Security May 29, 2020 Least Privilege for AWS Lambda Security By, Hillel Sollow, Serverless Security R&D If you are a security professional or at least ...
Security May 27, 2020 Taking a second look at Two Factor Authentication By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and ...
Security May 26, 2020 Protect Workloads Utilizing RDP in AWS from Increasingly Common Brute Force Attacks By, Maya Levine, Technical Marketing Engineer As business rush to scale up existing workloads or ...
Security May 22, 2020 Tax Season Phishing Recently, we came across a phishing document impersonating Form 1040. This is an IRS tax ...
Security May 21, 2020 The Best Security Management is now in the Cloud By Michael A. Greenberg, Product Marketing Manager, Security Platforms Have you ever wondered what it ...
Security May 21, 2020 Safe-Linking – fixing a 20-year-old problem to make Linux exploitation harder for threat actor Let’s face it, we’re all looking for easier way to do things. Short-cuts that help ...
Security May 20, 2020 Check Point and Citrix: Securing the SD-WAN Edge with Multi-layered Security By Russ Schafer, Head of Product Marketing, Security Platforms The coronavirus has challenged enterprises to ...
Security May 20, 2020 Uncovering the Latest Mobile Threats with Check Point Research By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security If there is one thing ...
Security May 19, 2020 Mobile adware: the silent plague with no origin According to Check Point Software, 27% of companies worldwide have suffered attacks on their mobile ...
Security May 18, 2020 Adaptation is the Best Practice – Leveraging Application Control in the Days of Video Conferencing Adi Ikan, Network Research & Protection Group Manager Oren Koren, Senior Cyber Security Product Manager ...