Security March 5, 2024 Congratulating Check Point’s CPX Americas Partner Award Winners 2023 was the year of mega ransomware attacks and AI-fueled cyber threats with 1 in ...
Security March 5, 2024 New IDC survey confirms how far CISOs have evolved Savvy security leaders must enable the business and protect their organizations In November 2023, IDC ...
Security March 4, 2024 Navigating the Evolution of Cybersecurity: The Leap from NIST 1 to NIST 2 In the rapidly evolving world of cybersecurity, staying ahead of threats requires constant vigilance and ...
Security March 1, 2024 PCI Compliance Levels: A Developer’s Guide to PCI Compliance Compliance is something that developers dislike. Traditionally led by risk and information security teams, compliance ...
Security February 28, 2024 VirusTotal Threat Intelligence Now Seamlessly Integrated in Infinity XDR/XPR Check Point Technologies announces VirusTotal threat intelligence is now an integral part of Infinity XDR/XPR ...
Securing the Cloud February 27, 2024 CloudGuard Streamlines Azure Virtual WAN security with Direct Ingress As Azure Virtual WAN continues to gain popularity among enterprise customers with distributed and complex ...
Research February 22, 2024 Digital Deception at the Ballot Box: The Shadow Machinery of Election Manipulation: How Deepfake Technology Threatens the 2024 U.S. Elections by: Oded Vanunu, Liad Mizrachi, Sergey Volozhinsky, Andrey Charikov Main Takeaways: Widespread Availability: The ease ...
Security February 22, 2024 SASE Survey Reveals User Experience Is Top of Mind The results are in: end-user experience is most important when it comes to SASE. That ...
Security February 21, 2024 Hybrid Mesh and the Check Point Infinity Platform Gartner has recently recognized Check Point as a Representative Vendor for Hybrid Mesh Firewall Platforms ...
Research February 14, 2024 Check Point Research Unveils Critical #MonikerLink Vulnerability in Microsoft Outlook with a 9.8 CVSS Severity Score Key Findings: – Hyperlink Handling in Outlook: The research demonstrates that “file://” hyperlinks can be ...