Research April 13, 2018 March’s Most Wanted Malware: Cryptomining Malware That Works Even Outside the Web Browser on the Rise Check Point’s latest Global Threat Index reveals that hackers are increasingly utilizing cryptomining malware that ...
Research April 17, 2017 When you look at files from your cloud, are they looking back at you? When your users look at files served from your cloud platform, files that have tracking ...
Research April 13, 2017 The Unbearable Lightness of Operating Web-Based Attacks: How easy it is to steal money from IE 8.0-11.0 users Looking back at the past year, there is no doubt that the malware-as-a-service industry, which ...
Research February 27, 2017 Check Point’s SandBlast Wins SC Media Award At the 2017 RSA Conference in San Francisco, it was clear malware, ransomware and phishing ...
Research February 14, 2017 Cyber Threat Alliance Marks New Era in Industry Collaboration and Customer Protection The announcement by the Cyber Threat Alliance (CTA) at the RSA Conference is an important ...
Research February 13, 2017 Check Point’s 2017 Cyber Security Survey Shows Key Concerns and Opportunities among IT Professionals The theme of the 2017 RSA Conference is ‘The Power of Opportunity’ inspired by an ...
Research December 14, 2016 Cloud Security Predictions and Trends It’s that most wonderful time of the year – the time where I like to ...
Research October 14, 2016 Join Check Point at SecTor to learn how to go beyond traditional security with advanced threat prevention Next week, Check Point will be at SecTor, Canada’s premier IT security education conference. The ...
Research May 27, 2016 Attacks on SMB are a sure thing, according to the latest Verizon report It’s not surprising that small businesses are much more vulnerable to cyberattacks vs. large enterprises. ...