Security July 18, 2018 Google Next 2018: Cloud and Mobile Security Showcase Google Next 2018 (#GoogleNext18) is almost upon us and we’re delighted to return as a ...
Securing the Cloud July 12, 2018 Detecting Misconfigurations on Azure Database Services Microsoft Azure introduces multiple database services in different models. These services allow different levels of ...
Research July 12, 2018 GlanceLove: Spying Under the Cover of the World Cup When the whistle of the first match of the 2018 World Cup blew, it didn’t ...
Security July 12, 2018 Cyber Attack Trends: 2018 Mid-Year Report When it comes to the global cyber threat landscape, threats are ever evolving, keeping organizations ...
Research July 8, 2018 APT Attack In the Middle East: The Big Bang Over the last few weeks, the Check Point Threat Intelligence Team discovered the comeback of ...
Securing the Cloud July 6, 2018 Cybersecurity Threats: Eight Things CIOs Need to Know Last month, IDC published a report: Cybersecurity Threats: Eight Things CIOs Need to Know. In ...
Security July 5, 2018 An Invasive Spyware Attack on Military Mobile Devices Earlier this week, Israeli security agencies announced that the Hamas terrorist organization had installed spyware ...
Security July 5, 2018 June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most ...
Security July 2, 2018 Check Point’s ZoneAlarm Anti-Ransomware Earns “Editor’s Choice” from PC magazine… again! We were thrilled to learn that Check Point’s consumer and small office offering, ZoneAlarm Anti-Ransomware, ...
Securing the Cloud June 26, 2018 Spot Malicious Activity in Your Flow Logs with Dome9 An enterprise’s ability to respond to threats depends on how quickly it can spot and ...