Modernising security starts and ends with culture
CISOs and security professionals are in an unenviable position: they deal with relentless cyberattacks from across an expanding attack surface, ...
CISOs and security professionals are in an unenviable position: they deal with relentless cyberattacks from across an expanding attack surface, ...
World Backup Day just whisked by with little fanfare. And that is not surprising. Compared to topics like ChatGPT, datafication, ...
According to Check Point Research, global attacks increased by 28%in the third quarter of 2022 compared to the same period ...
Most boards now regard cybersecurity as a business risk rather than solely a technical IT problem, according to a recent ...
Back in 1996, a Microsoft employee developed peer-to-peer (also referred to as point-to-point) tunnelling protocol (PPTP) to provide a more ...
Supply chain attacks are not new. The infamous SolarWinds attack laid the foundations for a supply chain attack frenzy. 2021 ...
In my opinion, one of the most loathed activities in the annals of computing history is the use of passwords ...
Cloud-based authentication service provider, Okta, is the latest tech company to experience a breach of their systems. Ransomware group Lapsus$ ...
Is WFH going to change the way I secure my IT? The McKinsey report, The future of work after COVID-19, ...
If today, organizations are struggling to secure on-premises, private clouds or public clouds as separate infrastructure setups, what more will ...
The cyberattack on Kaseya should be a reminder that vigilance against cyberattacks is not about waiting for the next exploit.
If you are adopting the cloud as your growth strategy, this Check Point Software infographic offers 7 reasons to use ...
This Check Point whitepaper to learn Check Point Maestro addresses current and future network security requirements in the cloud.
Check Point Research (CPR) raises some concerns particularly about how one app, Voila, because it includes specific and unique installation ...
ABI Research says the success of the Colonial Pipeline ransomware attack exposed wilful ignorance to take cybersecurity seriously
Check Point Research issues Q4 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people ...
The Solarwinds Orion hack is a reminder that enterprises need to stay vigilant because the threat landscape is real and ...
As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. Check Point created a ...
Check Point researchers find dangerous new Qbot variant is spreading via malspam campaigns to execute credentials theft, ransomware installation and ...
This is a community problem that continues to exist. The victims are consumers and enterprises. The winners are threat actors. ...
In this exclusive interview with FutureCIO, Maya Horowitz, director of Threat Intelligence and Research at Check Point Software Technologies talks ...
There is always a struggle in development cycles to make sure you are ahead of the competition and unfortunately sometimes ...
Adjusting to the new normal – how is Hong Kong’s internet infrastructure holding up to increased WFH pressure?
No organization, big or small, is immune from a devastating cyberattack. Cyber exploits are more sophisticated, elusive, and targeted than ...
The inherent vulnerabilities associated with healthcare devices, such as a lack of encryption of sensitive data as well as hard-coded ...
A weapon is anything that can be used against an opponent, adversary, or victim. In the digital economy, nearly everything ...
Check Point says its unified security management as a cloud service will cut security operations time by 60%
Itzik Feiglevitch, product manager for IoT Cyber Security at Check Point Software Technologies, provides an easy to grasp concepts behind ...
"Predicting the future is always difficult but the foreseeable future will have plenty of work. I think the world needs ...
The old saying “the only constant is change” couldn’t be truer when talking about technological progress. A raft of technologies ...
Gartner has identified seven emerging security and risk management trends that will impact security, privacy and risk leaders in the longer term. ...
FutureCIO is about enabling the CIO, his team, the leadership and the enterprise through shared expertise, know-how and experience - through a community of shared interests and goals. It is also about discovering unknown best practices that will help realize new business models.
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl
Copyright © 2022 Cxociety Pte Ltd | Designed by Pixl