Security Technology
Showing posts with label
Check Point Software Blog
.
Show all posts
Showing posts with label
Check Point Software Blog
.
Show all posts
Department of Homeland Security issues security warning for VPN applications — Check Point VPNs not affected
›
by Lloyd Tanaka, Threat Prevention Product Marketing Manager, published April 17th 2019 On Friday April 12, The CERT Coordination Center...
Game of Thrones Phishing Scams and How to Avoid Them
›
The long night has finally ended. Game of Thrones fans can finally come in from the cold and, like a starving dragon, start devouring the la...
Protect Your Business by Managing Network Security from the Palm of Your Hand
›
by Russ Schafer, Head of Product Marketing, Security Platforms, published April 11th 2019 Next generation cyber security attacks can ...
Check Point Partners with Google’s Cloud Identity to Improve Zero Trust Cloud Access
›
With enterprises migrating to the cloud, the traditional network perimeter concept is fading. A new approach is needed to ensure more secure...
March 2019’s Most Wanted Malware: Cryptomining Still Dominates Despite Coinhive Closure
›
Check Point’s latest Global Threat Index sees cryptominers continuing to lead the top malware list despite Coinhive ceasing operation By...
Check Point ZoneAlarm Extreme Security earns Best+++ Award from AVLab Test
›
By Lloyd Tanaka, Product Marketing Manager, Threat Prevention, April 8th 2019 In February of this year, AVLab performed comprehensive te...
Secure your Serverless Infrastructure with CloudGuard Dome9
›
By Marina Segal, Product Manager, Cloudguard Dome9, published April 5th, 2019 In a previous blog , we had discussed how serverless secur...
Xiaomi Vulnerability: When Security Is Not What it Seems
›
Smartphones usually come with pre-installed apps, some of which are useful and some that never get used at all. What a user does not expect,...
Momo Challenge: A scary hoax with a stern warning
›
By Lloyd Tanaka, Product Marketing Manager, April 3rd 2019 The Momo Challenge, a purported suicide game targeting children on Facebook o...
Xero Transforms Their Security Culture With CloudGuard IaaS
›
by Moti Sagey, March 25th 2019 As businesses continue to move their workflow into the cloud, the need for multi-layered protection is cr...
This March Madness, Don’t Get Upset by Cyber Criminals: Protect Your Organization from Cinderella Teams
›
With the first two rounds in the rear view mirror and the sweet sixteen coming up, we’re excited to announce that Check Point is sponsoring ...
Check Point Forensic Files: Monero CryptoMiner Campaign Adapts APT Techniques
›
By Richard Clayton, March 19th 2019 Since mid-January, our Sand Blast Agent Forensics team noticed a new variant of the Monero mining malwa...
Mobile Supply Chain Attacks Are More Than Just an Annoyance
›
By Richard Clayton, Check Point Research Marketing Mark Twain once wrote there are few things harder to put up with than the annoyance o...
Mobile Supply Chain Attacks Are More Than Just an Annoyance
›
By Richard Clayton, Check Point Research Marketing Mark Twain once wrote there are few things harder to put up with than the annoyance o...
February 2019’s Most Wanted Malware: Coinhive Quits While Still at the Top
›
By Check Point’s Threat Intelligence team, published March 11th In February 2019, Coinhive led the global threat index for the 15 th su...
›
Home
View web version