Date | Title | Description |
27.06.2025 | Tech sector faces sharp rise in AI & ransomware threats | - |
25.06.2025 | Beyond the legacy: Rethinking SIEMs in an age of cyber escalation | - |
24.06.2025 | How CISOs became the gatekeepers of $309B AI infrastructure spending | Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more
Enterprise AI infrastructure spending is expected to reach $309 billion by 2032. T... |
18.06.2025 | Are cybersecurity stocks a new safety trade? What the Israel-Iran conflict shows | - |
16.06.2025 | 1Password and AWS join forces to secure AI, cloud environments for the enterprise | Join the event trusted by enterprise leaders for nearly two decades. VB Transform brings together the people building real enterprise AI strategy. Learn more
1Password, the Canadian password management company, announced Monday a strategic ... |
16.06.2025 | Don't Wait for a Breach — Here Are 5 Easy Steps to Fortify Your Cybersecurity Cybercrime could drain over $639 billion from the U.S. in 2025 — and hit $1.82 trillion by 2028. Is your enterprise ready,... | Cybercrime is projected to cause over $639 billion in losses in the United States in 2025 — and some projections expect those costs to grow as high as $1.82 trillion by 2028.
Needless to say, it has never been more important for enterprises... |
12.06.2025 | Inside the Aftermath: What Really Happens When You Get Hacked | For any CSO or CISO, it’s the stuff of nightmares – the moment years of defence and planning collapse, the network paralysed, vital data encrypted and out of reach. Your files are gone. In their place, a demand:
“To the board of directors. ... |
11.06.2025 | The Digital Fortress: Why Data Security is Non-Negotiable for Financial Firms | In the fast-paced world of finance, data security is no longer a luxury. It’s a necessity. The digital landscape is a battlefield, and every company is a potential target. Cyberattacks are on the rise, and the stakes are high. For financial... |
11.06.2025 | Merlin Ventures: $75 Million Inaugural Fund Closed | Merlin Ventures announced the closing of its oversubscribed inaugural fund, exceeding its $75 million target. And with a strong emphasis on the growing Israeli tech ecosystem, this landmark fund advances market opportunities for high-growth... |
10.06.2025 | Pax8 expands cybersecurity offerings with Check Point suite | - |
09.06.2025 | Report: Cloud Complexity is Outpacing Cyber Defence | As hybrid, multi-cloud, and edge architectures continue to expand, new research shows that many organisations are relying on outdated security models that are struggling to keep up.
Cybersecurity firm Check Point’s 2025 Cloud Security Repor... |
09.06.2025 | Blindagem digital: a segurança de dados como investimento essencial para as empresas financeiras | *Por Caio Bretones
Em um cenário financeiro cada vez mais digitalizado, a segurança de dados deixou de ser um diferencial para se tornar uma necessidade urgente para empresas de todos os portes, e uma obrigatoriedade para quem provê serviço... |
07.06.2025 | Navigating the Digital Jungle: Strategies for Startup Survival and Cybersecurity in Remote Work | In the fast-paced world of startups, establishing a digital presence is akin to planting a seed in a vast jungle. Many entrepreneurs believe that securing a domain and launching a website is enough to thrive. This belief is a dangerous illu... |
06.06.2025 | Addressing the challenges of securing remote work environments | Attack surface management is a critical component of cybersecurity. Companies must identify, assess, and secure all possible points of entry to keep hackers out because any point left unsecured becomes a vulnerable attack surface.
In the wa... |
05.06.2025 | Открытые API и ИИ могут увеличить долю успешных атак на финсектор | - |
03.06.2025 | Cyber Attacks Are Up 47% in 2025 – AI is One Key Factor | Image: lucadp/Adobe Stock
Cyber attacks on businesses continue to escalate in 2025, with global organisations experiencing an average of 1,925 incidents per week in Q1, which is a 47% increase compared to the same period last year, accordin... |
30.05.2025 | Why better data management is crucial for Australian Organisations facing cyber breaches | - |
30.05.2025 | AI-driven phishing attacks surge against Australian targets in 2024 | - |
29.05.2025 | Security agencies urge stronger AI data protocols & SIEM shift | - |
29.05.2025 | AI agents spark new enterprise security fears, report shows | - |
27.05.2025 | Check Point to Acquire Veriti to Transform Threat Exposure Management and Reduce Organizations’ Cyber Attack Surface | Veriti is the first to introduce preemptive exposure management delivering automated remediation of threat exposure risks and collaborative threat prevention across complex multi-vendor environments
REDWOOD CITY, Calif., May 27, 2025 (GLOBE... |
23.05.2025 | 184 Million Records Database Leak: Microsoft, Apple, Google, Facebook, PayPal Logins Found | Image: Bussarin/Adobe Stock
A leaked 47GB database has exposed more than 184 million records, potentially placing affected individuals at high risk of identity theft and cybercrime. The stolen login credentials include accounts from major g... |
21.05.2025 | Check Point Software Technologies Named One of America’s Best Cybersecurity Companies by Newsweek and Statista | REDWOOD CITY, Calif., May 21, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced it has been recognized on Newsweek’s 2025 list of Americ... |
20.05.2025 | Australia faces mounting cyber threats to vital infrastructure | - |
15.05.2025 | Dior latest retailer to be targeted by cyber attack | French luxury house Dior has confirmed a cyber attack resulting in a data breach that compromised personal customer information, primarily in China, as cyber security threats continue to plague the retail sector.
The company said the breach... |
12.05.2025 | Report: AI is Supercharging a Ransomware Boom | A new report has detailed how AI is fuelling the rapid development of global ransomware attacks, and warns that the proliferation of tailored LLMs is poised to significantly amplify cyber-criminals reach and impact.
Kaspersky’s State of Ran... |
12.05.2025 | TD Africa’s TecHERdemy Empowers 400 Women to Lead in Tech | Screenshot
The atmosphere at Yudala Heights was electric with pride, hope, and inspiration as TD Africa celebrated the graduation of 400 young Nigerian women from its flagship TecHERdemy program in Lagos recently.
Over the past six months, ... |
08.05.2025 | How outsourcing and automation plug the cybersecurity skills gap | - |
06.05.2025 | The Future of Payments and Data Security: A Dual Revolution in Brazil | In the heart of Brazil's financial landscape, two forces are reshaping the way businesses operate: automatic payments and data security. These innovations are not just trends; they are the lifeblood of modern commerce. As the digital age un... |
06.05.2025 | AI arms race fuels surge in cybercrime & deepfake scams | - |
05.05.2025 | Blindagem digital: a segurança de dados como investimento essencial para as empresas financeiras | *Por Caio Bretones
Em um cenário financeiro cada vez mais digitalizado, a segurança de dados deixou de ser um diferencial para se tornar uma necessidade urgente para empresas de todos os portes, e uma obrigatoriedade para quem provê serviço... |
02.05.2025 | Cybersecurity Storms and Legal Battles: MTN Group in the Eye of the Hurricane | In the digital age, where information flows like water, cybersecurity has become a battleground. MTN Group, a telecommunications giant, finds itself in the crosshairs of a cyberattack that has sent ripples through its operations. This incid... |
30.04.2025 | Cybercriminals lure LLMs to the dark side | A new AI security report from Check Point Software shows how cybercriminals are co-opting generative AI and large language models (LLMs) in order to damage trust in digital identity.
At the heart of these developments is AI's ability to con... |
29.04.2025 | MTN attackers made demand for payment | MTN Group has confirmed that the cybersecurity incident the company disclosed last week and which affected the personal information of its customers in “certain markets” led to a demand from the attackers.
The specific markets affected by t... |
29.04.2025 | APAC CIOs face cyber threats despite rising security spend | - |
28.04.2025 | LayerX Security, Interview With CEO Or Eshed | Or Eshed
LayerX Security, a NYC-based secure enterprise browser extension company, just raised an $11M extension to its $26M Series A funding. In conjunction with the funding, CEO Or Eshed replied to our questions about the company, the pro... |
28.04.2025 | AI’s impact on cybersecurity for the Australian federal election | - |
25.04.2025 | AI enhances SOCs but human expertise vital against threats | - |
23.04.2025 | Check Point Software Q1 profit tops estimates, sees no impact yet from tariffs | JERUSALEM :Check Point Software Technologies beat first-quarter profit expectations, boosted by sales gains in its AI-driven products to protect corporate networks from cyber threats, and said it has not yet seen an impact from global marke... |
18.04.2025 | Torq's Bold Move: Acquiring Revrod to Redefine Cybersecurity | In the fast-paced world of cybersecurity, change is the only constant. Torq, a New York City-based autonomous security operations company, has made a significant leap by acquiring Revrod, an Israeli stealth AI startup. This acquisition, tho... |
18.04.2025 | CISA adds Windows NTLM hash disclosure spoofing flaw to its Known Exploited Vulnerabilities Catalog | A vulnerability in the Windows NTLM authentication protocol, which is known to have been actively exploited for at least a month, has been added to the US CISA’s Known Exploited Vulnerabilities Catalog.
While Microsoft deprecated NTLM last ... |
18.04.2025 | Ransomware Attacks Soar 126% Over Q1 2025 | The first quarter of 2025 saw a surge in ransomware attacks worldwide, with a 126% rise in incidents mainly targeting firms in North America.
That’s according to the latest data from Check Point, with the cybersecurity firm warning that its... |
17.04.2025 | Torq Acquires Revrod | Torq, a NYC-based autonomous security operations company, acquired Revrod, an Israeli stealth AI startup.
The amount of the deal was not disclosed.
With the acquisition, Torq will expand its offerings.
Backed by Notable Capital, Tonic Ventu... |
16.04.2025 | Australian councils urged to adopt managed security services | - |
16.04.2025 | Fuse partners with Check Point for real-time blockchain firewall | - |
13.04.2025 | The Rising Tide of Cybercrime: How Initial Access Brokers are Targeting Mid-Sized Businesses | In the shadowy world of cybercrime, a new breed of criminal is emerging. They are the initial access brokers (IABs), the unseen puppeteers pulling the strings of ransomware attacks. They don’t launch the attacks themselves. Instead, they br... |
11.04.2025 | Initial access brokers target mid-sized businesses for ransomware | Initial access brokers (IABs) are the invisible engine of modern cybercrime. They don't execute ransomware attacks, but they do enable them.
Research from Check Point External Risk Management (formerly Cyberint) shows that IABs are increasi... |
11.04.2025 | AI boosts Australian cyber defences against rising threats | - |
08.04.2025 | Knostic Selected as Finalist for RSAC™ 2025 Conference Innovation Sandbox Contest | Knostic recognized for overcoming today’s biggest AI security challenge with innovative approach to eliminate enterprise AI data leaks
HERNDON, Va.–(BUSINESS WIRE)–April 8, 2025–
Knostic, the world’s first provider of need-to-know access co... |
08.04.2025 | Resilient cybersecurity stocks to navigate the market turmoil and compelling tech opportunities | - |
07.04.2025 | Check Point Recognized for #1 AI-Powered Cyber Security Platform by Miercom | Independent testing by Miercom places Check Point Infinity Platform ahead of top security vendors in threat prevention, Zero Trust architecture, and AI-powered cyber defense
REDWOOD CITY, Calif., April 07, 2025 (GLOBE NEWSWIRE) -- Check Poi... |
03.04.2025 | Growing Adoption of Zero-trust and Multi-cloud Environments | Multi-cloud and cloud firewalls are becoming the standard, according to a new report from AlgoSec on the today’s network security landscape.
The report identifies significant shifts in cloud platform adoption, deployment of firewalls and So... |
01.04.2025 | The Shift from Point Solutions to Comprehensive Cybersecurity Platforms | In the digital age, cybersecurity is akin to a fortress. Yet, as threats evolve, so must our defenses. The landscape of cyber threats is shifting. In 2024, organizations faced an average of 1,673 attacks weekly—a staggering 44% increase fro... |
31.03.2025 | Check Point Software Emerges as a Leader in Attack Surface Management After Acquiring Cyberint, According to Latest GigaOm Radar Report | REDWOOD CITY, Calif., March 31, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, has emerged as a leading player in Attack Surface Management (ASM) with... |
31.03.2025 | Indian cybersecurity startups attract capital amid growing market potential to counter AI-driven threats | - |
28.03.2025 | IOT Data Hackathon 2025, Sparkling Innovation through Real-World Data, Technology and Cross-Sector Collaboration | HONG KONG, March 28, 2025 /PRNewswire/ -- Organised by GS1 Hong Kong, co-organised by Hong Kong Cyberport Management Company Limited and Hong Kong Science and Technology Parks Corporation, and supported by the Digital Policy Office, the IOT... |
26.03.2025 | AI & data breaches drive rise in sextortion scams | - |
26.03.2025 | 5 reasons customers are choosing a cybersecurity platform over point products | Cyber-attacks are becoming increasingly sophisticated and targeted, with the average number of weekly attacks per organization soaring to 1,673 in 2024 -- a 44 percent increase from 2023. In response, researchers and defenders are harnessin... |
17.03.2025 | Aryon Security: $9 Million (Seed) Secured For Transforming Cloud Security | Aryon Security announced it exited stealth with its Cloud Security Enforcement Platform, which is creating a transformative approach to enterprise cloud security that prevents cloud risks before they are deployed in production systems, whic... |
17.03.2025 | What Is POS Security? Definition, Features & Benefits | Key Takeaways
Point-of-sale (POS) security operates through a combination of hardware and software protections designed to prevent unauthorized access and data theft.
A well-planned POS security includes multi-layered programs, such as encr... |
13.03.2025 | Evolving DDoS tactics: Cyber experts analyse the X incident | - |
11.03.2025 | Australian IT leaders urge stronger government cyber action | - |
04.03.2025 | Aryon Security, Interview With CEO Ron Arbel | Aryon Security, a Tel Aviv, Israel-based provider of a cloud security enforcement platform, has just exits from stealth with $9m in seed funding. In conjunction with the announcement, CEO Ron Arbel replied to our questions about the company... |
02.03.2025 | Greenfield Partners: $400 Million In Capital Commitments Closed | Global early growth investor Greenfield Partners announced that it has closed $400 million in capital commitments, adding leading institutional investors from the U.S., Europe, and Asia-Pacific. These new funds bring Greenfield’s total asse... |
18.02.2025 | AI-enhanced security tools unveiled by Check Point Software | - |
18.02.2025 | Stopping Cloud Attacks at the Source: Check Point Software Leads the Charge in Cloud Security, Championing a Prevention-First Approach | Check Point CloudGuard recognized for superior performance in WAF & API security and threat prevention, showcasing robust cloud security solutions
BANGKOK, Feb. 18, 2025 (GLOBE NEWSWIRE) -- CPX APAC- Check Point Software Technologies Lt... |
18.02.2025 | 4 Leading SASE Solutions for Today’s Connected Enterprises | Share
Tweet
Share
Share
Email
Cyber attacks on businesses unsurprisingly continue to increase year after year, as attack surfaces expand because of the growing digitalization and interconnection of enterprise assets and services across geog... |
18.02.2025 | Stopping Cloud Attacks at the Source: Check Point Software Leads the Charge in Cloud Security, Championing a Prevention-First Approach | BANGKOK, Feb. 18, 2025 (GLOBE NEWSWIRE) -- CPX APAC- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that its Check Point CloudGuard solution has been recognize... |
17.02.2025 | 47% of Firms Suffered From Vendor and Supply-chain Attacks in 2024 | Security issues – leaks, breaches, hacks – involving third-party vendors continue to terrorise enterprises, research from cybersecurity firm Resilience shows.
The firm found that nearly half (47%) of organisations suffered an disruptive out... |
13.02.2025 | Deals in brief: Gobi Partners backs Malaysia’s ArmourZero, Klook secures USD 100 million, ADI anchors AC Ventures’ climate fund, and more | ArmourZero raises investment from Gobi Partners to expand AI-powered cybersecurity for SMEs
ArmourZero, a Malaysia-based cybersecurity company, has raised an undisclosed investment from Gobi Partners through its Gobi Dana Impak Ventures (GD... |
11.02.2025 | Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security | The partnership integrates some of the best-in-class cloud network and CNAPP security through seamless technology integration and a strategic business alliance, setting a new standard for enterprise protection
REDWOOD CITY, Calif., Feb. 11,... |
11.02.2025 | Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security | REDWOOD CITY, Calif., Feb. 11, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced a strategic partnership with leading cloud security prov... |
07.02.2025 | Check Point's Infinity Platform excels in new security tests | - |
06.02.2025 | Sherweb and Check Point Software Unite to Strengthen MSP Cybersecurity with Advanced Email and Remote Access Solutions | The Two Companies Will Scale Security Against Cyber Attacks Via 7,500 MSPs That Serve More Than 100,000 Companies
NEW YORK, NY, UNITED STATES, February 6, 2025 /EINPresswire.com/ -- Sherweb, the cloud marketplace and service provider that g... |
05.02.2025 | Check Point unveils AI-powered upgrades for security platform | - |
30.01.2025 | Check Point Software Reports Fourth Quarter and 2024 Full Year Results | TEL AVIV, Israel, Jan. 30, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), today announced its financial results for the fourth quarter and full year ended December 31, 2024.
Fourth Quarter 2024 Highlights
C... |
30.01.2025 | Inside Dark Web Economy: Cybercrime, Data Breaches, and Crypto at Play Despite 26% of the dark web's user base originating from India, awareness remains alarmingly low. In BRICS nations, only 28% of p... | India has emerged as a major target for cyberattacks, witnessing a surge that outpaces the global average. According to a recent report by Check Point Research, cyberattacks worldwide increased by 30 per cent in Q2 2024 compared to the prev... |
30.01.2025 | Check Point Software Reports Fourth Quarter and 2024 Full Year Results | TEL AVIV, Israel, Jan. 30, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), today announced its financial results for the fourth quarter and full year ended December 31, 2024.
Fourth Quarter 2024 Highlights
C... |
29.01.2025 | Token Security: $20 Million Raised For Securing Enterprise Machine Identities | Token Security, a leader in non-human identity security, announced $20 million in Series A funding led by Notable Capital, with participation from existing investor TLV Partners and executives from cybersecurity companies like Palo Alto Net... |
28.01.2025 | Token Security Raises $20M in Series A Funding | Token Security, a Tel Aviv, Israel-based non-human identity security company, raised $20M in Series A funding.
The round was led by Notable Capital, with participation from existing investor TLV Partners, Palo Alto Networks, CrowdStrike, Ch... |
28.01.2025 | Cyber-attacks on the Tech Supply Chain Spiked in 2024 | The global technology supply chain suffered a surge in cyber-attacks last year compared to 2023, according to the latest annual report from Check Point.
The cybersecurity firm’s State of Global Cyber Security 2025 report revealed a 179% sur... |
27.01.2025 | Element Security Discovers Critical RCE Vulnerability in Check Point Security Gateways | Check Point Security Gateways RCE via CVE-2021-40438 (PRNewsfoto/Element Security)
Element Security, a leader in Continuous Threat Exposure Management (CTEM), has uncovered a critical Remote Code Execution (RCE) vulnerability in Check Point... |
27.01.2025 | Microsoft занимает первое место среди брендов, которые чаще всего используются мошенниками в фишинговых атаках | Microsoft продолжает удерживать лидерство среди брендов, которые злоумышленники чаще всего используют для фишинговых атак. К таким выводам пришли исследователи подразделения израильской Check Point Software — Check Point Research. Последняя... |
14.01.2025 | Check Point Software’s 2025 Security Report Finds Alarming 44% Increase in Cyber-Attacks Amid Maturing Cyber Threat Ecosystem | REDWOOD CITY, Calif., Jan. 14, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its annual report, The State of Global Cyber Security 202... |
09.01.2025 | Правильная фортификация или как определить роль NGFW в сети | Доброго времени суток,
на повестке дня стоит задача выбрать систему межсетевого экранирования для защиты корпоративной сети. Задача является нетривиальной, так как на рынке присутствует большое количество вендоров, рекламирующих свой продук... |
02.01.2025 | Check Point Software to Announce Fourth Quarter and Full Year 2024 Financial Results on January 30, 2025 | TEL AVIV, Israel, Jan. 02, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announced that it will release its financial results for the fourth q... |
25.12.2024 | The New Frontier of Cyber Threats: Phishing and Vulnerabilities in Digital License Plates | In the digital age, threats evolve faster than the technology designed to combat them. Cybercriminals are becoming more sophisticated, using innovative methods to bypass security measures. Two recent incidents highlight this alarming trend:... |
25.12.2024 | Digital License Plates: A Cybersecurity Pitfall in the Fast Lane | In the digital age, convenience often comes at a price. Digital license plates, touted as the future of vehicle identification, are now under scrutiny for serious security vulnerabilities. A recent investigation by IOActive revealed that th... |
24.12.2024 | The Rising Tide of Cyber Threats: Navigating the New Landscape | In the digital age, cyber threats are like shadows lurking in the corners of our online lives. They evolve, adapt, and strike when least expected. Recent reports highlight a surge in sophisticated attacks, driven by advanced technologies li... |
24.12.2024 | Security Week 2452: уязвимости в цифровых автомобильных номерах | На прошлой неделе в журнале Wired вышла публикация об уязвимостях, обнаруженных компанией IOActive в цифровых автомобильных номерах. Такие номера производятся и поддерживаются в США компанией Reviver и разрешены к установке в штатах Калифор... |
23.12.2024 | Navigating the Cyber Threat Landscape: Lessons Learned & What’s Ahead | The cybersecurity landscape in 2024 was marked by unprecedented challenges, significant breaches, and evolving regulatory requirements that fundamentally reshaped how organizations approach data protection.
From record-breaking incidents to... |
23.12.2024 | Эволюция NGFW в России на примере UserGate. Интервью с менеджером по развитию UserGate NGFW Кириллом Прямовым | На Хабре уже было интервью про Next Generation Firewall (NGFW) от компании Solar, которое затрагивало технические аспекты разработки таких решений. Также выходил материал про NGFW от Positive Technologies, про стык разработки open source ре... |
23.12.2024 | ТОП-5 ИБ-событий недели по версии Jet CSIRT | Сегодня в ТОП-5 — стиллер CoinLurker, создающий новое поколение вредоносных обновлений, уязвимость OpenAI Calendar Notification ByPass, атака Link Trap с быстрым внедрением GenAI, атака цепочки поставок на пакеты Rspack npm, а также методы ... |
20.12.2024 | Check Point named leader in Gartner email security 2024 | Check Point Software Technologies has been named a leader in the 2024 Gartner Magic Quadrant for Email Security Platforms.
Check Point provides email security through its Harmony Email Collaboration offering, which protects email and collab... |
19.12.2024 | Хакеры используют Google Calendar для обхода спам-фильтров | В рамках фишинговой кампании хакеры используют приглашения Google Calendar и страницы Google Drawings для кражи учётных данных, обходя спам-фильтры.
По данным Check Point, которая отслеживает фишинговую атаку, злоумышленники нацелились на 3... |
19.12.2024 | Check Point Software Recognized as a Leader in Email Security in the Inaugural Gartner Magic Quadrant for Email Security Platforms | REDWOOD CITY, Calif., Dec. 19, 2024 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been recognized as a Leader in the 2024 Gart... |
18.12.2024 | HKBN Enterprise Solutions Launches CyberZafe Solution, Empowering SMEs with Enterprise-Grade Cybersecurity Deployment | HONG KONG, Dec. 18, 2024 /PRNewswire/ -- HKBN Enterprise Solutions (HKBNES) has announced the launch of CyberZafe, an enterprise-grade network security solution that draws upon its nearly 30 years of cybersecurity expertise. CyberZafe stand... |
17.12.2024 | AI's impact on cybersecurity: challenges & strategies | The cybersecurity landscape is set to undergo significant changes in 2025, as experts predict the impact of artificial intelligence (AI) will bring both opportunities and challenges. Industry leaders have shared insights into the evolving r... |
16.12.2024 | Gil Shwed Takes on the Role of Executive Chairman of the Board of Directors, Nadav Zafrir Becomes CEO at Check Point Software Technologies | TEL AVIV, Israel, Dec. 16, 2024 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announces the transition of Gil Shwed into the role of Executive Chair... |
12.12.2024 | Check Point solution achieves 100% detection in MITRE test | Check Point Software Technologies has announced that its Infinity XDR/XPR solution achieved a 100% detection rate in the 2024 MITRE ATT&CK Evaluations.
The evaluations provide organisations with objective insights into security solution... |