If you ask any Check Point researcher or engineer for one word that describes what Check Point does best, you’ll get a wide range of answers — anything from “cybersecurity” to “cyber-security” to the rebels…
Read MoreThis week, our founder and CEO Gil Shwed participated in a fascinating Q&A session on Quora. He answered the Quora community’s top questions on cyber security, mobile security and innovation. Here are our editor’s pick…
Read MoreThe Battle of Consolidation vs. Best-of-Breed, does more security mean better security? You’re probably frequently scrutinizing whether or not your own organization’s cyber security is being properly managed. We’re constantly being bombarded with news of…
Read MoreIf your enterprise is using Microsoft EMS and is looking to further secure mobile devices while ensuring employee’s privacy and productivity, you’d be happy to know that Check Point has teamed with Microsoft Intune to…
Read MoreFollowing the latest cyber attack outbreaks, WannaCry and Petya ransomware, businesses are now realizing just how vulnerable they are. What seemed to be “good enough solutions” until now simply isn’t enough in today’s world. But…
Read MoreWith so much riding on cyber security, those of us charged with providing it must make a devil’s bargain between conflicting priorities: maintain productivity by letting users receive and transmit information quickly, or protect information…
Read More“Here in my car, I feel safest of all …” That line from Gary Numan’s hit single, ‘Cars’ sums up the way many of us feel when we’re driving: safe and protected in the privacy…
Read MoreInfinity is boundless. Unfortunately so are your IT demands and security expectations. The explosion of new technologies promising simplification, untold efficiencies and cost savings are only creating uncertainty, complexity and risk. There needs to be…
Read MoreWhen your users look at files served from your cloud platform, files that have tracking pixels could be looking back — revealing more than you should to outsiders about users and infrastructure. Security researchers are…
Read MoreLooking back at the past year, there is no doubt that the malware-as-a-service industry, which sells and trades malware samples, attack tools, and a variety of services, is thriving. It means that cyber criminals with…
Read More