Check Point
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
Network Perception and Check Point integration strenghtens the security of OT firewall environments
Network Perception and Check Point Software Technologies have integrated security technologies, making it possible to ensure that OT firewall environments are properly …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101053/phishing-400x200.jpg)
DHL takes top spot in brand phishing attempts
Check Point Research has published its Brand Phishing Report for Q3 2022, which highlights the brands which were most frequently imitated by criminals in their attempts to …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
GoSecure expands partnership with Check Point to improve clients’ cybersecurity defenses
GoSecure and Check Point partnership will enable GoSecure to add support for Check Point’s security products, expanding their open ecosystem of MDR/XDR technology partners. …
![LinkedIn](https://img.helpnetsecurity.com/wp-content/uploads/2022/07/21114330/linkedin-hns-400x200.jpg)
The rise and continuing popularity of LinkedIn-themed phishing
Phishing emails impersonating LinkedIn continue to make the bulk of all brand phishing attempts; according to Check Point, 45% of all email phishing attempts in Q2 2022 …
![Cyber Week 2022](https://img.helpnetsecurity.com/wp-content/uploads/2022/06/29073517/cyberweek2022-showcase-400x200.jpg)
Photos: Cyber Week 2022
Cyber Week is a large annual international cybersecurity event, hosted each year at Tel Aviv University in Israel. Cyber Week 2022 is held jointly by the Blavatnik …
![fish phishing](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114006/fish-400x200.jpg)
Phishers’ favorite brands in Q4 2021
International courier and package delivery company DHL heads the list of most imitated brands by phishers and malware peddlers in Q4 2021, according to Check Point Research. …
![Handshake](https://img.helpnetsecurity.com/wp-content/uploads/2021/10/14111328/handshake_1200-400x200.jpg)
iTecs partners with Check Point to improve cybersecurity protection for clients
iTecs enters into a partnership with Check Point to provide iTecs clients with efficacious cybersecurity protection. The collaboration between the two parties enables iTecs to …
![Log4j](https://img.helpnetsecurity.com/wp-content/uploads/2021/12/15084105/log4j-hns-bw-400x200.jpg)
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
Due to the extraordinary widespread use of the open-source Apache Log4j library, the saga of the Log4Shell (CVE-2021-44228) vulnerability is nowhere near finished. As Dr. …
Alkira partners with Check Point to improve security for enterprise cloud networking
Alkira and Check Point Software Technologies announced a technology alliance to provide Check Point Software’s CloudGuard firewalls in Alkira’s Cloud Network infrastructure …
Check Point acquires Avanan to deliver email and collaboration suite security for organizations
Check Point Software Technologies announced the acquisition of Avanan. Avanan technology provides the highest level of security for emails and SaaS collaboration suites. …
![Esti Peshin](https://img.helpnetsecurity.com/wp-content/uploads/2021/08/09095926/esti-peshin-iai-400x200.jpg)
Elevating cyber resilience and tackling government information security challenges
Esti Peshin is VP, General Manager, Cyber Division, Israel Aerospace Industries (IAI). Previously, she served 11 years in the Israeli Defense Forces, in an elite technology …
Infovista Ipanema SD-WAN platform allows critical applications to adapt to real-time conditions
Infovista launched its next generation Ipanema SD-WAN platform, designed to deliver different workloads and applications across conventional Wide Area Networks and multiple …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders