Artificial Intelligence September 25, 2024 AI: The New Frontier in Safeguarding Critical Infrastructure In an era where digital threats loom large, artificial intelligence (AI) emerges as a powerful ...
Executive Insights September 23, 2024 Cyber Security Leader vs Cyber Security Tag-along: How to Tell the Difference Throughout history, many fascinating stories have been told about great leaders; Julius Caesar successfully turned ...
Email Security September 19, 2024 New Phishing Campaign Exploiting Google App Scripts: What Organizations Need to Know Check Point Harmony Email Researchers have recently identified a concerning phishing campaign that spoofs Google ...
Harmony SASE September 18, 2024 Check Point SASE: Triple Threat Protection for the New Perimeter Securing the modern enterprise network is more complex than ever. Company data is migrating to ...
Research September 17, 2024 Cyber predators target vulnerable victims: Hackers blackmail hospitals, trade patient data and find partners through darknet ads In a world of crime, expect no mercy. Cybercrime goes hard after its goal, which ...
Security September 16, 2024 Hispanic Heritage Month Spotlight: Bill Diaz In celebration of Hispanic Heritage Month, observed from September 15 to October 15, Check Point ...
Securing the Cloud September 13, 2024 5 Steps to Building a Robust Cyber Resilience Framework The reality of cyber security is simple – breaches will occur – and reactivity will ...
Security September 12, 2024 Check Point’s Quantum Leap: Integrating NIST PQC Standards In our previous blog, “Living in a Post Quantum World,” we discussed the role cryptographic ...
Research September 11, 2024 The Unraveling of an Iranian Cyber Attack Against the Iraqi Government Check Point Research discovered an elaborate cyber-attack against Iraqi governmental networks The installer used to ...
Research September 10, 2024 August 2024’s Most Wanted Malware: RansomHub Reigns Supreme While Meow Ransomware Surges Check Point’s latest threat index reveals RansomHub’s continued dominance and Meow ransomware’s rise with novel ...