Check Point Blog

Research July 8, 2015

Stopping the Next Massive Cyberattack: 5 Steps to Stronger Security

The aftershocks of the 2014 breaches are still reverberating across the security landscape, and many organizations are starting to examine their own security programs, wondering how they can avoid becoming the next big breach story.…

Read More
Research June 18, 2015

Stopping the Next Massive Cyberattack – Step 4: Monitor

With the rise of cyber threats, ensuring your organization is protected against malicious attacks requires constant awareness and visibility into the network’s security infrastructure. Monitoring network activity is essential to strengthening an organization’s defense against…

Read More
Research June 10, 2015

Critical Infrastructure is at Risk!

Almost all of today’s modern conveniences, such as electricity, transportation, water systems, and manufactured products, are managed by industrial control systems (ICS). Many of these systems are considered to be critical infrastructure and operate as…

Read More
Research May 12, 2015

The 1st Step to Stopping the Next Massive Cyberattack: Assess

Given the ever-increasing sophistication of cybercrime methods, organizations must employ advanced assessment tools and practices to reduce or eliminate security gaps. The first step to a successful security posture is to know what your current…

Read More
Research May 6, 2015

Using Collaboration to Stop the Next Massive Cyberattack

Cybercriminals attempt attacks on organizations every day. Most often, these attacks catch the victim organization off-guard, or underprepared. While cybercriminals do engage in random attacks, often, the victim has been targeted. In these cases, the…

Read More
Research April 24, 2015

Stopping the Next Massive Cyberattack

Cybercriminals are quite pleased with themselves. Their recent handiwork has resulted in breaking news headlines, cover stories of major newspapers and banners flashing with details of the latest data breach. Unfortunately, the headlines displaying their…

Read More
Research April 1, 2015

Segmentation is Great in Theory, but Who Has the Time?

Security is one of those, “pay a little now, or pay a lot later” concepts. Your data, your customer information, your intellectual property, your trade secrets, these are the lifeblood of your company. One bad…

Read More
Research March 23, 2015

Go Atomic or Go Home

Have you never heard the term ‘Atomic Segment’ used in security? Me neither. That is, until I came to Check Point. If you think about it, it makes a lot of sense. An atomic segment…

Read More