Articles
-
7 technology white papers to read right now 2022; technology white papers
Are you in charge of leading change? Drive sustainable infrastructure development at speed and scale by deploying fully-researched, future-proof policies,…
Read More » -
Never-fail best practices when hiring a security researcher 2022
Micki Boland is a global cyber security warrior and evangelist with Check Point Technologies’ Office of the CTO. Micki has…
Read More » -
Wide range of routers under attack by unusually sophisticated malware
Across North America and Europe, an advanced hacking group has dedicated nearly two years to the pursuit of infecting routers…
Read More » -
The looming threat of AI-powered ransomware
By Zac Amos, Features Editor, Rehack.com. Many people don’t think of ransomware powered by artificial intelligence as a security threat. But,…
Read More » -
Microsoft 365 now prevents data leaks with session timeouts
Microsoft recently announced the general availability of tenant-wide idle session timeouts for Microsoft 365 web page apps. This is intended…
Read More » -
7 cyber security tips so that you can have more fun!
Looking forward to celebrating the summer season with epic outdoor escapes that inspire, entertain and awe? As you daydream about…
Read More » -
The best travel security tips from a bona-fide CISO!
Pete Nicoletti, Field CISO – Americas, Check Point Software. The following 31 travel tips should make your journey safer and…
Read More » -
Actionable Zero Trust information for a better security strategy 2022
Mazhar Hamayun is a cyber security professional with over 20 years of hands-on technology and leadership experience. At Check Point…
Read More » -
Google sends alert, Hermit spyware on Android and iOS devices 2022
Google has issued an alert concerning government-grade spyware on phones. The company warns that select international governments are leveraging this…
Read More » -
Overlooked keys to success 2022
The cyber security landscape is fast-evolving and security represents a critical concern for companies in every industry. The threats are…
Read More »