6 steps to stop ransomware taking you hostage
top of page
Search
By Itai Greenberg, Chief Strategy Officer, Check Point Software Technologies This article is part of Centre for Cybersecurity of World...
Managing cyber risk in the insurance supply chain
By Charles Clarke, Director of Insurance, International, SecurityScorecard Cyber insurance is the fastest-growing sector in the world’s...
New Wave of Hospitality Phishing Attacks: Compromise User Credentials, Then Go Phish
Users have to be constantly vigilant of phishing attacks. This sophisticated scam works, but so do the much simpler scams. The...
New Report Highlights Key Elements of Cloud Workload Security Landscape
Enterprises can use cloud workload security (CWS) solutions to gain visibility into, manage, and reduce the cloud infrastructure threat...
Surge in Cybercrime: Security Report Reveals 48 ransomware groups have breached over 2,200 victims
Surge in Cybercrime: Check Point 2023 Mid-Year Security Report Reveals 48 ransomware groups have breached over 2,200 victims Check Point...
bottom of page