
Busting the 12 myths of cloud security
As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. Check Point created a

As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. Check Point created a

Check Point researchers find dangerous new Qbot variant is spreading via malspam campaigns to execute credentials theft, ransomware installation and

This is a community problem that continues to exist. The victims are consumers and enterprises. The winners are threat actors.

In this exclusive interview with FutureCIO, Maya Horowitz, director of Threat Intelligence and Research at Check Point Software Technologies talks

There is always a struggle in development cycles to make sure you are ahead of the competition and unfortunately sometimes

Adjusting to the new normal – how is Hong Kong’s internet infrastructure holding up to increased WFH pressure?

No organization, big or small, is immune from a devastating cyberattack. Cyber exploits are more sophisticated, elusive, and targeted than

The inherent vulnerabilities associated with healthcare devices, such as a lack of encryption of sensitive data as well as hard-coded

A weapon is anything that can be used against an opponent, adversary, or victim. In the digital economy, nearly everything

Check Point says its unified security management as a cloud service will cut security operations time by 60%

Itzik Feiglevitch, product manager for IoT Cyber Security at Check Point Software Technologies, provides an easy to grasp concepts behind

“Predicting the future is always difficult but the foreseeable future will have plenty of work. I think the world needs