Tag: Check Point Software

Achilles: Small chip, big peril.

Read the original article: Achilles: Small chip, big peril. Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide With over 3 billion users globally, smartphones are an integral, almost inseparable part of our day-to-day lives. As the…

Rewarding Channel Excellence in Cloud Security

Read the original article: Rewarding Channel Excellence in Cloud Security By, Arthur Rutherford, Head of Cloud Security Channel Sales, WW Channel Sales Check Point has been 100% channel-driven since our inception more than 25 years ago.  With the support of…

TikToking all the way to your data

Read the original article: TikToking all the way to your data Since its introduction two years ago, short video app TikTok has surpassed over two billion downloads and continues to enjoy immense popularity. Unfortunately in recent months the app has…

Why Cloud Native Security Requires a Unified Platform

Read the original article: Why Cloud Native Security Requires a Unified Platform By, Trisha Paine, Head of Cloud Marketing Program Cloud security raises unique challenges compared to security on premises. Security professionals are now faced with the challenge of securing…

AWS Lambda Security Best Practices

Read the original article: AWS Lambda Security Best Practices Moving to serverless, including AWS Lambda, makes security both easier and harder, as I outlined in our Serverless Security Scorecard. In deploying serverless apps, you cede control over most of the…

AWS Lambda Security Best Practices

Read the original article: AWS Lambda Security Best Practices Moving to serverless, including AWS Lambda, makes security both easier and harder, as I outlined in our Serverless Security Scorecard. In deploying serverless apps, you cede control over most of the…

Striving to Achieve High Fidelity Cloud Security

Read the original article: Striving to Achieve High Fidelity Cloud Security By, Trisha Paine, Head of Cloud Marketing Programs Several attributes make posture management a particularly challenging component of cloud security. Securing a rapidly growing quantity -and variety- of cloud…

Cyber Attack Trends: 2020 Mid-Year Report

Read the original article: Cyber Attack Trends: 2020 Mid-Year Report At the start of 2020, very few people would have predicted the events that unfolded.  The COVID-19 global pandemic caused unprecedented changes to all of our lives, and has reshaped…

Microsoft Inspire: An Alliance Perspective

Read the original article: Microsoft Inspire: An Alliance Perspective By: Brad Orluk – Microsoft Alliance Manager, published July 20 2020 It’s that time of year again – time to celebrate our joint success over the past 12 months with our…

Twitter Platform Compromise

Read the original article: Twitter Platform Compromise Introduction A large number of high-profile Twitter accounts have been taken over on Wednesday in what seems to be a social engineering attack against some of Twitter’s employees. This included the accounts of…

Check Point Introduces Infinity SOC

Read the original article: Check Point Introduces Infinity SOC By Adeline Chan, Product Marketing Manager, Threat Prevention For many Security Operations Center (SOC) teams, finding malicious activity inside the network is like finding a needle in a haystack. They are often…

What Makes IoT Security in Hospitals Different

Read the original article: What Makes IoT Security in Hospitals Different July 16: Preventing Attacks on IoT Devices and Networks     Register: AMER | EMEA When it comes to securing their internet of things (IoT) devices, hospitals struggle with unique challenges. For some healthcare facilities,…

Top 4 Reasons Why Serverless Is Secure

Read the original article: Top 4 Reasons Why Serverless Is Secure By: Hillel Sollow, Serverless Security R&D We talk a lot about the need for a different security paradigm for AWS Lambda Security or Microsoft Azure, and it is easy…

How to Secure Cloud Workloads in Healthcare

Read the original article: How to Secure Cloud Workloads in Healthcare By: Trisha Paine, Head of Cloud Marketing Programs The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud.…

Protecting IoT devices and OT Networks from Cyber Attacks

Read the original article: Protecting IoT devices and OT Networks from Cyber Attacks Cyber criminals have taken advantage of the remote work required by the coronavirus by stepping up their attacks on medical, enterprise, and industrial IoT devices and critical…

Check Point and Partners Give Back

Read the original article: Check Point and Partners Give Back By, Abigail Maines, Head of Channel Sales, Americas Whether you are working from home for the first time, adjusting to the social distancing regulations, or balancing a job while teaching…

Nexus Zeta – From Suspicious Alerts to Conviction

Read the original article: Nexus Zeta – From Suspicious Alerts to Conviction Two years ago, we shared the interesting story of Nexus Zeta: How a newbie hacker managed to create a monster botnet. The attacker created an impressive attack chain…

5 Reasons to Re-Evaluate your Cloud Email Security

Read the original article: 5 Reasons to Re-Evaluate your Cloud Email Security Many organizations have moved to Office 365 or G-Suite for obvious reasons. However, are you aware of the new security risks that these new environments pose? We’ve listed…

Automating Cloud Native Security, at the Speed of DevOps

Read the original article: Automating Cloud Native Security, at the Speed of DevOps By, Trisha Paine, Head of Cloud Marketing Programs Speed and cloud complexity makes security for modern application development increasingly challenging. Many organizations are now developer-centered, incentivizing developers…

Improving Mobile Security: What Companies Need to Know

Read the original article: Improving Mobile Security: What Companies Need to Know The growing need for data mobility and corporate devices makes it vital for companies to implement cybersecurity strategies that are adapted to new scenarios and challenges Reality has…

CRN Channel Awards

Read the original article: CRN Channel Awards 2020 has been an amazing year so far for Check Point and our Partners.  We launched our new 2020 Partner Growth program in February this year at our annual event (pre-coronavirus).  Since then…

Protecting IoT devices and OT Networks from a Cyber Pandemic

Read the original article: Protecting IoT devices and OT Networks from a Cyber Pandemic During the coronavirus pandemic, enterprises rapidly moved to working remotely reducing their ability to secure their IT networks. A recent World Economic Forum analysis showed that…

Creating Harmony for Cloud Native Security

Read the original article: Creating Harmony for Cloud Native Security By, Monier Jalal, Head of Cloud Product Marketing It is no surprise that cloud adoption drives multiple business benefits, including decreased time to market, increased security, and business growth. However,…

Container Adoption Trends

Read the original article: Container Adoption Trends Trisha Paine, Head of Cloud Marketing Programs Containers have become one of the fastest growing technologies in the history of IT. Since DockerHub’s inception in 2013, billions of container images have been downloaded,…

Check Point Extends Partner Certifications

Read the original article: Check Point Extends Partner Certifications Check Point training and certification gives you the critical skills and knowledge you need to successfully implement and manage Check Point solutions and earn Check Point’s globally recognized certifications. With COVID-19…

Is Your Cloud Network Security Easy to Use?

Read the original article: Is Your Cloud Network Security Easy to Use? By Jonathan Maresky, CloudGuard Product Marketing Manager, published June 3, 2020 In a previous cloud security blog post, my colleague Hezi Bahry (cloud network security product manager) wrote…

Business Email Compromise: driving the cyber-crime pandemic

Read the original article: Business Email Compromise: driving the cyber-crime pandemic Business Email Compromise (BEC) attacks are a sophisticated type of scam that target both businesses and individuals with the aim of transferring funds from victims’ bank accounts to criminals.…

Least Privilege for AWS Lambda Security

Read the original article: Least Privilege for AWS Lambda Security By, Hillel Sollow, Serverless Security R&D If you are a security professional or at least someone who cares enough about security you will appreciate the importance of restricting privilege access…

Taking a second look at Two Factor Authentication

Read the original article: Taking a second look at Two Factor Authentication By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were compromised, single-factor…

Why You Need a Multi-Layered Approach to Mobile Security

Read the original article: Why You Need a Multi-Layered Approach to Mobile Security By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were compromised,…

Tax Season Phishing

Read the original article: Tax Season Phishing Recently, we came across a phishing document impersonating Form 1040. This is an IRS tax form filed by residents in the United States during the tax season. Attackers usually take advantage of the…

The Best Security Management is now in the Cloud

Read the original article: The Best Security Management is now in the Cloud By Michael A. Greenberg, Product Marketing Manager, Security Platforms Have you ever wondered what it would be like to manage your on-premises and virtual gateways from the…

Mobile adware: the silent plague with no origin

Read the original article: Mobile adware: the silent plague with no origin According to Check Point Software, 27% of companies worldwide have suffered attacks on their mobile devices, showing a clear upward trend of sixth generation attacks We are witnessing…

6 Serverless Security Mistakes You Should Never Make

Read the original article: 6 Serverless Security Mistakes You Should Never Make By, Hillel Sollow, Serverless Security R&D, published May 15, 2020 Securing your serverless application can feel overwhelming, especially when there are so many micro-services simultaneously running. Do you…

Coronavirus cyber-attacks update: beware of the phish

Read the original article: Coronavirus cyber-attacks update: beware of the phish New phishing campaigns discovered impersonating the WHO and popular conferencing platforms, to steal sensitive information Check Point has seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks,…

9 Serverless Security Best Practices You Must Read

Read the original article: 9 Serverless Security Best Practices You Must Read By, Hillel Sollow, Serverless Security R&D If you are an advocate of serverless, then it should come as no surprise that serverless application architectures actually improve security. You…

9 Serverless Security Best Practices You Must Read

Read the original article: 9 Serverless Security Best Practices You Must Read By, Hillel Sollow, Serverless Security R&D If you are an advocate of serverelss, then it should come as no surprise that serverless application architectures actually improve security. You…

How Resilient is your Endpoint Security Solution?

Read the original article: How Resilient is your Endpoint Security Solution? Abstract Have you recently examined your security solution for remote workers? Will your Endpoint Protection solution prevent the most complex, damaging attacks that your organization might face these days?…

Productivity and Zero-Day Prevention – A Zero-Sum Game?

Read the original article: Productivity and Zero-Day Prevention – A Zero-Sum Game? By Mor Ahuvia, Threat Prevention Product Marketing Manager Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect…

Is your Hospital Prepared for the Next Cyber Attack?

Read the original article: Is your Hospital Prepared for the Next Cyber Attack? By Dana Katz, Head of Product Marketing, Threat Prevention During the COVID-19 crisis, cyber-criminals have not gone into quarantine. They continue to seek out system vulnerabilities, and…

How to Implement Layered Security into Cloud Workloads

Microservices are quickly changing the face of cloud computing, giving cloud architects the tools needed to move away from provisioning resources statically, such as with servers and virtual machines (VMs). New types of workloads, like serverless and containers, realize greater…