Cyber Security

Healthcare providers turn to cloud faxing for secure transmission of confidential and sensitive documents

Healthcare providers turn to cloud faxing for secure transmission of confidential and sensitive documents

Security, privacy and regulatory compliance are the key factors driving uptake of cl..

CyberArk Advances Identity Security Market with Unmatched Cybersecurity Innovation

CyberArk Advances Identity Security Market with Unmatched Cybersecurity Innovation

  Identity Security Centered on Intelligent Privilege Controls Offers Customers..

June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking

June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking

  Check Point Research reports on new Android banking malware, MaliBot. Emotet,..

Fortified Castles With Wooden Gates: Weak Keys and Outdated Machine Identity Management Undermine TLSv1.3 Adoption

Fortified Castles With Wooden Gates: Weak Keys and Outdated Machine Identity Management Undermine TLSv1.3 Adoption

  Venafi-sponsored report shows the internet is no safer than it was six months..

Cyber Security Specialist, Core to Cloud, partners with iboss to bring unrivalled protection to  UK remote workforces

Cyber Security Specialist, Core to Cloud, partners with iboss to bring unrivalled protection to UK remote workforces

  29th June 2022: Cyber security specialist, Core to Cloud, has partnered with ..

Online Privacy Should be a Right not a Privilege

Online Privacy Should be a Right not a Privilege

  By:  Andrew Frost, CEO of Aloha Browser Privacy is recognized as a fundamenta..

Canonical Ubuntu Core 22 is now available – optimised for IoT and embedded devices

Canonical Ubuntu Core 22 is now available – optimised for IoT and embedded devices

The ultra-secure embedded Ubuntu introduces support for real-time compute in robotic..

WHO OWNS YOUR PRIVACY?

WHO OWNS YOUR PRIVACY?

  It’s Internet Safety Month and Aloha Is Reminding You to Own Your Privacy Rig..

The Cybersecurity Consolidation Conundrum: Why Less is Sometimes More

The Cybersecurity Consolidation Conundrum: Why Less is Sometimes More

  While employees and organizations are busy settling into remote or hybrid wor..

AlgoSec Wins ‘Hot Company Policy Management’  at the Global InfoSec Awards 2022

AlgoSec Wins ‘Hot Company Policy Management’ at the Global InfoSec Awards 2022

  June 2022 – AlgoSec, the leading provider of business-focused network s..

Check Point Software Partners with Dundee & Angus College to Train the Next Generation of Cyber Security Specialists

Check Point Software Partners with Dundee & Angus College to Train the Next Generation of Cyber Security Specialists

  ‘The Cyber Lab by Check Point SecureAcademy’ and training at Dundee & Ang..

Securing identities as digital transforms organisations

Securing identities as digital transforms organisations

  Rich Turner, SVP EMEA, CyberArk The accelerated rate of digital transformatio..

CyberArk Ventures Launches with $30 Million Fund to Fuel Innovative Cybersecurity Technologies

CyberArk Ventures Launches with $30 Million Fund to Fuel Innovative Cybersecurity Technologies

  CyberArk Aligns with World-Class Investors Including Venrock, YL Ventures, T..

Open Systems Named in the 2022 Gartner® Market Guide for Managed Security Services

Open Systems Named in the 2022 Gartner® Market Guide for Managed Security Services

  Company now recognized by Gartner as a Representative Vendor in the MSS, MDR ..

Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According to New Fortinet Report

Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According to New Fortinet Report

  Fortinet Releases New Research on Key Concerns around the Cybersecurity Talen..

Ransomware Costs are 7x higher than Ransom Paid

Ransomware Costs are 7x higher than Ransom Paid

  Check Point Research (CPR) shares new insights into the ransomware economy af..

Your phone number on Google? Search giant now takes removal demands

Your phone number on Google? Search giant now takes removal demands

By Paresh Dave OAKLAND, Calif. (Reuters) – Alphabet Inc’s Google has beg..

Three cyber attacks from 2021 that went under the radar

Three cyber attacks from 2021 that went under the radar

David Higgins, EMEA Technical Director at CyberArk 2022has already seen multiple maj..

Why are cybercriminals increasing their focus on mobile devices?

Why are cybercriminals increasing their focus on mobile devices?

A survey carried out in the last year revealed that almost half (49%) of organizatio..

Going on the attack: Top five consequences of cyber security breaches

Going on the attack: Top five consequences of cyber security breaches

By: Chris Huggett, Senior Vice President EMEA & India, Sungard Avail..

February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index

February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index

Check Point Research reveals that Emotet is again the most prevalent malware, while ..

Supply Chain Attacks: How cybercriminals exploit the trust between organizations

Supply Chain Attacks: How cybercriminals exploit the trust between organizations

February 23rd, 2022 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a lead..

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

Check Point Research (CPR) spots new malware that is actively being distributed thro..

2022 Cybersecurity Predictions

2022 Cybersecurity Predictions

By: Avital Sincai – COO & Co-founder Cydome Digitalisation within th..

Security in the UK: Certifications, Features, and Programmes Designed to Help Protect Organisations

Security in the UK: Certifications, Features, and Programmes Designed to Help Protect Organisations

As our customer base broadened in the wake of the COVID-19 pandemic, people used our..

January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot

January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot

Check Point Research reveals that the InfoStealer, Lokibot, is back in the most prev..

How Hackers Run Token Scams to “Rug Pull” Money

How Hackers Run Token Scams to “Rug Pull” Money

In a new publication, Check Point Research (CPR) shows how scammers misconfigure sma..

Check Point Software’s 2022 Security Report: Global Cyber Pandemic’s Magnitude Revealed

Check Point Software’s 2022 Security Report: Global Cyber Pandemic’s Magnitude Revealed

‘Cyber Attack Trends: 2022 Security Report’ uncovers the key cybersecurity trends fr..

Why detection is dead when it comes to the cybersecurity of Critical Infrastructure 

Why detection is dead when it comes to the cybersecurity of Critical Infrastructure 

By: Audra Simons – Senior Director, G2CI Global Products – Forcepoint The push to be..

Cybersecurity challenges streaming providers face

Cybersecurity challenges streaming providers face

By: Muhammad Rehman, VP, Product Management, CDN, Cloud Security & Edge Computin..

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

Check Point Research reveals that Emotet has risen from seventh to second place in t..

AI and ML technologies are often the key missing ingredient for SMBs looking to achieve ultimate cyber security resilience

AI and ML technologies are often the key missing ingredient for SMBs looking to achieve ultimate cyber security resilience

By: Matt Aldridge, Principal Solutions Consultant,Carbonite + Webroot As..

Cyber Attacks Increased 50% in 2021 and Peaked in December due to Log4J Exploits

Cyber Attacks Increased 50% in 2021 and Peaked in December due to Log4J Exploits

To start the new year, Check Point Research (CPR) is sharing global statistics of cy..

Leading industry experts discuss which Cybersecurity trends are set to shape 2022

Leading industry experts discuss which Cybersecurity trends are set to shape 2022

Undoubtedly, the accelerated digital transformation caused by the pandemic has left ..

Majority of public expect banks to pay out for rising scam attempts

Majority of public expect banks to pay out for rising scam attempts

More than half (58%) of the British public reported receiving scam attempts at least..

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery

Eliminates Unnecessary Network Downtime,  Creates Additional Layer of Certainty in D..

November 2021’s Most Wanted Malware: Emotet Returns to the Top 10

November 2021’s Most Wanted Malware: Emotet Returns to the Top 10

Check Point Research reveals that Emotet is now the seventh most prevalent malware, ..