Securing the Cloud February 28, 2017 Dome9 Integration With Slack Properly logging and storing your security access logs is always important, and Dome9 logs are ...
Research February 27, 2017 Check Point’s SandBlast Wins SC Media Award At the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing ...
Research February 21, 2017 2016 H2 Global and Regional Threat Intelligence Trends Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social ...
Research February 15, 2017 Android: the Perils of Popularity Despite the long lines you see stretching from stores when a new iPhone comes out, ...
Research February 14, 2017 Cyber Threat Alliance Marks New Era in Industry Collaboration and Customer Protection The announcement by the Cyber Threat Alliance (CTA) at the RSA Conference is an important ...
Research February 13, 2017 Check Point’s 2017 Cyber Security Survey Shows Key Concerns and Opportunities among IT Professionals The theme of the 2017 RSA Conference is ‘The Power of Opportunity’ inspired by an ...
Securing the Cloud February 12, 2017 The Quest for Software Defined Cloud Governance – Introducing GSL Preface The missing piece – Customization First try – General Purpose Language (aka Internal DSL) ...
Research February 9, 2017 The SMISHING threat – unraveling the details of an attack On January 26, a new smishing attack targeted users in the Czech Republic. Smishing, ...
Research February 8, 2017 Hummingbad Overtaken as Leading Mobile Malware in January’s Global Threat Impact Index Hummingbad has been overtaken as the leading mobile malware for the first time since February ...
Securing the Cloud February 8, 2017 Announcing The Birth of Software-Defined Governance Last September, Dome9 announced the availability of the new Dome9 Compliance Engine that radically simplifies ...