Research October 20, 2015 Digging for Groundhogs: Holes in Your Linux Server In July 2015, Check Point’s Incident Response team was contacted by a customer after they ...
Research September 14, 2015 The Problem with Traditional Sandboxing Hackers have come to recognize and understand the usual methods of threat prevention, like antivirus, ...
Research July 16, 2015 Some Lessons from the Hacking Team Breach Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, ...
Research July 8, 2015 Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many ...
Research July 6, 2015 Crime Marches On What a long way we’ve come since the days of simply relying on firewalls. Just ...
Research June 30, 2015 Stopping the Next Massive Cyberattack – Step 5: Incident Response Plans The Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report ...
Research June 18, 2015 Stopping the Next Massive Cyberattack – Step 4: Monitor With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires ...
Research April 24, 2015 Stopping the Next Massive Cyberattack Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, ...
Research April 16, 2015 Protecting Beyond the Point of Sale The sad reality is that retail breaches are becoming too common. With over a billion ...