Securing the Cloud October 21, 2020 Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets By Jonathan Maresky, CloudGuard Product Marketing Manager, published October 21, 2020 When it comes to ...
Security October 20, 2020 Five Reasons to Reevaluate Your Endpoint Protection By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention These days, endpoint security plays a major ...
Security October 19, 2020 Microsoft is Most Imitated Brand for Phishing Attempts in Q3 2020 Check Point Research issues Q3 Brand Phishing Report, highlighting the brands that hackers imitated the ...
Securing the Cloud October 19, 2020 Cloud Threat Hunting: Attack & Investigation Series- Privilege Escalation via Lambda Author: Maya Levine, Technical Marketing Engineer Lior Sonntag, Security Analyst Cloud breaches are becoming increasingly ...
Security October 16, 2020 8-Part Video Guide: How to Secure your Remote Workforce Part #7: What Can a Malicious Email Do? The COVID-19 pandemic has had a dramatic ...
Security October 15, 2020 Paschoalotto gains Scalable Call Center Security with Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point READ MORE ...
Security October 15, 2020 Notice the unnoticed: Threat Hunting by Harmony Endpoint By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and ...
Security October 14, 2020 As the 2020 US presidential election approaches, cybersecurity risks abound Election-related domains are 56% more likely to be malicious than other new domains 16% of ...
Security October 14, 2020 Check Point and Ansible Showcase Automated Security Management at AnsibleFest 2020 Security landscapes and threats are rapidly evolving, driven by the rise of virtualized networks, public ...
Securing the Cloud October 13, 2020 Secure Your Containers Like Your Apps Depend On It By, Yaffa Finkelstein, Product Marketing Manager Security professionals are all too aware that their container ...