Check Point Blog

Hey, you, get off of my cloud.

A large corporation had great expectations for their next digital advertising campaign. This time, they wanted to try cloud technology. So, they signed up with Amazon Web Services (AWS).  Because it was the cloud, their IT experts architected and deployed the system for the campaign in record time.  They even set up an administrative console…

Read More
Corporate Blog July 31, 2017

Where is my $6M?

As a corporation’s accountants reconciled their weekly balance sheets, something was very off.  Over $6M was missing from accounts receivable.  The accountants called accounts receivable to ask if they had received several specific payments.  AR had no…

Read More
Research

Are You Prepared for the Next Attack?

A WAKE-UP CALL From WannaCry and Petya to the most recent attacks today, #LeakTheAnalyst and HBO—it is now apparent that anyone or any organization is a target for cyber criminals. Attacks continue to grow at an alarming rate – in volume, sophistication and impact. As of May 2017, Check Point products are detecting over 17 million…

Read More
Corporate Blog

Ransomware: Turning off the power.

At 11:59 one dark night, a power company’s computers started sending out alerts. Suddenly, they had stopped communicating with each other.  As the power company’s IT staff hurriedly started an emergency investigation, it became immediately clear to the…

Read More
Research

2017-7-31 Global Cyber Attack Reports

TOP ATTACKS AND BREACHES The Swedish government is in turmoil, with 2 ministers already having resigned, following the discovery that a government contract has led to a massive leak of nearly all of the country’s citizens’ personal information. In 2015…

Read More
Research

Re-Thinking the Cyber Consolidation Paradigm

The Battle of Consolidation vs. Best-of-Breed, does more security mean better security? You’re probably frequently scrutinizing whether or not your own organization’s cyber security is being properly managed. We’re constantly being bombarded with news of the latest cyber security attacks and hoping there are no gaps in our own organization’s security. With every new ransomware…

Read More
Corporate Blog

WannaCry: How to Protect Yourself

The post WannaCry: How to Protect Yourself appeared first on Check Point Research.

Read More
Research July 28, 2017

Are you prepared for the next mobile breach?

The post Are you prepared for the next mobile breach? appeared first on Check Point Research.

Read More
Research

Introducing Anti-Ransomware: Defeat Cyberextortion

The post Introducing Anti-Ransomware: Defeat Cyberextortion appeared first on Check Point Research.

Read More
Research

EUGDPR Webinar Replay

The post EUGDPR Webinar Replay appeared first on Check Point Research.

Read More
Research