If it looks like an attack, walks like an attack, and quacks like an attack, it’s an attack!
Half a century after Alan Turing introduced AI to the world, Check Point utilizes AI models in each stage of the adaptive security cycle across the entire IT infrastructure to enhance security.
The Future of Data Security Lies in the Cloud
We have recently read a lot of posts about the SolarWinds hack, a vulnerability in a popular monitoring software used by many organizations around the world. Should organizations, who already invested a lot of resources in cloud migration move back workloads to on-premises? I don't think so.
Impostor Syndrome in Cyber Security
How We Can Turn This Into Our Secret Weapon To Become Technological Leaders
Virtual Cloud Summit: Security & Data Privacy in the Cloud
Security & Data Privacy in the Cloud - Risk Based Approach
Cyber Security: What's right for your organisation?
A strategy is the foundation of a cybersecurity programmer; however, the implementation is key.
Security as a Service – a Paradigm Shift
In an era of ‘as-a-Service’, could security be the next candidate for the treatment?
Scaling Security Through Automation
The ease with which we can access information and services, is causing headaches for those who act as data guardians
GDPR, Cloud and the Shared Responsibility Model
Let's talk a little bit about the cloud shared responsibility model