Security July 8, 2025 How a Hybrid Mesh Architecture Disrupts the Attack Chain (Part Two) In Part 1 we covered the basics and how a fragmented approach ... Read more
Company and Culture July 7, 2025 Employee Spotlight: Getting to Know Alon Kanat Alon, can you tell us a bit about yourself? Well, I hold a Bachelor of ...
Research July 7, 2025 Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation Check Point Research identifies phishing domain patterns, offering actionable insights to proactively counter threats from ...
Innovation July 4, 2025 Disrupting the Ransomware Attack Chain with Hybrid Mesh Security (Part 1) In this three-part blog series, we explore how a hybrid mesh architecture can effectively break ...
Research July 3, 2025 Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals Ahead of this year’s Amazon Prime Day 2025 on July 8th, shoppers worldwide are preparing ...
Harmony SASE July 2, 2025 From VPN to SASE: Enabling Hybrid Work Beyond Legacy Access It’s 8 AM EST and your VPN is already at 85% capacity. New York comes ...
Infinity Global Services July 1, 2025 Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation In today’s evolving threat landscape, proactive security measures are more critical than ever. Penetration Testing ...
Executive Insights June 30, 2025 BEYOND DEFENSE: Hong Kong’s New Era of Financial Cyber Resilience Hong Kong, a key international financial hub, is confronting increasingly sophisticated cyber threats that demand ...
Securing the Network June 27, 2025 World SMB Day: Eight Network Tech Essentials Every Small Business Needs Small and medium-sized businesses (SMBs) are the backbone of the global economy. And to be ...
Security June 26, 2025 Turn a Single Detection into Enterprise-Wide Prevention with Infinity Playblocks Modern cyber attacks move faster than ever before. While your security team is analyzing one ...
Infinity Global Services June 26, 2025 The AI Arms Race: When Attackers Leverage Cutting-Edge Tech For too long, the narrative around AI in cyber security has focused on its defensive ...
Harmony June 25, 2025 Frost & Sullivan Report Validates Value of Consolidated Security The endpoint security landscape is evolving faster than many security teams can keep up. While ...
Artificial Intelligence June 25, 2025 AI Evasion: The Next Frontier of Malware Techniques Check Point Research identifies the first documented case of malware embedding prompt injection to evade ...
Research June 12, 2025 Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage Attacks
Innovation April 21, 2025 Check Point Named a Leader and the Outperformer in the GigaOm Radar for Enterprise Firewalls 2025
Company and Culture March 17, 2025 Check Point Named Gold Winner for Cloud Security in 2025 Globee Cybersecurity Awards
Harmony July 16, 2024 Check Point Recognized as a Leader in Forrester Wave for Mobile Threat Defense Solutions