What are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway:…
Read MoreThe healthcare industry has taken a major beating in terms of cyber security attacks. In the past two years, there has been a myriad of breaches, compromising the personal health information (PHI) of millions. According…
Read MoreOctober is Cybersecurity Awareness Month, and it starts with large attacks against two prominent financial organizations – An Experian breach, which affected 15 million T-Mobile customers; and Scottrade, which compromised the information of approximately 4.6…
Read MoreOne of the top Internet threats today is drive-by download attacks which originate from exploits kits, hacked websites, spam campaigns and more. As browsers are the main tool for navigating the web, the main attack…
Read MoreSecure Shell, or SSH, is a cryptographic (encrypted) network protocol for initiating text-based shell sessions on remote machines in a secure way. SSH uses the client-server model with public host key fingerprints in order to…
Read MoreThe aftershocks of the 2014 breaches are still reverberating across the security landscape, and many organizations are starting to examine their own security programs, wondering how they can avoid becoming the next big breach story.…
Read MoreWhat a long way we’ve come since the days of simply relying on firewalls. Just as threats have evolved—from an attack called Morris Worm to an attack called POODLE—so have the strategies and tools for…
Read MoreThe Do’s and Don’ts of a Strong Incident Response Plan Check Point’s 2015 Security Report revealed that 81% of organizations said they experienced a data loss incident in the previous year. If there’s one conclusion…
Read MoreWith the rise of cyber threats, ensuring your organization is protected against malicious attacks requires constant awareness and visibility into the network’s security infrastructure. Monitoring network activity is essential to strengthening an organization’s defense against…
Read MoreThis month, Check Point released its annual security report—a trove of statistics and trends culled from collaborative research and in-depth analysis of more than 300,000 hours of monitored network traffic, from more than 16,000 Threat…
Read More