
CISO’s guide to managing supply chain risks
Supply chain attacks are not new. The infamous SolarWinds attack laid the foundations for a supply chain attack frenzy. 2021

Supply chain attacks are not new. The infamous SolarWinds attack laid the foundations for a supply chain attack frenzy. 2021

In my opinion, one of the most loathed activities in the annals of computing history is the use of passwords

Cloud-based authentication service provider, Okta, is the latest tech company to experience a breach of their systems. Ransomware group Lapsus$

Is WFH going to change the way I secure my IT? The McKinsey report, The future of work after COVID-19,

If today, organizations are struggling to secure on-premises, private clouds or public clouds as separate infrastructure setups, what more will

The cyberattack on Kaseya should be a reminder that vigilance against cyberattacks is not about waiting for the next exploit.

If you are adopting the cloud as your growth strategy, this Check Point Software infographic offers 7 reasons to use

This Check Point whitepaper to learn Check Point Maestro addresses current and future network security requirements in the cloud.

Check Point Research (CPR) raises some concerns particularly about how one app, Voila, because it includes specific and unique installation

ABI Research says the success of the Colonial Pipeline ransomware attack exposed wilful ignorance to take cybersecurity seriously
Check Point Research issues Q4 Brand Phishing Report, highlighting the leading brands that hackers imitated in attempts to lure people

The Solarwinds Orion hack is a reminder that enterprises need to stay vigilant because the threat landscape is real and