Check Point Blog

Corporate Blog June 5, 2020

Check Point Extends Partner Certifications

Check Point training and certification gives you the critical skills and knowledge you need to successfully implement and manage Check Point solutions and earn Check Point’s globally recognized certifications. With COVID-19 impacting many business operation…

Read More
Corporate Blog June 4, 2020

Quantum Security Gateway Architecture, Built to Secure your Everything

By Michael A. Greenberg, Product Marketing Manager, Security Platforms Check Point has introduced the new Quantum Security GatewaysTM that provide ultra-scalable, power-efficient protection against Gen V cyber threats. For the first time in Check Point’s…

Read More
Corporate Blog

Coronavirus update: not the type of CV you’re looking for

Criminals are using malicious CV and medical leave forms to spread banking Trojans and infostealers Overall cyber-attacks up 16% compared to March and April, as businesses start to re-open Covid-19 related cyber-attacks during May decline…

Read More
Cloud Security June 3, 2020

Is Your Cloud Network Security Easy to Use?

By Jonathan Maresky, CloudGuard Product Marketing Manager, published June 3, 2020 In a previous cloud security blog post, my colleague Hezi Bahry (cloud network security product manager) wrote about customer considerations when choosing a cloud…

Read More
Corporate Blog June 2, 2020

Business Email Compromise: driving the cyber-crime pandemic

Business Email Compromise (BEC) attacks are a sophisticated type of scam that target both businesses and individuals with the aim of transferring funds from victims’ bank accounts to criminals. The FBI’s 2019 Internet Crime Report…

Read More
Corporate Blog May 29, 2020

Least Privilege for AWS Lambda Security

By, Hillel Sollow, Serverless Security R&D If you are a security professional or at least someone who cares enough about security you will appreciate the importance of restricting privilege access to resource as a means…

Read More
Corporate Blog May 27, 2020

Taking a second look at Two Factor Authentication

By Yael Macias, Product Marketing Manager, Endpoint and Mobile Security For several years now, and after a wide array of massive data breaches where passwords were compromised, single-factor authentication – or authentication by means of…

Read More
Corporate Blog May 26, 2020

Protect Workloads Utilizing RDP in AWS from Increasingly Common Brute Force Attacks

As business rush to scale up existing workloads or bring up new solutions to help support their new remote workforce, threat actors are shifting their attention to these same systems. One notable example is the…

Read More
Corporate Blog May 22, 2020

Tax Season Phishing

Recently, we came across a phishing document impersonating Form 1040. This is an IRS tax form filed by residents in the United States during the tax season. Attackers usually take advantage of the tax season…

Read More
Corporate Blog May 21, 2020

The Best Security Management is now in the Cloud

By Michael A. Greenberg, Product Marketing Manager, Security Platforms Have you ever wondered what it would be like to manage your on-premises and virtual gateways from the cloud? Via a web browser? With the best…

Read More