Check Point Blog

Security Insights October 27, 2015

One Step Ahead

What are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway:…

Read More
Security Insights October 19, 2015

Our Mission To Cure The Healthcare Security Epidemic

The healthcare industry has taken a major beating in terms of cyber security attacks. In the past two years, there has been a myriad of breaches, compromising the personal health information (PHI) of millions. According…

Read More
Security Insights October 14, 2015

The Future Of Financial Cybersecurity

October is Cybersecurity Awareness Month, and it starts with large attacks against two prominent financial organizations – An Experian breach, which affected 15 million T-Mobile customers; and Scottrade, which compromised the information of approximately 4.6…

Read More
Threat Research August 18, 2015

JavaScript Hooking as a Malicious Website Research Tool

One of the top Internet threats today is drive-by download attacks which originate from exploits kits, hacked websites, spam campaigns and more. As browsers are the main tool for navigating the web, the main attack…

Read More
Security Insights August 12, 2015

SSH Decryption Opens Door to Very Old Security Vectors

Secure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH uses the client-server model with public host key fingerprints in order to…

Read More
Security Insights July 8, 2015

Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security

The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many organizations are starting to examine their own security programs, wondering how they can avoid becoming the next big breach story.…

Read More
Security Insights July 6, 2015

Crime Marches On

What a long way we’ve come since the days of simply relying on firewalls. Just as threats have evolved—from an attack called Morris Worm to an attack called POODLE—so have the strategies and tools for…

Read More
Security Insights June 30, 2015

Stopping the Next Massive Cyberattack – Step 5: Incident Response Plans

The Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report revealed that 81% of organizations said they experienced a data loss incident in the previous year. If there’s one conclusion…

Read More
Security Insights June 18, 2015

Stopping the Next Massive Cyberattack – Step 4: Monitor

With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires constant awareness and visibility into the network’s security infrastructure. Monitoring network activity is essential to strengthening an organization’s defense against…

Read More
Security Insights June 16, 2015

Check Point 2015 Security Report Paints a Picture of the Threat Landscape—And it’s Not Pretty

This month, Check Point released its annual security report—a trove of statistics and trends culled from collaborative research and in-depth analysis of more than 300,000 hours of monitored network traffic, from more than 16,000 Threat…

Read More