Security July 22, 2016 Securely Embrace the Hybrid Cloud The trend in enterprise IT is to move from a hardware-centric to an application-centric network ...
Research July 8, 2016 Jigsaw Ransomware Decryption The Jigsaw ransomware was first spotted in April 2016, and has since received a ...
Research June 24, 2016 Effective Security Management in a Software Defined World Software defined infrastructure (SDx) along with use of private and public clouds completely transforms the ...
Research June 15, 2016 Trust No One – A Cyberworld Survival Guide Cybercriminals are professional scammers; their specialty is tricking users into helping them achieve their malicious ...
Research June 7, 2016 FACEBOOK MaliciousChat Check Point disclosed details about a vulnerability found in Facebook Messenger, both in the online ...
Research May 27, 2016 Attacks on SMB are a sure thing, according to the latest Verizon report It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. ...
Research May 25, 2016 Weaponized WordPress Tools WordPress is a free, open source content management system (CMS) for creating websites, and is considered ...
Research May 12, 2016 Hack In The Box: System Vulnerabilities Can Leave Mobile Devices Exposed System vulnerabilities are a major threat facing users and enterprises today, and these need to ...
Research April 20, 2016 Top 4 Ways Employees Compromise their Corporate Data via Cloud Services Recent research by Gartner showed that “Through 2020, 95% of cloud security breaches will be ...
Research April 6, 2016 Congrats! More than 7000 applications in your database Security managers will appreciate Check Point’s Application Control Software Blade. With more than 7000 pre-defined ...