By Gal Fenighstein, Threat Intelligence Introduction The election process, all over the world, has been modernized. From online voter registration forms to debates waged on social media all the way to electronic voting…
Read MoreMicrosoft Ignite 2018 (#MSIgnite) is almost here, and Check Point is delighted to be a Gold Sponsor again for this year’s conference. If you are making the trek out to Orlando and planning on attending, we…
Read Moreby Bob Matlow, Cyber Security Advocate The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have…
Read MoreSandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria We are pleased to announce that Forrester Research recognized Check Point as a Leader in…
Read MoreFifth generation mega-attacks have changed the cyber security landscape forever. As proven by the WannaCry and Petya ransomware attacks last year, using vulnerabilities and exploit tools stolen from intelligence agencies, attackers can now cause economic…
Read MoreAfter talking with many information security managers and compliance officers over the last few years, a troubling picture is emerging. In the old days the security and compliance teams were powerful organizations, ruling the entire…
Read MoreThe smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as…
Read MoreBeing “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…
Read MoreAt Dome9, we live by a simple motto: security-first. At every opportunity, we push past the expected minimums to provide unexpected satisfaction and confidence to our customers. As a security firm, we are held to…
Read MoreCyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…
Read More