Read the original article: Cloud Threat Hunting: Attack & Investigation Series – Privilege Escalation via EC2 By, Maya Levine, Technical Marketing Engineer Cloud breaches are becoming increasingly prevalent in this modern digital era. One of the more dangerous strategies attackers…
Tag: Check Point Software
Threat actors join in the race towards a coronavirus vaccine
Read the original article: Threat actors join in the race towards a coronavirus vaccine It seems that Covid-19 is here to stay, at least in the foreseeable future, and for many, a vaccine is the only hope for everyone being…
Threat actors join in the race towards a coronavirus vaccine
Read the original article: Threat actors join in the race towards a coronavirus vaccine It seems that Covid-19 is here to stay, at least in the foreseeable future, and for many, a vaccine is the only hope for everyone being…
July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence
Read the original article: July‘s Most Wanted Malware: Emotet Strikes Again After Five-Month Absence Check Point Research finds sharp increase in the Emotet botnet spreading spam campaigns after period of inactivity, aiming to steal banking credentials and spread inside targeted…
Achilles: Small chip, big peril.
Read the original article: Achilles: Small chip, big peril. Over 400 vulnerabilities on Qualcomm’s Snapdragon chip threaten mobile phones’ usability worldwide With over 3 billion users globally, smartphones are an integral, almost inseparable part of our day-to-day lives. As the…
Rewarding Channel Excellence in Cloud Security
Read the original article: Rewarding Channel Excellence in Cloud Security By, Arthur Rutherford, Head of Cloud Security Channel Sales, WW Channel Sales Check Point has been 100% channel-driven since our inception more than 25 years ago. With the support of…
Midwest Rubber Secures SaaS applications and endpoints with Check Point
Read the original article: Midwest Rubber Secures SaaS applications and endpoints with Check Point By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Read how a leading manufacturer of rubber products for industries worldwide gained complete…
TikToking all the way to your data
Read the original article: TikToking all the way to your data Since its introduction two years ago, short video app TikTok has surpassed over two billion downloads and continues to enjoy immense popularity. Unfortunately in recent months the app has…
The World’s Fastest 1U Security Gateway in the Industry is Here
Read the original article: The World’s Fastest 1U Security Gateway in the Industry is Here By Michael A. Greenberg, Product Marketing Manager, Security Platforms Register Now! August 11th EMEA & APAC | August 11th Americas Check Point recently revealed the…
Google and Amazon overtake Apple as most imitated brands for phishing in Q2 2020
Read the original article: Google and Amazon overtake Apple as most imitated brands for phishing in Q2 2020 When the career criminal Willie Sutton was asked by a reporter why he robbed so many banks, he reportedly answered: “Because that’s…
Why Cloud Native Security Requires a Unified Platform
Read the original article: Why Cloud Native Security Requires a Unified Platform By, Trisha Paine, Head of Cloud Marketing Program Cloud security raises unique challenges compared to security on premises. Security professionals are now faced with the challenge of securing…
AWS Lambda Security Best Practices
Read the original article: AWS Lambda Security Best Practices Moving to serverless, including AWS Lambda, makes security both easier and harder, as I outlined in our Serverless Security Scorecard. In deploying serverless apps, you cede control over most of the…
AWS Lambda Security Best Practices
Read the original article: AWS Lambda Security Best Practices Moving to serverless, including AWS Lambda, makes security both easier and harder, as I outlined in our Serverless Security Scorecard. In deploying serverless apps, you cede control over most of the…
Check Point CloudGuard Connect Protects Microsoft Azure Branch Office Internet Connections from Cyber Attacks
Read the original article: Check Point CloudGuard Connect Protects Microsoft Azure Branch Office Internet Connections from Cyber Attacks By Russ Schafer, Head of Product Marketing, Security Platforms Enterprises are moving their applications, workloads and services out of the data center…
Striving to Achieve High Fidelity Cloud Security
Read the original article: Striving to Achieve High Fidelity Cloud Security By, Trisha Paine, Head of Cloud Marketing Programs Several attributes make posture management a particularly challenging component of cloud security. Securing a rapidly growing quantity -and variety- of cloud…
While IoT security standards lag, IoT security companies innovate – Overview of trends in IoT cyber security
Read the original article: While IoT security standards lag, IoT security companies innovate – Overview of trends in IoT cyber security By Mor Ahuvia, Product Marketing Manager at Check Point, Ram Yonish, Firmware Security Evangelist and Gil Yankovitch, Tech Lead…
Cyber Attack Trends: 2020 Mid-Year Report
Read the original article: Cyber Attack Trends: 2020 Mid-Year Report At the start of 2020, very few people would have predicted the events that unfolded. The COVID-19 global pandemic caused unprecedented changes to all of our lives, and has reshaped…
Check Point partners with New York University to close the cybersecurity workforce gap
Read the original article: Check Point partners with New York University to close the cybersecurity workforce gap Check Point has partnered with one the world’s leading universities – New York University (NYU) – to nurture the next generation of computer…
How scammers are hiding their phishing trips in public clouds
Read the original article: How scammers are hiding their phishing trips in public clouds Recently, we published our research on how threat actors are taking advantage of well-known cloud services to download malicious payloads. This technique has also been observed…
Microsoft Inspire: An Alliance Perspective
Read the original article: Microsoft Inspire: An Alliance Perspective By: Brad Orluk – Microsoft Alliance Manager, published July 20 2020 It’s that time of year again – time to celebrate our joint success over the past 12 months with our…
Check Point IoT Protect Uses Automation and Threat Intelligence to Prevent the most advanced IoT cyber-attacks
Read the original article: Check Point IoT Protect Uses Automation and Threat Intelligence to Prevent the most advanced IoT cyber-attacks Integrated solution prevents attacks at both IoT network and device level, even on unpatchable devices: protects critical infrastructure, industrial, healthcare,…
Twitter Platform Compromise
Read the original article: Twitter Platform Compromise Introduction A large number of high-profile Twitter accounts have been taken over on Wednesday in what seems to be a social engineering attack against some of Twitter’s employees. This included the accounts of…
Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix Vanity URL issue
Read the original article: Fixing the Zoom ‘Vanity Clause’ – Check Point and Zoom collaborate to fix Vanity URL issue Research by: Adi Ikan, Liri Porat and Ori Hamama Introduction As the world starts to emerge from Coronavirus-related lockdowns, and…
Check Point Introduces Infinity SOC
Read the original article: Check Point Introduces Infinity SOC By Adeline Chan, Product Marketing Manager, Threat Prevention For many Security Operations Center (SOC) teams, finding malicious activity inside the network is like finding a needle in a haystack. They are often…
SIGRed – this is not just another vulnerability- Patch now to stop the next cyber pandemic
Read the original article: SIGRed – this is not just another vulnerability- Patch now to stop the next cyber pandemic Imagine what could happen if someone was able to intercept and read every piece of your mail without your knowledge,…
What Makes IoT Security in Hospitals Different
Read the original article: What Makes IoT Security in Hospitals Different July 16: Preventing Attacks on IoT Devices and Networks Register: AMER | EMEA When it comes to securing their internet of things (IoT) devices, hospitals struggle with unique challenges. For some healthcare facilities,…
Top 4 Reasons Why Serverless Is Secure
Read the original article: Top 4 Reasons Why Serverless Is Secure By: Hillel Sollow, Serverless Security R&D We talk a lot about the need for a different security paradigm for AWS Lambda Security or Microsoft Azure, and it is easy…
Check Point CloudGuard SaaS protects customers from a new attack vector exploiting SLK files to install malware
Read the original article: Check Point CloudGuard SaaS protects customers from a new attack vector exploiting SLK files to install malware An internal security analysis revealed a new attack method, which bypasses default security (EOP) and advanced security (ATP) layers.…
June‘s Most Wanted Malware: Notorious Phorpiex Botnet Rises Again, Doubling Its Global Impact On Organizations
Read the original article: June‘s Most Wanted Malware: Notorious Phorpiex Botnet Rises Again, Doubling Its Global Impact On Organizations Check Point Research finds sharp increase in attacks using the Phorpiex Botnet delivering new ‘Avaddon’ ransomware via malspam campaigns Our latest…
Check Point Secures Aruba Branch Office SD-WAN Connections to the Cloud
Read the original article: Check Point Secures Aruba Branch Office SD-WAN Connections to the Cloud The coronavirus pandemic has led enterprises to quickly enable their employees to work remotely from home. This increase in remote workers is similar to the…
Major Aerospace Company optimizes Secure Growth with Check Point Maestro
Read the original article: Major Aerospace Company optimizes Secure Growth with Check Point Maestro By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point I recently met with a major aerospace company and their IT security manager…
How to Secure Cloud Workloads in Healthcare
Read the original article: How to Secure Cloud Workloads in Healthcare By: Trisha Paine, Head of Cloud Marketing Programs The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud.…
Protecting IoT devices and OT Networks from Cyber Attacks
Read the original article: Protecting IoT devices and OT Networks from Cyber Attacks Cyber criminals have taken advantage of the remote work required by the coronavirus by stepping up their attacks on medical, enterprise, and industrial IoT devices and critical…
Check Point and Partners Give Back
Read the original article: Check Point and Partners Give Back By, Abigail Maines, Head of Channel Sales, Americas Whether you are working from home for the first time, adjusting to the social distancing regulations, or balancing a job while teaching…
Nexus Zeta – From Suspicious Alerts to Conviction
Read the original article: Nexus Zeta – From Suspicious Alerts to Conviction Two years ago, we shared the interesting story of Nexus Zeta: How a newbie hacker managed to create a monster botnet. The attacker created an impressive attack chain…
Increased Remote Workers + Global Pandemic = Need for Hyperscale Network Security
Read the original article: Increased Remote Workers + Global Pandemic = Need for Hyperscale Network Security What is Hyperscale Network Security you ask? An architecture offering secure flexibility and ease-of-use as business and technical requirements change. This is exactly what…
Hole-y Guacamole! Fixing critical vulnerabilities in Apache’s popular remote desktop gateway
Read the original article: Hole-y Guacamole! Fixing critical vulnerabilities in Apache’s popular remote desktop gateway Overview Just a few short months ago, for most of us the daily working routine involved going to the office and working on the corporate…
5 Reasons to Re-Evaluate your Cloud Email Security
Read the original article: 5 Reasons to Re-Evaluate your Cloud Email Security Many organizations have moved to Office 365 or G-Suite for obvious reasons. However, are you aware of the new security risks that these new environments pose? We’ve listed…
Do SOC Teams have the Certainty they need to do their jobs?
Read the original article: Do SOC Teams have the Certainty they need to do their jobs? The Security Operations Center (SOC) is often all that stands between an organization and a potentially financially devastating data breach. However, 98% of SOC…
Automating Cloud Native Security, at the Speed of DevOps
Read the original article: Automating Cloud Native Security, at the Speed of DevOps By, Trisha Paine, Head of Cloud Marketing Programs Speed and cloud complexity makes security for modern application development increasingly challenging. Many organizations are now developer-centered, incentivizing developers…
With Developers Moving Fast, DevSec Needs Automation to Keep Up with Application Security
Read the original article: With Developers Moving Fast, DevSec Needs Automation to Keep Up with Application Security By, Trisha Paine, Head of Cloud Marketing Programs Speed and cloud complexity makes security for modern application development increasingly challenging. Many organizations are…
Check Point IPS and Firewall Core Security – A Layered Security Approach
Read the original article: Check Point IPS and Firewall Core Security – A Layered Security Approach By Winston Lalgee and Eddie Doyle Not long after the Internet was established, attackers discovered a new way to compromise IT assets. This new…
As organizations get back to business, cyber criminals look for new angles to exploit
Read the original article: As organizations get back to business, cyber criminals look for new angles to exploit • Criminals are using COVID-19 training for employees as phishing bait • Non coronavirus-related headline news (including ‘Black Lives Matter’) being used…
Improving Mobile Security: What Companies Need to Know
Read the original article: Improving Mobile Security: What Companies Need to Know The growing need for data mobility and corporate devices makes it vital for companies to implement cybersecurity strategies that are adapted to new scenarios and challenges Reality has…
CBTS Launches CloudGuard Connect Managed Service Offering to Customers
Read the original article: CBTS Launches CloudGuard Connect Managed Service Offering to Customers Check Point and CBTS are leveraging their strong partnership to provide a CBTS Managed Services offering of Check Point’s CloudGuard Connect solution. Built on world-class security and…
CBTS Launches CloudGuard Connect Managed Service Offering to Customers
Read the original article: CBTS Launches CloudGuard Connect Managed Service Offering to Customers Check Point and CBTS are leveraging their strong partnership to provide a CBTS Managed Services offering of Check Point’s CloudGuard Connect solution. Built on world-class security and…
CRN Channel Awards
Read the original article: CRN Channel Awards 2020 has been an amazing year so far for Check Point and our Partners. We launched our new 2020 Partner Growth program in February this year at our annual event (pre-coronavirus). Since then…
Protecting Office 365 and G Suite in a Cyber Pandemic World
Read the original article: Protecting Office 365 and G Suite in a Cyber Pandemic World By, Danielle Guetta, Product Marketing, Threat Prevention The post pandemic world might sound like a sweet dream right now, but it is too soon to…
Protecting Office 365 and G Suite in a Cyber Pandemic World
Read the original article: Protecting Office 365 and G Suite in a Cyber Pandemic World The post pandemic world might sound like a sweet dream right now, but it is too soon to celebrate. Organizational structures are bound to change…
Tackling Security for the Remote Workforce The Day after Tomorrow
Read the original article: Tackling Security for the Remote Workforce The Day after Tomorrow The world will overcome the Coronavirus pandemic, but are organizations ready for the day after? By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security As…
May’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time, Over Doubling Its Impact On Organizations
Read the original article: May’s Most Wanted Malware: Ursnif Banking Trojan Ranks On Top 10 Malware List for First Time, Over Doubling Its Impact On Organizations Check Point’s researchers find sharp increase in attacks using the long-running Ursnif banking trojan…
Cutting complexity to strengthen security: why consolidation matters
Read the original article: Cutting complexity to strengthen security: why consolidation matters New survey of more than 400 security professionals globally shows non-integrated, point solutions make enterprise security more challenging By Brian Gleeson, Head of Infinity Product Marketing The flow…
Protecting IoT devices and OT Networks from a Cyber Pandemic
Read the original article: Protecting IoT devices and OT Networks from a Cyber Pandemic During the coronavirus pandemic, enterprises rapidly moved to working remotely reducing their ability to secure their IT networks. A recent World Economic Forum analysis showed that…
Coronavirus Contact Tracing Apps: managing the pandemic spread, or ending privacy for individuals?
Read the original article: Coronavirus Contact Tracing Apps: managing the pandemic spread, or ending privacy for individuals? By Oleg Ilushin – Security Researcher | Jonathan Shimonovich – Group Manager The Coronavirus pandemic has taken a huge toll worldwide for both…
A Cyber Pandemic May Be Next: How secure are you in the cloud?
Read the original article: A Cyber Pandemic May Be Next: How secure are you in the cloud? By Monier Jalal, Head of Cloud Product Marketing The Coronavirus pandemic will eventually dissipate and probably disappear. How will it affect us? What…
Creating Harmony for Cloud Native Security
Read the original article: Creating Harmony for Cloud Native Security By, Monier Jalal, Head of Cloud Product Marketing It is no surprise that cloud adoption drives multiple business benefits, including decreased time to market, increased security, and business growth. However,…
Securing the ‘new normal’ – protecting the post Covid-19 world
Read the original article: Securing the ‘new normal’ – protecting the post Covid-19 world The world has changed It’s only 20 weeks since the first lockdown measures were implemented in Wuhan, in January 2020, but since then the emergence of…
Container Adoption Trends
Read the original article: Container Adoption Trends Trisha Paine, Head of Cloud Marketing Programs Containers have become one of the fastest growing technologies in the history of IT. Since DockerHub’s inception in 2013, billions of container images have been downloaded,…
Check Point Extends Partner Certifications
Read the original article: Check Point Extends Partner Certifications Check Point training and certification gives you the critical skills and knowledge you need to successfully implement and manage Check Point solutions and earn Check Point’s globally recognized certifications. With COVID-19…
Quantum Security Gateway Architecture, Built to Secure your Everything
Read the original article: Quantum Security Gateway Architecture, Built to Secure your Everything By Michael A. Greenberg, Product Marketing Manager, Security Platforms Check Point has introduced the new Quantum Security GatewaysTM that provide ultra-scalable, power-efficient protection against Gen V cyber…
Coronavirus update: not the type of CV you’re looking for
Read the original article: Coronavirus update: not the type of CV you’re looking for Criminals are using malicious CV and medical leave forms to spread banking Trojans and infostealers Overall cyber-attacks up 16% compared to March and April, as businesses…
Is Your Cloud Network Security Easy to Use?
Read the original article: Is Your Cloud Network Security Easy to Use? By Jonathan Maresky, CloudGuard Product Marketing Manager, published June 3, 2020 In a previous cloud security blog post, my colleague Hezi Bahry (cloud network security product manager) wrote…
Business Email Compromise: driving the cyber-crime pandemic
Read the original article: Business Email Compromise: driving the cyber-crime pandemic Business Email Compromise (BEC) attacks are a sophisticated type of scam that target both businesses and individuals with the aim of transferring funds from victims’ bank accounts to criminals.…
Least Privilege for AWS Lambda Security
Read the original article: Least Privilege for AWS Lambda Security By, Hillel Sollow, Serverless Security R&D If you are a security professional or at least someone who cares enough about security you will appreciate the importance of restricting privilege access…
Taking a second look at Two Factor Authentication
Read the original article: Taking a second look at Two Factor Authentication By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were compromised, single-factor…
Why You Need a Multi-Layered Approach to Mobile Security
Read the original article: Why You Need a Multi-Layered Approach to Mobile Security By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were compromised,…
Why Two-Factor Authentication (2FA) on Mobile is Not Secure Enough
Read the original article: Why Two-Factor Authentication (2FA) on Mobile is Not Secure Enough By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were…
Protect Workloads Utilizing RDP in AWS from Increasingly Common Brute Force Attacks
Read the original article: Protect Workloads Utilizing RDP in AWS from Increasingly Common Brute Force Attacks As business rush to scale up existing workloads or bring up new solutions to help support their new remote workforce, threat actors are shifting…
Tax Season Phishing
Read the original article: Tax Season Phishing Recently, we came across a phishing document impersonating Form 1040. This is an IRS tax form filed by residents in the United States during the tax season. Attackers usually take advantage of the…
The Best Security Management is now in the Cloud
Read the original article: The Best Security Management is now in the Cloud By Michael A. Greenberg, Product Marketing Manager, Security Platforms Have you ever wondered what it would be like to manage your on-premises and virtual gateways from the…
Safe-Linking – fixing a 20-year-old problem to make Linux exploitation harder for threat actor
Read the original article: Safe-Linking – fixing a 20-year-old problem to make Linux exploitation harder for threat actor Let’s face it, we’re all looking for easier way to do things. Short-cuts that help us get our work done faster and…
Uncovering the Latest Mobile Threats with Check Point Research
Read the original article: Uncovering the Latest Mobile Threats with Check Point Research By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security If there is one thing that 2020 has taught us so far in the IT space, is…
Check Point and Citrix: Securing the SD-WAN Edge with Multi-layered Security
Read the original article: Check Point and Citrix: Securing the SD-WAN Edge with Multi-layered Security By Russ Schafer, Head of Product Marketing, Security Platforms The coronavirus has challenged enterprises to quickly enable their employees to work productively from home. Enterprises…
Mobile adware: the silent plague with no origin
Read the original article: Mobile adware: the silent plague with no origin According to Check Point Software, 27% of companies worldwide have suffered attacks on their mobile devices, showing a clear upward trend of sixth generation attacks We are witnessing…
Adaptation is the Best Practice – Leveraging Application Control in the Days of Video Conferencing
Read the original article: Adaptation is the Best Practice – Leveraging Application Control in the Days of Video Conferencing Adi Ikan, Network Research & Protection Group Manager Oren Koren, Senior Cyber Security Product Manager A major result of the current…
6 Serverless Security Mistakes You Should Never Make
Read the original article: 6 Serverless Security Mistakes You Should Never Make By, Hillel Sollow, Serverless Security R&D, published May 15, 2020 Securing your serverless application can feel overwhelming, especially when there are so many micro-services simultaneously running. Do you…
Check Point’s eLearning hits 15K students in Eight week Milestone!
Read the original article: Check Point’s eLearning hits 15K students in Eight week Milestone! Within eight weeks, 15,000 students and security professionals enjoyed the wide range of Check Point’s eLearning content. ELearning is utilizing electronic and online technologies to gain…
Gas South Pivots to Support working From Home with Check Point
Read the original article: Gas South Pivots to Support working From Home with Check Point By Amit Sharon, Head of Customer Community, Check Point Software Technologies Read how the leading provider of natural gas throughout the southeastern U.S. kept remote…
Coronavirus cyber-attacks update: beware of the phish
Read the original article: Coronavirus cyber-attacks update: beware of the phish New phishing campaigns discovered impersonating the WHO and popular conferencing platforms, to steal sensitive information Check Point has seen 192,000 coronavirus-related cyber-attacks per week over the past three weeks,…
Choosing your Next Endpoint Security Solution? 5 Key Questions you Must Consider
Read the original article: Choosing your Next Endpoint Security Solution? 5 Key Questions you Must Consider By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security It’s time to rethink your endpoint security strategy. Navigating today’s threat landscape requires having…
April 2020’s Most Wanted Malware: Agent Tesla Remote Access Trojan Spreading Widely In COVID-19 Related Spam Campaigns
Read the original article: April 2020’s Most Wanted Malware: Agent Tesla Remote Access Trojan Spreading Widely In COVID-19 Related Spam Campaigns Check Point’s researchers find sharp increase in attacks using new version of Agent Tesla capable of stealing Wi-Fi passwords,…
Grace Migrates to a Cloud-Friendly Architecture Fully Secured by Check Point
Read the original article: Grace Migrates to a Cloud-Friendly Architecture Fully Secured by Check Point By Amit Sharon, Head of Customer Community, Check Point Grace is transforming its WAN to deliver superior performance, availability, and efficiency to support its cloud…
Grace Migrates to a Cloud-Friendly Architecture Fully Secured by Check Point
Read the original article: Grace Migrates to a Cloud-Friendly Architecture Fully Secured by Check Point By Amit Sharon, Head of Customer Community, Check Point Grace is transforming its WAN to deliver superior performance, availability, and efficiency to support its cloud…
Would you let burglars enter your home and steal all your personal data? Well, your wi-fi routers do…
Read the original article: Would you let burglars enter your home and steal all your personal data? Well, your wi-fi routers do… Why router IoT security is crucial for individuals, organizations and states By Ram Yonish, Firmware Protection Product Evangelist…
Would you let burglars enter your home and steal all your personal data? Well, your routers do…
Read the original article: Would you let burglars enter your home and steal all your personal data? Well, your routers do… Why router IoT security is crucial for individuals, organizations and states There are tens and hundreds of million routers…
9 Serverless Security Best Practices You Must Read
Read the original article: 9 Serverless Security Best Practices You Must Read By, Hillel Sollow, Serverless Security R&D If you are an advocate of serverless, then it should come as no surprise that serverless application architectures actually improve security. You…
COVID-19 and the Cybersecurity Challenges Organizations Currently Face
Read the original article: COVID-19 and the Cybersecurity Challenges Organizations Currently Face Thought leader perspectives on the coronavirus outbreak on cybersecurity ESI ThoughtLabs, a U.S.-based research firm, is collecting perspectives on the pandemic’s effects on cybersecurity to include in its…
9 Serverless Security Best Practices You Must Read
Read the original article: 9 Serverless Security Best Practices You Must Read By, Hillel Sollow, Serverless Security R&D If you are an advocate of serverelss, then it should come as no surprise that serverless application architectures actually improve security. You…
Newest iOS Vulnerabilities and How Check Point Customers Remain Protected
Read the original article: Newest iOS Vulnerabilities and How Check Point Customers Remain Protected By Yael Macias, Product Marketing Manager, Endpoint & Mobile Security And Danielle Guetta, Product Marketing Specialist, Email Security Last week, cyber security firm ZecOps announced that…
How Resilient is your Endpoint Security Solution?
Read the original article: How Resilient is your Endpoint Security Solution? Abstract Have you recently examined your security solution for remote workers? Will your Endpoint Protection solution prevent the most complex, damaging attacks that your organization might face these days?…
Aimed at moving targets: five cyber-threats that put mobile devices at risk
Read the original article: Aimed at moving targets: five cyber-threats that put mobile devices at risk Mobile security is no longer an option – it’s a necessity. The last decade has seen an explosion in the number of people adopting…
Productivity and Zero-Day Prevention – A Zero-Sum Game?
Read the original article: Productivity and Zero-Day Prevention – A Zero-Sum Game? By Mor Ahuvia, Threat Prevention Product Marketing Manager Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect…
Coronavirus update: as economic stimulus payments start to flow, cyber-attackers want to get their share too
Read the original article: Coronavirus update: as economic stimulus payments start to flow, cyber-attackers want to get their share too With the coronavirus (Covid-19) pandemic shutting down major parts of the global economy, governments are responding with massive stimulus packages…
Coronavirus update: as economic stimulus payments start to flow, cyber-attackers want to get their share too
Read the original article: Coronavirus update: as economic stimulus payments start to flow, cyber-attackers want to get their share too With the coronavirus (Covid-19) pandemic shutting down major parts of the global economy, governments are responding with massive stimulus packages…
10 ways to shut down attacks, with this Buyer’s Guide to Cyber Security
Read the original article: 10 ways to shut down attacks, with this Buyer’s Guide to Cyber Security Globally, the number of sophisticated and advanced persistent threats -or prolonged espionage-style attacks on organizations- has risen exponentially. New interception capabilities and data…
Is your Hospital Prepared for the Next Cyber Attack?
Read the original article: Is your Hospital Prepared for the Next Cyber Attack? By Dana Katz, Head of Product Marketing, Threat Prevention During the COVID-19 crisis, cyber-criminals have not gone into quarantine. They continue to seek out system vulnerabilities, and…
Frost & Sullivan Names Check Point SandBlast Mobile a Leader in Mobile Security
Read the complete article: Frost & Sullivan Names Check Point SandBlast Mobile a Leader in Mobile Security By Yael Macias, Product Marketing Manager, Threat Prevention We are excited to share the news that Frost & Sullivan has presented Check Point…
Apple is Most Imitated Brand for Phishing in Q1 2020, Shows Check Point Research
We all like to think we would never fall for a phishing attempt. Unfortunately, none of us are immune because we all make mistakes. Verizon’s 2019 Data Breach Investigations Report showed that nearly one-third (32%) of data breaches involved phishing activity. What’s…
How to Implement Layered Security into Cloud Workloads
Microservices are quickly changing the face of cloud computing, giving cloud architects the tools needed to move away from provisioning resources statically, such as with servers and virtual machines (VMs). New types of workloads, like serverless and containers, realize greater…
Four Best Practices for Configuring Network Security against Zero Days (Part 3)
By Mor Ahuvia, Threat Prevention Product Marketing Manager Can you defend against zero day threats? Most organizations cannot. But with the right technology, organizations can not only detect more zero days, but also stave them off–without having to compromise on…