Cyber Security

Healthcare providers turn to cloud faxing for secure transmission of confidential and sensitive documents

Healthcare providers turn to cloud faxing for secure transmission of confidential and sensitive documents

Security, privacy and regulatory compliance are the key factors driving uptake of cloud fax in healthcare Monday 18 July 2022 – Cloud-..

CyberArk Advances Identity Security Market with Unmatched Cybersecurity Innovation

CyberArk Advances Identity Security Market with Unmatched Cybersecurity Innovation

  Identity Security Centered on Intelligent Privilege Controls Offers Customers a Modern Way to Secure All Identities and Assets,..

June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking

June 2022’s Most Wanted Malware: New Banking, MaliBot, Poses Danger for Users of Mobile Banking

  Check Point Research reports on new Android banking malware, MaliBot. Emotet, with new variant, is still the most prevalent mal..

Fortified Castles With Wooden Gates: Weak Keys and Outdated Machine Identity Management Undermine TLSv1.3 Adoption

Fortified Castles With Wooden Gates: Weak Keys and Outdated Machine Identity Management Undermine TLSv1.3 Adoption

  Venafi-sponsored report shows the internet is no safer than it was six months ago SALT LAKE CITY – June 30, 2022 — Venafi®, the..

Cyber Security Specialist, Core to Cloud, partners with iboss to bring unrivalled protection to  UK remote workforces

Cyber Security Specialist, Core to Cloud, partners with iboss to bring unrivalled protection to UK remote workforces

  29th June 2022: Cyber security specialist, Core to Cloud, has partnered with one of the most awarded cloud security companies i..

Online Privacy Should be a Right not a Privilege

Online Privacy Should be a Right not a Privilege

  By:  Andrew Frost, CEO of Aloha Browser Privacy is recognized as a fundamental human right by the UN and is widely discussed in..

Canonical Ubuntu Core 22 is now available – optimised for IoT and embedded devices

Canonical Ubuntu Core 22 is now available – optimised for IoT and embedded devices

The ultra-secure embedded Ubuntu introduces support for real-time compute in robotics and industrial applications. 15 June 2022: Canon..

WHO OWNS YOUR PRIVACY?

WHO OWNS YOUR PRIVACY?

  It’s Internet Safety Month and Aloha Is Reminding You to Own Your Privacy Rights  London 10th June 2022 – Aloha Browser are tak..

The Cybersecurity Consolidation Conundrum: Why Less is Sometimes More

The Cybersecurity Consolidation Conundrum: Why Less is Sometimes More

  While employees and organizations are busy settling into remote or hybrid working, cybersecurity professionals continue to grap..

AlgoSec Wins ‘Hot Company Policy Management’  at the Global InfoSec Awards 2022

AlgoSec Wins ‘Hot Company Policy Management’ at the Global InfoSec Awards 2022

  June 2022 – AlgoSec, the leading provider of business-focused network security management solutions, has announced that i..

Check Point Software Partners with Dundee & Angus College to Train the Next Generation of Cyber Security Specialists

Check Point Software Partners with Dundee & Angus College to Train the Next Generation of Cyber Security Specialists

  ‘The Cyber Lab by Check Point SecureAcademy’ and training at Dundee & Angus College will provide students with the necessar..

Securing identities as digital transforms organisations

Securing identities as digital transforms organisations

  Rich Turner, SVP EMEA, CyberArk The accelerated rate of digital transformation that accompanied the Covid-19 pandemic shows no ..

CyberArk Ventures Launches with $30 Million Fund to Fuel Innovative Cybersecurity Technologies

CyberArk Ventures Launches with $30 Million Fund to Fuel Innovative Cybersecurity Technologies

  CyberArk Aligns with World-Class Investors Including Venrock, YL Ventures, Team8 Capital and Merlin Ventures to Fund Cybersecu..

Open Systems Named in the 2022 Gartner® Market Guide for Managed Security Services

Open Systems Named in the 2022 Gartner® Market Guide for Managed Security Services

  Company now recognized by Gartner as a Representative Vendor in the MSS, MDR and recognized Vendor in SASE spaces Redwood City,..

Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According to New Fortinet Report

Cybersecurity Skills Gap Contributed to 80 Percent of Breaches According to New Fortinet Report

  Fortinet Releases New Research on Key Concerns around the Cybersecurity Talent Shortage, Recruitment, Diversity, and Security A..

Ransomware Costs are 7x higher than Ransom Paid

Ransomware Costs are 7x higher than Ransom Paid

  Check Point Research (CPR) shares new insights into the ransomware economy after further analyzing Conti group leaksand differe..

Your phone number on Google? Search giant now takes removal demands

Your phone number on Google? Search giant now takes removal demands

By Paresh Dave OAKLAND, Calif. (Reuters) – Alphabet Inc’s Google has begun entertaining people’s requests to remove ..

Three cyber attacks from 2021 that went under the radar

Three cyber attacks from 2021 that went under the radar

David Higgins, EMEA Technical Director at CyberArk 2022has already seen multiple major cyber attacks. As companies and security expert..

Why are cybercriminals increasing their focus on mobile devices?

Why are cybercriminals increasing their focus on mobile devices?

A survey carried out in the last year revealed that almost half (49%) of organizations worldwide are unable to detect an attack or bre..

Going on the attack: Top five consequences of cyber security breaches

Going on the attack: Top five consequences of cyber security breaches

By: Chris Huggett, Senior Vice President EMEA & India, Sungard Availability Services Last year, we saw a marked upturn..

February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index

February 2022’s Most Wanted Malware: Emotet Remains Number One While Trickbot Slips Even Further Down the Index

Check Point Research reveals that Emotet is again the most prevalent malware, while Trickbot falls from second place into sixth. Apach..

Supply Chain Attacks: How cybercriminals exploit the trust between organizations

Supply Chain Attacks: How cybercriminals exploit the trust between organizations

February 23rd, 2022 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally,..

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

New Malware Capable of Controlling Social Media Accounts Infects 5,000+ Machines and is actively being Distributed via Gaming Applications on Microsoft’s Official Store

Check Point Research (CPR) spots new malware that is actively being distributed through gaming applications on Microsoft’s offic..

2022 Cybersecurity Predictions

2022 Cybersecurity Predictions

By: Avital Sincai – COO & Co-founder Cydome Digitalisation within the maritime industry has flourished over the past c..

Security in the UK: Certifications, Features, and Programmes Designed to Help Protect Organisations

Security in the UK: Certifications, Features, and Programmes Designed to Help Protect Organisations

As our customer base broadened in the wake of the COVID-19 pandemic, people used our platform to connect in more ways, with schools, e..

January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot

January 2022’s Most Wanted Malware: Lokibot Returns to the Index and Emotet Regains Top Spot

Check Point Research reveals that the InfoStealer, Lokibot, is back in the most prevalent malwares list while Emotet has taken first p..

How Hackers Run Token Scams to “Rug Pull” Money

How Hackers Run Token Scams to “Rug Pull” Money

In a new publication, Check Point Research (CPR) shows how scammers misconfigure smart contracts to create fraudulent tokens. The repo..

Check Point Software’s 2022 Security Report: Global Cyber Pandemic’s Magnitude Revealed

Check Point Software’s 2022 Security Report: Global Cyber Pandemic’s Magnitude Revealed

‘Cyber Attack Trends: 2022 Security Report’ uncovers the key cybersecurity trends from 2021, including a supply chain attack ‘frenzy’ ..

Why detection is dead when it comes to the cybersecurity of Critical Infrastructure 

Why detection is dead when it comes to the cybersecurity of Critical Infrastructure 

By: Audra Simons – Senior Director, G2CI Global Products – Forcepoint The push to become more digitally-driven, make use of cloud tech..

Cybersecurity challenges streaming providers face

Cybersecurity challenges streaming providers face

By: Muhammad Rehman, VP, Product Management, CDN, Cloud Security & Edge Computing at Edgecast Cybercriminals are more adept than e..

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

December 2021’s Most Wanted Malware: Trickbot, Emotet and the Log4j plague

Check Point Research reveals that Emotet has risen from seventh to second place in the most prevalent malwares index while Trickbot re..

AI and ML technologies are often the key missing ingredient for SMBs looking to achieve ultimate cyber security resilience

AI and ML technologies are often the key missing ingredient for SMBs looking to achieve ultimate cyber security resilience

By: Matt Aldridge, Principal Solutions Consultant,Carbonite + Webroot As the pandemic continues,businesses are increasingl..

Cyber Attacks Increased 50% in 2021 and Peaked in December due to Log4J Exploits

Cyber Attacks Increased 50% in 2021 and Peaked in December due to Log4J Exploits

To start the new year, Check Point Research (CPR) is sharing global statistics of cyber attack increases observed in 2021 by region, c..

Leading industry experts discuss which Cybersecurity trends are set to shape 2022

Leading industry experts discuss which Cybersecurity trends are set to shape 2022

Undoubtedly, the accelerated digital transformation caused by the pandemic has left organisations increasingly vulnerable to cyberatta..

Majority of public expect banks to pay out for rising scam attempts

Majority of public expect banks to pay out for rising scam attempts

More than half (58%) of the British public reported receiving scam attempts at least once per week  Most (67%) expect their bank to fo..

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery

Extreme Ensures Security, Availability Across Service Provider Data Center and Mobile Edge Network Infrastructure with Trusted Delivery

Eliminates Unnecessary Network Downtime,  Creates Additional Layer of Certainty in Deploying New Infrastructure SAN JOSE, Calif, —Extr..

November 2021’s Most Wanted Malware: Emotet Returns to the Top 10

November 2021’s Most Wanted Malware: Emotet Returns to the Top 10

Check Point Research reveals that Emotet is now the seventh most prevalent malware, and its return is deemed “extremely concerning.” T..