Security March 2, 2022 Telegram becomes a digital forefront in the Conflict 03/03/2022 Cyber-attacks, fraud and news feeds: Cyber criminals and Hacktivists Leverage Telegram for conflict-related Activities ...
Security March 2, 2022 Banks’ top 8 cyber security challenges and how to overcome them By Alon Bar, Product Marketing Manager Banks were attacked on average 700 times every week ...
Security March 1, 2022 Your Gmail Isn’t Stopping as Many Attacks as You Think Does your organization use Gmail and the larger Google Workspace? If you’re a small business ...
Security February 27, 2022 How the Eastern Europe Conflict Has Polarized Cyberspace Abstract The war between Russia and Ukraine is advancing. People everywhere are deciding who they ...
Security February 27, 2022 Cyber Attack Trends In The Midst Of Warfare – The numbers behind the first days of the conflict Check Point Research (CPR) releases data on cyber attacks observed around the current Russia/Ukraine conflict. ...
Security February 25, 2022 Check Point Software named a Strategic Leader for Endpoint Prevention and Response (EPR) solutions in the latest EPR AV-Comparative Report By Noa Goldstein, Product Marketing Manager We are proud to announce that Check Point’s Harmony ...
Security February 24, 2022 Staying Safe in Times of Cyber Uncertainty Given the recent geo-political uncertainty, Cyber security professionals need to prepare for a continued uptick ...
Security February 22, 2022 Check Point Software’s Frank Rauch is Named a 2022 Channel Influencer Award Winner by Channel Futures Check Point Software is proud to announce that Frank Rauch, Head of WW Channel Sales, ...
Security February 20, 2022 New OpenSea attack led to theft of millions of dollars in NFTs By Dikla Barda, Roman Zaikin & Oded Vanunu A few days ago, OpenSea published ...
Security February 17, 2022 SASE vs. SSE – What’s the difference? By Mor Ahuvia, Product Marketing Manager SASE vs. SSE – What’s the difference While the ...