Research March 11, 2016 President Obama’s Cybersecurity Plan – Tackling a New Era of Security The White House recently released the CNAP – Cybersecurity National Action Plan. This is a ...
Research March 11, 2016 In The Wild: Mobile Security Observations from the Check Point Research Team We saw last week just how fast the mobile world is advancing at the Mobile World ...
Research March 10, 2016 Threat Alert – KeRanger MAC OSX Ransomware Research by: Ofer Caspi Overview A new ransomware dubbed ‘KeRanger’ was discovered on March 4, ...
Research March 7, 2016 Why Visibility Is Critical to Your Security Management Program Today, managing security can be a complex endeavor. The growing complexity of networks, business requirements ...
Research March 7, 2016 Targeted SSL Stripping Attacks Are Real Having access to the Internet is critical for on-the-go professionals. So the convenience of open ...
Research March 2, 2016 Locky Ransomware Locky is a new ransomware which encrypts the victim’s files and then demands a ransom ...
Research March 1, 2016 Announcing R80 Security Management May you live in interesting times. While it’s debatable this phrase originated as a Chinese ...
Research February 29, 2016 “Recommended” for Security Effectiveness and Value 5 Years in a Row by NSS Labs The Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However ...
Research February 26, 2016 The Mobile World is an Amazing Place – Mobile World Congress 2016 Mobile World Congress may be in the rearview mirror, but it’s still top of mind. ...
Research February 25, 2016 Check Point and IBM: A Collaborative Approach to Information Security Security is hard. Internal and external customers demand continuous availability, and the business often initiates ...