Recently, David Strom and Network World decided to put our zero-day protection technology to the test, literally. Now, after in-depth security analysis, we are excited to share the findings with you. In short, Strom found…
Read MoreThe increasing adoption of cloud-based email tools such as Microsoft Office 365™ allows businesses to efficiently communicate and collaborate, without investing resources in managing and maintaining their own dedicated IT infrastructure. However, the shift to…
Read MoreWhat are forward-looking CSOs doing to stay beyond the reach of cybercriminals? Recently, I was in New York City, where I was fortunate enough to have tickets to one of the hottest shows on Broadway:…
Read MoreThe threat landscape has severely changed over the last few years, and organizations have to constantly keep up with sophisticated threats and advanced tactics of cybercriminals. With multiple tools at hackers’ disposal, new threat variants…
Read MoreAttackers most commonly enter organizations through everyday means such as an emailed file. While these documents look innocuous, they can easily contain malicious content delivered in the form of macros, embedded Java script and even…
Read MoreThe modern threat landscape is one of constant evolution. Everything is changing before our eyes – the types of security threats we face, and especially the methods cybercriminals use to infiltrate networks and confiscate data.…
Read MoreFrom 1,300 known viruses in 1997 to over 100,000 new malware variants created each day in today’s world, the business of threats has become an industry operating at a dizzying velocity. Combatting today’s industrial production…
Read MoreToday, ransomware like Cryptolocker is hitting organizations around the globe. At Check Point, we can help prevent these ransomware attacks through a multi-layered approach to security. The current round of ransomware is coming in through…
Read More