TJ Gonen, Head of Cloud Security Products, Check Point The past couple of decades has turned the Web Application Firewall (WAF) into a ubiquitous piece of security kit. Any organization with a web application (which includes most large businesses) has a WAF installed to protect their data and assets from being breached. Best practice for… The post...
1d
Highlights As organizations seek to deliver security and trust to the IoT, they must focus on the following architectural components: Connectivity, including service enablement Hardware, including IoT module/sensors, security, servers, storage, and other hardware Software, including analytics, applications, IoT purpose-built platforms, and security...
2d
Research by: Aviran Hazum, Bodgan Melnykov & Israel Wenik Highlights Disguised as a Netflix content enabler app named “FlixOnline,” threat actors distributed newly-discovered Android malware Malware distributed via malicious auto-replies to incoming WhatsApp messages, using payloads received from a remote command & control (C&C) server...
3d
The word ‘unprecedented’ has been used a lot over the past year, and with good reason given the huge impact of COVID-19 on societies and businesses around the world. Alongside the global pandemic, there was the volatile and bitter U.S. election and Britain’s departure from the EU: and to add to the disruption, 2020 also… The post Supply chain attacks:...
5d
By, John Guo, Cloud Alliance Architect, Check Point Software Technologies Firewalls can be the main bottleneck when it comes to publishing new applications because they cannot keep up with the dynamic nature of modern applications and DevOps teams. In this blog, we will share how Check Point and HashiCorp partnered together to help customers keep… ...
2w
Over the past year, hospitals and the healthcare industry have been under tremendous pressure during the COVID-19 pandemic, not only dealing with surges in patient numbers, but also with shameless ransomware attacks launched by cybercriminals who see the sector as a soft target. However, it now seems that criminals are shifting their attention to new…...
2w
Highlights In March 2021, a group of hackers breached a large group of IoT security cameras via a Silicon Valley startup called Verkada. Hackers gained access to live surveillance camera feeds exposing data and intellectual property at enterprises like Tesla, schools and prisons. IoT devices are built with little or no security enabling hackers to…...
3w
By, Amit Sharon, Head of Customer Community Cloud computing is disrupting security models, leaving organizations struggling to figure out the most effective and efficient ways to mitigate risks to cloud-based digital assets. IT Central has put together the best Cloud Security Companies that offer a unified approach to cloud data security and provide...
3w
Jeff Engel Cloud Alliance Engineering Check Point is thrilled to announce support for Oracle Cloud Infrastructure’s new Flexible Network Load Balancer with CloudGuard Network Security. The Flexible Network Load Balancer allows organizations to create a flexible, scalable, and redundant security architecture within OCI that supports all ports and protocols....
3w
Check Point Research highlights new trend of forged negative COVID-19 test results and fake vaccine certificates offered on the Darknet and various hacking forums for people seeking to board flights, cross borders, attend events or start new jobs. **Updated March 30th 2021 On March 23rd, only one day after Check Point Research’s latest report about…...
3w
Subscribe to RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.
Get Inoreader