Research July 21, 2020 How scammers are hiding their phishing trips in public clouds Recently, we published our research on how threat actors are taking advantage of well-known cloud ...
Security September 11, 2018 August’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat Check Point’s latest Global Threat Index reveals an increase in banking trojan attacks as organizations ...
Security August 16, 2018 Who You Gonna Call? Stories From the Front Line of Cyber Defense By Check Point’s Incident Response Team In our industry, we tell our stories with ...
Security July 5, 2018 June’s Most Wanted Malware: Banking Trojans Up 50% Among Threat Actors Check Point’s latest Global Threat Index reveals that Trojan malware families enter Top 10 Most ...
Security June 21, 2018 Forrester Research names Check Point Software a Leader in Endpoint Security Suites SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, ...
Security June 8, 2018 Championship Basketball, Championship Cybersecurity: Lessons from the Golden State Warriors Immovable object, meet unstoppable force. Led by two-time league MVP Stephen Curry, the Golden ...
Security June 6, 2018 What The NBA Finals Can Teach Us About Cyber Security If LeBron James didn’t play basketball, he’d be just as menacing as a cyber-hacker. ...
Security June 5, 2018 Healthcare, Retail, and Finance: Gen V Attacks Affect All Industries Fifth generation mega-attacks have changed the cyber security landscape forever. As proven by the WannaCry ...
Research March 21, 2018 Preventing crypto-mining attacks: four key steps that’ll keep you safe We recently published an overview of the rapid rise in mining attacks, how these ...
Security February 1, 2018 How Can Your Business Score Touchdowns Without An Offensive Line? What the Philadelphia Eagles Can Teach Us About Cyber-Security Imagine your founding CTO resigning ...