Unveiling the power of platformisation
In an increasingly interconnected world, digital transformation has become an essential operational requirement, particularly in the face of rising cyber ...
In an increasingly interconnected world, digital transformation has become an essential operational requirement, particularly in the face of rising cyber ...
The Ministry of Digital Development and Information (MDDI) of Singapore proposed a ban on deepfakes and other digitally manipulated candidates' ...
As technological innovations in the fashion industry intend to increase garments' comfort and functionality, Check Point Software Technologies warns against ...
The Indonesian government has launched a new initiative called INA Digital, which aims to integrate the country's existing 27,000 mobile ...
There has been a significant increase in cloud security incidents, from 24% in 2023 to 61% in 2024 based on ...
The technology sector remained the most impersonated industry in brand phishing due to its wide usage in corporate and remote work environments, according to ...
For the longest time, we’ve been told that the best defence against cyberattacks is to use a defence-in-depth (DID) strategy, ...
The WEF Global Cybersecurity Outlook 2024 reveals a divide between those who are resilient and those who aren’t. Emerging technologies ...
The Global Cybersecurity Outlook 2024 paints a grim picture: there is a growing inequity between organisations that are cyber-resilient and ...
The chief information security officer (CISO) role is evolving as they embrace their role as a cyber security leader and a business ...
Five years since Secure Access Service Edge (SASE) was introduced, around 72% of security professionals consider end-user experience the most important to ...
Check Point® Software Technologies Ltd. launched the Check Point Quantum Force series, which includes ten firewalls designed to strengthen the security of enterprise ...
While the underrepresentation of women in cybersecurity is starting to improve – 20% in 2019 compared to 10% in 2013, ...
Check Point® Software Technologies Ltd. launched the first-generation Infinity AI Copilot, converging Artificial Intelligence (AI) and cloud technologies to address the talent gap and enhance the ...
Check Point® Software Technologies Ltd. partnered with Singapore’s National Research and Education Network (SingAREN) to enhance the security of Singapore’s national research and education network’s ...
Check Point® Software Technologies Ltd. launches Check Point Horizon Playblocks, a security automation and collaboration platform that automatically manages and contains cyber attacks. Horizon ...
CISOs and security professionals are in an unenviable position: they deal with relentless cyberattacks from across an expanding attack surface, ...
World Backup Day just whisked by with little fanfare. And that is not surprising. Compared to topics like ChatGPT, datafication, ...
According to Check Point Research, global attacks increased by 28%in the third quarter of 2022 compared to the same period ...
Most boards now regard cybersecurity as a business risk rather than solely a technical IT problem, according to a recent ...
Back in 1996, a Microsoft employee developed peer-to-peer (also referred to as point-to-point) tunnelling protocol (PPTP) to provide a more ...
Supply chain attacks are not new. The infamous SolarWinds attack laid the foundations for a supply chain attack frenzy. 2021 ...
In my opinion, one of the most loathed activities in the annals of computing history is the use of passwords ...
Cloud-based authentication service provider, Okta, is the latest tech company to experience a breach of their systems. Ransomware group Lapsus$ ...
Is WFH going to change the way I secure my IT? The McKinsey report, The future of work after COVID-19, ...
If today, organizations are struggling to secure on-premises, private clouds or public clouds as separate infrastructure setups, what more will ...
The cyberattack on Kaseya should be a reminder that vigilance against cyberattacks is not about waiting for the next exploit.
If you are adopting the cloud as your growth strategy, this Check Point Software infographic offers 7 reasons to use ...
This Check Point whitepaper to learn Check Point Maestro addresses current and future network security requirements in the cloud.
Check Point Research (CPR) raises some concerns particularly about how one app, Voila, because it includes specific and unique installation ...
ABI Research says the success of the Colonial Pipeline ransomware attack exposed wilful ignorance to take cybersecurity seriously
Check Point Research issues Q4 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people ...
The Solarwinds Orion hack is a reminder that enterprises need to stay vigilant because the threat landscape is real and ...
As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. Check Point created a ...
Check Point researchers find dangerous new Qbot variant is spreading via malspam campaigns to execute credentials theft, ransomware installation and ...
This is a community problem that continues to exist. The victims are consumers and enterprises. The winners are threat actors. ...
In this exclusive interview with FutureCIO, Maya Horowitz, director of Threat Intelligence and Research at Check Point Software Technologies talks ...
There is always a struggle in development cycles to make sure you are ahead of the competition and unfortunately sometimes ...
Adjusting to the new normal – how is Hong Kong’s internet infrastructure holding up to increased WFH pressure?
No organization, big or small, is immune from a devastating cyberattack. Cyber exploits are more sophisticated, elusive, and targeted than ...
The inherent vulnerabilities associated with healthcare devices, such as a lack of encryption of sensitive data as well as hard-coded ...
A weapon is anything that can be used against an opponent, adversary, or victim. In the digital economy, nearly everything ...
Check Point says its unified security management as a cloud service will cut security operations time by 60%
Itzik Feiglevitch, product manager for IoT Cyber Security at Check Point Software Technologies, provides an easy to grasp concepts behind ...
"Predicting the future is always difficult but the foreseeable future will have plenty of work. I think the world needs ...
The old saying “the only constant is change” couldn’t be truer when talking about technological progress. A raft of technologies ...
Gartner has identified seven emerging security and risk management trends that will impact security, privacy and risk leaders in the longer term. ...
FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl