Check Point Blog

Would you Rather be Reactive or Proactive?

In today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after the fact, providing remediation after the damage has already been done. Instead of waiting for the next attack to occur,…

Read More
Corporate Blog August 31, 2017

The Internet of ransomware Things

San Francisco’s Municipal Railway (MUNI) riders got to ride for free over the last weekend (Nov 25th-26th), after what appears as a ransomware hit the agency’s payment system. The alleged attack sought $73,000 in ransom for stolen city data. “Personal information of MUNI customers were not compromised as part of this incident,” Paul Rose, a…

Read More
Security Insights December 1, 2016

Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls

Today’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and highly mobile workforces put a ton of pressure on security teams to keep networks and data protected. At the same time, the tools and techniques used by cybercriminals to target enterprise data continues to rapidly evolve. When reflecting on the…

Read More
iOS Security May 27, 2016

“Recommended” for Security Effectiveness and Value 5 Years in a Row by NSS Labs

The Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However as the threat landscape continues to evolve and grow in sophistication, NGFW solutions should prove effective at protecting against new and unknown threats as well as continue safeguarding against previously known threats. But that begs the question: how do customers…

Read More
Security Insights February 29, 2016

A Major Step Ahead in Network Security

It’s January 2016 and my New Years’ resolution is still fresh in my mind. In addition to visiting the gym more frequently and losing some of my “holiday” weight, I am also resolute that this year will be another big year of cyber security headlines and major breaches, even though network security spending continues to…

Read More
Security Insights January 26, 2016

Angler EK Pushing TeslaCrypt

In recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. TeslaCrypt is a relatively new ransomware, first reported in the beginning of 2015. Although it is not the most sophisticated malware, it is continuously maintained and updated by its authors, and still manages to spread through various infection vectors. In…

Read More
Threat Research December 18, 2015

Phishing for Employees in Russia

During the period August 27-30, 2015, Check Point sensors recorded a large amount of logs generated by the IPS protection “PHP Print Remote Shell Command Execution.” This was an interesting anomaly, as we do not usually see high volume of logs from this protection. We started investigating the logs received from all sources, and noticed…

Read More
Threat Research November 3, 2015

Context-Aware Network Security

Defense in depth is a concept that is hard to argue with; put as many security mechanisms in place to make it difficult if not impossible for the bad guys to gain access to your network. Much of the security “sprawl” we see today is a direct result of this strategy – deploy the best…

Read More
Security Insights

One Step Ahead

What are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway: Hamilton. I was fascinated by how precarious the fate of our independence was had it not been for the forward-looking…

Read More
Security Insights October 27, 2015

Our Mission To Cure The Healthcare Security Epidemic

The healthcare industry has taken a major beating in terms of cyber security attacks. In the past two years, there has been a myriad of breaches, compromising the personal health information (PHI) of millions. According to the Identity Theft Resource Center, 42.5 percent of all data breaches were in the healthcare industry. The Center also…

Read More
Security Insights October 19, 2015