Portrait of a versatile security assessment tool turned rogue
It is powerful, easily modifiable for malicious use, and its wide adoption gives cyberdefenders a hard time identifying the group involved.
Read MoreSelect Page
By Lotem Finkelsteen, Head, Threat Intelligence, Check Point Research (CPR) and webmaster webmaster | Tuesday, November 9, 2021, 4:00 PM Asia/Singapore | Newsletter, Tips
It is powerful, easily modifiable for malicious use, and its wide adoption gives cyberdefenders a hard time identifying the group involved.
Read MoreBy TJ Gonen, Head, Cloud Solutions, Check Point Software Technologies and webmaster webmaster | Wednesday, June 30, 2021, 9:20 AM Asia/Singapore | Newsletter, Opinions
Such applications can only be protected by cloud native security that automatically adapts to application changes, argues this expert.
Read MoreBy Teresa Walsh, Global Head of Intelligence, FS-ISAC and webmaster webmaster | Monday, May 31, 2021, 3:13 PM Asia/Singapore | Opinions
Through constant joint information sharing and pre-emptive defense groupthink, this vulnerable industry can unite to diffuse data-theft fallout.
Read MoreBy Sharat Sinha, Vice President/GM, APAC, Check Point Software Technologies and webmaster webmaster | Wednesday, November 25, 2020, 11:40 AM Asia/Singapore | Newsletter, Opinions
Here are one expert’s thoughts on general cybersecurity issues, 5G, Internet of Threats and data privacy in the coming year.
Read MoreBy Omri Herscovici, Vulnerability Research Team Lead, Check Point Software Technologies and webmaster webmaster | Wednesday, April 1, 2020, 11:08 AM Asia/Singapore | Newsletter, Tips
In today’s remote-working frenzy, Zoom is an app that facilitates the inevitable...
Read MoreBy Edwin Doyle, Global Security Strategist, Check Point Software Technologies and webmaster webmaster | Saturday, October 5, 2019, 1:18 PM Asia/Singapore | Cyber Warfare, Opinions
What should we do when breaches are no longer a laughing matter? Let’s reminisce about the good...
Read MoreBy Sharat Sinha, Vice President/GM, APAC, Check Point Software Technologies and webmaster webmaster | Wednesday, September 25, 2019, 6:53 PM Asia/Singapore | Cyber Warfare, Opinions
As the Internet evolved rapidly with accelerated adoption, cybersecurity became increasingly a...
Read MoreBy Jonathan Gold-Shalev, Senior Product Manager, Threat Prevention, Check Point Software Technologies and webmaster webmaster | Thursday, September 5, 2019, 3:34 PM Asia/Singapore | Opinions
Productivity doesn’t have to be the price you pay to detect and prevent unknown file-based...
Read More
PARTICIPATE NOW |
|