Securing the Cloud July 6, 2018 Cybersecurity Threats: Eight Things CIOs Need to Know Last month, IDC published a report: Cybersecurity Threats: Eight Things CIOs Need to Know. In ...
Security July 5, 2018 An Invasive Spyware Attack on Military Mobile Devices Earlier this week, Israeli security agencies announced that the Hamas terrorist organization had installed spyware ...
Security July 5, 2018 June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most ...
Security July 2, 2018 Check Point’s ZoneAlarm Anti-Ransomware Earns “Editor’s Choice” from PC magazine… again! We were thrilled to learn that Check Point’s consumer and small office offering, ZoneAlarm Anti-Ransomware, ...
Securing the Cloud June 26, 2018 Spot Malicious Activity in Your Flow Logs with Dome9 An enterprise’s ability to respond to threats depends on how quickly it can spot and ...
Security June 21, 2018 Forrester Research names Check Point Software a Leader in Endpoint Security Suites SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, ...
Security June 20, 2018 Can You Hear The Digging? The Dangers of Mobile Mining Mobile malware focused cyber-criminals are fast adapters, and tend to follow rising trends in order ...
Security June 18, 2018 Cyber-Criminals Are On The Offensive During the World Cup: Wallchart Phishing Campaign Exploits Soccer Fans Keeping track of the World Cup can get overwhelming. Cyber criminals are keenly aware ...
Security June 15, 2018 When Ransomware Goes Mobile In the past two years, the most significant trend in the malware world was the ...
Security June 14, 2018 Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution Having already looked at the challenges of moving to the cloud, and how attackers gain ...