Category: Check Point Blog

The Jedi of Code: May CloudGuard Be with You

Imagine a wise Jedi knight, ever-vigilant, honest, and focused on what truly matters: protecting your Crown Jewels in the Cloud. This Jedi, like a wise Master, guides you with a focus on the impact on your organization. With Check Point…

Getting to Know Katrin Bauer

Katrin Bauer is a channel manager based in Vienna, Austria. Read on to learn more about Katrin’s career journey and story. Katrin, tell us a bit about your background and role at Check Point. What does your day-to-day look like as…

How MSSPs Can Navigate the Regulatory Landscape: Ensuring Compliance

As regulatory bodies continuously update standards to address emerging security threats, Managed Security Service Providers (MSSPs) face significant challenges in keeping up with changing regulations. Consequently, they must not only practice vigilance and agility but also adopt a proactive approach…

Getting to Know Check Point Olympian: Ron Darmon

Get to know Ron Darmon, a former Olympic triathlete and now a data scientist on our XDR security content team. Discover how his Olympic experience has shaped his mindset and prepared him for a career in data science.  Ron, how…

Getting to Know Tim Otis

Tim Otis, Head of Incident Response (IR) and Managed Detection and Response (MDR), brings 28 years of cyber security expertise to Check Point, where he has dedicated the past 17 years. His extensive experience spans roles in help desk, systems…

Are You Getting the Most Value from Your Existing CNAPP Solution?

As many organizations feel overwhelmed by increasing cloud complexity, Cloud Native Application Protection Platforms (CNAPPs) have emerged as a resource to ensure comprehensive and streamlined security. However, a robust CNAPP solution like Check Point CloudGuard offers so many features and…

Protecting Your Cloud Application Against Unknown Risks

Cloud native security measures are primarily focused on safeguarding against identifiable threats, employing innovative technologies like big data and AI to monitor and preempt potential attacks. Despite these efforts, however, no system can ever be completely impervious to threats. Even…

Empowering Women Through Mentoring: Meet Laura Hidalgo

Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…

CrowdStrike Disruptions – Ensuring Business Continuity

In the last few hours, major disruptions on CrowdStrike’s Falcon platform causing significant productivity impacts due to inaccessible documents have been reported. The CrowdStrike Falcon update has led to a “blue screen of death” globally, severely impacting business operations dependent…

Transforming MSSPs into Thought Leaders

A New Paradigm for Sales Motions Managed Security Service Providers (MSSPs) know that the Quarterly Business Review (QBR) with clients often masquerades as an opportunity to pitch new services, upsell existing ones, and raise bottom line. However, as the cybersecurity…

MuddyWater Threat Group Deploys New BugSleep Backdoor

Check Point Research (CPR) warns that Iranian threat group MuddyWater has significantly increased its activities against Israel and is deploying a new, previously undocumented backdoor campaign. Key Findings MuddyWater, an Iranian threat group affiliated with the Ministry of Intelligence and…

Harnessing the Power of Advanced MDR for SIEM Platforms

Enhance Your Cybersecurity with Check Point Infinity Global Services and Microsoft Sentinel In the fast-paced world of cyber security, organizations need state-of-the-art solutions to outpace emerging threats. Advanced Managed Detection and Response (MDR) is a game-changer, offering robust protection by…

Harnessing the Power of Managed CNAPP by Check Point

A Holistic Approach to Protecting Your Cloud Assets In today’s fast-paced digital landscape, organizations are increasingly turning to cloud-native solutions to drive their business forward. However, with the growing reliance on cloud infrastructure comes a heightened need for robust security…

Data: The Final(?) Security Frontier

Navigating the digital realm without robust data security is like sailing stormy seas without a compass. A staggering 69% of organizations battled cyber attacks last year, and in a world rife with evolving cyber threats, playing catch-up isn’t an option.…

Why Hybrid Cloud Security is the Future

The cloud is a fantastic way to deliver a multitude of services, but it’s equally important to recognize when a purely cloud approach can be sub-optimal. That’s why Harmony SASE takes a hybrid route. Our secure Internet Access offering provides…

The Evolution of QR Code Phishing: ASCII-Based QR Codes

Introduction Quishing—QR code phishing—is a rapidly evolving threat. Starting around August, when we saw the first rapid increase, we’ve also seen a change in the type of QR code attacks. It started with standard MFA authentication requests. It then evolved…

Getting to Know Natalia Vezhevatova

Natalia Vezhevatova is a territory account manager at Check Point with a background in IT account management, sales, and renewals. Read on to learn more about Natalia’s career journey and story. Tell us a bit about your background and role…

Empowering Women Through Mentoring: Meet Rebecca Frizzarin

Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…

Unveiling CNAPP+P: The Extra Mile in Cyber Defense

Introduction In the fast-evolving landscape of cyber security, where threats loom large and innovation is constant, staying ahead of the curve is imperative. At CPX 2024, a pivotal event in the realm of cyber security hosted by Check Point, a…

AI and Automation in the Race to Reduce Attack Dwell Time

Threat Detection and Incident Response (TDIR) is at the forefront of every Chief Information Security Officer’s (CISO) agenda. The relentless pace of technological advancements and the continuous evolution of cyber threats demand that security leaders stay ahead through constant innovation…

AAPI Heritage Month Spotlight: Archana Ragothaman

In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on Check Point’s AAPI employees. We sat down with Archana Ragothaman, Head of Sales Engineering, US Global Accounts, to learn about how she honors her…

5 data security concepts you need to know

Everyone is talking about data security and its importance, but what does that practically look like? Let’s take a look…   Our newly released Cloud Security Report showed a startling trend in the data. Data breaches have now surpassed misconfigurations…

Empowering Women Through Mentoring: Meet Cordelia Allway

Check Point’s EMEA Women’s Mentorship Program is an experience designed to support women in their journey as leaders. Through one-to-one coaching, we aim to help women build confidence, develop career skills, and foster an environment of support and shared success…

AAPI Heritage Month Spotlight: Jenny Nguyen

In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on some of our AAPI employees. We sat down with Jenny Nguyen, a campaign operations manager in our Redwood City office, to discuss her favorite…

Drop My VPN – Are You Nuts?

If the title of this post caught your attention, maybe you’ve thought about moving on from your VPN because of performance issues or security concerns but are still researching alternatives. On the other hand, perhaps you actually do think it’s…

Spoofing Shein for Credential Harvesting

Introduction Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads. The e-commerce platform is Googled more frequently than major brands like Nike…

Extending SASE Protection Into the Browser

If you want to protect your remote workers one of the best places to start is the web browser. It’s the primary portal to our workday for accessing everything from files to SaaS applications or just browsing the web. That’s…