Check Point Blog

Check Point Software Blog

Latest articles

8-Part Video Guide: How to Secure your Remote Workforce

Part #4: 5 Principles for Choosing the Right Endpoint Security The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes and shapes around the world have had to adapt at the speed of light, and to make significant infrastructure changes so… The post 8-Part Video Guide: How...

#InstaHack: how researchers were able to take over the Instagram App using a malicious image

Instagram is one of the most popular social media platforms globally, with over 100+ million photos uploaded every day, and nearly 1 billion monthly active users. Individuals and companies share photos and messages about their lives and products to their followers globally.  So imagine what could happen if a hacker was able to completely take… The...

Check Point Software Offers a FREE online course on SMB security technologies and solutions

Check Point Software is excited to offer a free 2 hour self-paced online jump start course for SMBs, as part of our jump start series. This continues to support our mission, making Cyber Security education accessible to all. Seeking competitive advantage, SMBs have embraced cloud, mobile and SaaS technologies, yet only 25% of SMBs feel they… The post...

Check Point Protects Microsoft Azure vWAN from Sophisticated Cyber Attacks

Microsoft Ignite featuring CloudGuard Connect as Trusted Security Partner for Microsoft Azure  By, Russ Schafer, Head of Product Marketing, Security Platforms Check Point is a Microsoft featured Partner for the Microsoft Ignite online conference Sept Tue, Sep 22, 2020 – Thu, Sep 24, 2020  Stop by and meet with our Security Experts to discuss how… The...

The Trend Toward Serverless: What, Why, and How?

Serverless has been taking the web development world by storm. Many developers opt to pursue serverless functions in new application architectures where a microservice approach would support more traditional containerization. Serverless, however, is still a new technology that continues to grow in both capability and ecosystem. This article first provides...

RampantKitten: An Iranian Surveillance Operation unraveled

Check Point Research has unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were previously reported by other researchers and journalists, our investigation allowed us to connect the several different campaigns and attribute all...

8-Part Video Guide: How to Secure your Remote Workforce

Part #3: 5 Must-Have Endpoint Protections The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes and shapes around the world have had to adapt at the speed of light, and to make significant infrastructure changes so their employees could work… The post 8-Part Video Guide:...

Focus on Microsoft Ignite: What Check Point’s Azure Integrations Mean for the Future of Enterprise Business

By Paul Ardoin, Cloud Alliance Marketing Manager, published September 17, 2020 Check Point is no stranger to shaping the future of security—from our inception, our breakthrough technologies have been disrupting the industry. Check Point was recently awarded a Microsoft FY20 US partner award for the Azure Commercial Marketplace. In addition, over the...

Cloud Threat Hunting: Attack & Investigation Series- Breach of Major Financial Institution

By,  Maya Levine, Technical Marketing Engineer Probably the most infamous breach of this past year against a major financial institution did not utilize the most advanced hacking techniques. In fact, it all boiled down to a misconfiguration in a cloud environment – by far the most common reason for cloud breaches in the modern era.… The post Cloud...

Not for higher education: cybercriminals target academic & research institutions across the world

Across the USA, Europe and Asia, there was an increase in the number of attacks targeting the education and research sector in recent months. The USA witnessed an increase in DDOS attacks, while there was an increase in information disclosure attempts in Europe. Asia meanwhile, faced an increase in vulnerability exploits. July and August signals… The...

Discover, share and read the best on the web

Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!