product Marketing I spoke to a good friend the other day, who until quite recently was a practicing…
Securing Android Devices regardless of the owner
Read the original article: Securing Android Devices regardless of the owner By Yaelle Harel, Threat Prevention Technical Product Manager In Android 11, Google is bringing their data separation model, work profile, to company-owned devices. The work profile contains all corporate…
Securing Android Devices regardless of the owner
Read the original article: Securing Android Devices regardless of the owner By Yaelle Harel, Threat Prevention Technical Product Manager In Android 11, Google is bringing their data separation model, work profile, to company-owned devices. The work profile contains all corporate…
Check Point and Cisco Deliver Enterprise-Grade Branch SD-WAN Security and Networking
Read the original article: Check Point and Cisco Deliver Enterprise-Grade Branch SD-WAN Security and Networking Enterprises are moving their applications, workloads and services out of the data center and into the cloud. Enterprises are turning away from traditional WAN architectures…
Automate certificate management on your firewall to find threats in encrypted HTTPS sessions
Read the original article: Automate certificate management on your firewall to find threats in encrypted HTTPS sessions One of the common requests we get in RFPs (Request for Proposals) from enterprises and especially large enterprises for Check Point Next Gen…