Recent advancements in exploitation methods pose significant challenges, writes Check Point’s Lionel Dartnall.
Browsing: Check Point Software Technologies
Despite its obsolescence, Internet Explorer remains a target for cybercriminals, according to Check Point Software Technologies.
Check Point’s Lionel Dartnall unpacks the challenges and solutions in the cybersecurity landscape.
Check Point’s Rudi van Rooyen explains why cloud security is not as straightforward as organisations might assume.
Over the past four years, LockBit has been involved in thousands of ransomware attacks on victims around the world.
“Anonymous Sudan” says it’s waging cyber strikes out of Africa on behalf of oppressed Muslims worldwide. Experts disagree.
Promoted | Intrigued as to why cybersecurity loopholes never close? Research has shown that 81% of security breaches involve weak or stolen credentials. But how can organisations solve this problem?
Promoted | Where do your most pressing security vulnerabilities lie today? Join Performanta’s Gerhard Swart and Check Point’sMatan Burstein for this informative, pre-recorded TechCentral webinar to learn more.