Checkpoint

DeepBrand Clustering – an Evolution in Brand Spoofing Prevention

DeepBrand Clustering – an Evolution in Brand Spoofing Prevention

Phishing remains a significant component of the cyber threat landscape due to its simplicity, effectiveness, and adaptability. It is a deceptive practice in which threat actors pose as legitimate entities in an effort to extract sensitive information from unsuspecting individuals. The prevalence of phishing is attributed to its low-cost execution and high success rate, especially as […]

DeepBrand Clustering – an Evolution in Brand Spoofing Prevention Read More »

GigaOm names CloudGuard WAF as leader and fast mover for a second year in a row

GigaOm names CloudGuard WAF as leader and fast mover for a second year in a row

The landscape of Web Application and API Security is undergoing a rapid evolution, demanding WAF services to be better equipped to handle modern development tools and keep up with the pace. These services must be easily manageable, automated, precise, and adaptable to any architecture. Regrettably, most of the traditional and cloud-native WAFs lack such capabilities.

GigaOm names CloudGuard WAF as leader and fast mover for a second year in a row Read More »

CrowdStrike Disruptions – Ensuring Business Continuity

CrowdStrike Disruptions – Ensuring Business Continuity

In the last few hours, major disruptions on CrowdStrike’s Falcon platform causing significant productivity impacts due to inaccessible documents have been reported. The CrowdStrike Falcon update has led to a “blue screen of death” globally, severely impacting business operations dependent on this technology. This issue requires immediate attention to mitigate potential system failures […] Click

CrowdStrike Disruptions – Ensuring Business Continuity Read More »

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks

A sophisticated new malware/trojan attack is designed to steal login credentials and credit card information from payment systems, banks and crypto exchanges. This attack tricks legitimate business applications into running compromised but innocent-looking dynamic link library (DLL) files — making it very difficult to detect and block. DLL sideloading is a technique used by cybercriminals

How ThreatCloud AI’s Threat Emulation Engine Prevents DLL Sideloading (Trojan) Attacks Read More »

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security

Artificial Intelligence and Machine Learning (AI and ML) are recognized as important parts of the future of cyber security and cloud security. But how integrated are these technologies in cyber security functions currently? A recent survey by Check Point and Cybersecurity Insiders […] Click here to view original web page at www.checkpoint.com

Check Point’s 2024 Cloud Security Report: Navigating the Intersection of Cyber security Read More »

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities

For years, Check Point has been a top strategic partner for Amazon Web Services with multiple competencies including Security Software and Networking Software. As a global leader in security, Check Point allows customers to do more on AWS—the solutions are truly better together. In 2024, Check Point continues to expand AWS support. Our customer wins

Check Point signs Strategic Collaboration Agreement with AWS to expand cloud security capabilities Read More »

Connect the Security Dots by CloudGuard Effective Risk Management

Connect the Security Dots by CloudGuard Effective Risk Management

Countless of services we use in our daily life are backed by Cloud computing, thanks to its agility and global presence from many cloud service providers nowadays. Although we tend not to realize about their cloud dependency until such services stop functioning or involve in an “unfortunate” event where a cybersecurity breach result in data

Connect the Security Dots by CloudGuard Effective Risk Management Read More »

Securing the Financial Sector with Check Point Infinity Global Services

Securing the Financial Sector with Check Point Infinity Global Services

The digital transformation has significantly enhanced efficiency within the financial sector, but not without elevating the cyber risk landscape. Recent findings by the International Monetary Fund (IMF) reveal a stark reality: cyberattacks have more than doubled since the pandemic, spotlighting the financial sector’s vulnerability due to its handling of sensitive data and transactions. Companies have faced enormous

Securing the Financial Sector with Check Point Infinity Global Services Read More »