Check Point Blog

Corporate Blog October 9, 2020

8-Part Video Guide: How to Secure your Remote Workforce

Part #6: 5 Principles for Selecting the Optimal Mobile Security Solutions The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes…

Read More
Corporate Blog

Looking forward to Amazon Prime Day? Be cautious: Hackers are too

Millions of consumers are eagerly anticipating Amazon’s annual online shopping extravaganza, Amazon Prime Day. This year, Amazon is offering more than 1 million deals through a 48-hour period which begins on October 13. The annual…

Read More
Cloud Security October 8, 2020

Enhancing Serverless Security with Check Point CloudGuard and AWS Lambda Extensions

By, Hillel Solow, Serverless Security R&D With no compute, VM, container, or network, serverless computing offers the ultimate reduction in security attack surface. With the recent release of the AWS Lambda Extensions, organizations are closer…

Read More
Corporate Blog October 7, 2020

September 2020’s Most Wanted Malware: New Info-stealing Valak Variant Enters Top 10 Malware List For First Time

Check Point researchers find sharp increase in attacks using new Valak malware, while the Emotet trojan remains in 1st place for third consecutive month Our latest Global Threat Index for September 2020 has revealed that…

Read More
Corporate Blog October 6, 2020

Global Surges in Ransomware Attacks

In Q3 2020, Check Point Research saw a 50% increase in the daily average of ransomware attacks, compared to the first half of the year Countries with the most number of ransomware attacks in Q3…

Read More
Corporate Blog October 5, 2020

Check Point Software and NVIDIA Partner to Secure the Datacenter with Infinity Next

Infinity Next Nano Agent Security integrated with NVIDIA SmartNICs with Bluefield-2 DPUs By Russ Schafer, Head of Product Marketing, Security Platforms As enterprises become more distributed with the hybrid cloud, artificial intelligence (AI), edge computing…

Read More
Corporate Blog October 2, 2020

Graphology of an Exploit – Fingerprinting exploit authors to help with hunting zero-day exploits in the wild

In the cyber-crime economy, which is all about exploiting vulnerabilities in software and products, the most valuable and prized asset is the ‘zero day’ – a vulnerability for which there is no patch or update…

Read More
Corporate Blog

8-Part Video Guide: How to Secure your Remote Workforce

Part #5: The Dangers of Underestimating Mobile Threats The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes and shapes around…

Read More
Cloud Security October 1, 2020

A Preview into the Secure Cloud Summit

By, Trisha Paine, Head of Cloud Product Marketing and Programs Cloud adoption was growing at historical rates coming into 2020, and then, in March, cloud adoption accelerated faster than anyone would have thought. Gartner predicted…

Read More
Cloud Security September 28, 2020

Cloud Security: 12 Myths vs Facts

By, Gui Alvarenga, Cloud Security Product Marketing As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads together and created the following…

Read More