Research February 21, 2017 2016 H2 Global and Regional Threat Intelligence Trends Introduction New, sophisticated threats continue to emerge on a daily basis across multiple platforms: social ...
Research February 15, 2017 Android: the Perils of Popularity Despite the long lines you see stretching from stores when a new iPhone comes out, ...
Research February 14, 2017 Cyber Threat Alliance Marks New Era in Industry Collaboration and Customer Protection The announcement by the Cyber Threat Alliance (CTA) at the RSA Conference is an important ...
Research February 13, 2017 Check Point’s 2017 Cyber Security Survey Shows Key Concerns and Opportunities among IT Professionals The theme of the 2017 RSA Conference is ‘The Power of Opportunity’ inspired by an ...
Securing the Cloud February 12, 2017 The Quest for Software Defined Cloud Governance – Introducing GSL Preface The missing piece – Customization First try – General Purpose Language (aka Internal DSL) ...
Research February 9, 2017 The SMISHING threat – unraveling the details of an attack On January 26, a new smishing attack targeted users in the Czech Republic. Smishing, ...
Research February 8, 2017 Hummingbad Overtaken as Leading Mobile Malware in January’s Global Threat Impact Index Hummingbad has been overtaken as the leading mobile malware for the first time since February ...
Securing the Cloud February 8, 2017 Announcing The Birth of Software-Defined Governance Last September, Dome9 announced the availability of the new Dome9 Compliance Engine that radically simplifies ...
Research February 6, 2017 Check Point Prevention at the Movies, Rogue One: Data Loss on a Galactic Scale The Client: The Galactic Empire The situation: Security researchers at Check Point have ...
Research February 2, 2017 SQL Slammer Comeback SQL Slammer is a computer worm that first appeared in the wild in January 2003, ...