Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: A purple team provides a critical lens through which organizations can see how to elevate their cyber security. But...
Author:
CISA makes two key security recommendations to stop SIM swapping – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: According to CISA, telecommunications firms are not adequately protecting consumers from SIM swapping. The agency recommends that public and...
A CISO playbook: Elevating resilience through advanced paradigms – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Worried about the spectacular array of adversaries and threat methodologies extant in today’s vast cyber landscape? The CISO playbook, when it...
Highly targeted phishing lures, masqueraded as legitimate Teams chats – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: More than 270 million people use Microsoft Teams every month, and this isn’t the first time that hackers have...
Zero trust and beyond – Navigating the era of generative AI challenges – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau At Check Point, I am responsible for enabling National Channel Partners to drive sales and increase revenue by developing technical training...
How ransomware attacks can be a test of leadership – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Antoine Calendrier, Head of Crisis and Trust Services for Asia Pacific, Edelman. Ransomware attacks are on the rise and they...
Why is the Asia Pacific region a target for cyber crime & what can be done – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Vivek Gullapalli, Field CISO, Check Point. Key insights The average annual cost of cyber crime is expected to increase from...
How companies can use zero trust to secure their supply chains – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Zac Amos, Features Editor, Rehack.com Supply chain cyber attacks are on the rise, and industry professionals must work to protect their...
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical tool. A staggering 37% of companies are currently using AI...
Essential elements for a comprehensive cloud security stack – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Dotan Nahum CEO and Founder at Spectral. Digital transformation is pushing business entities to deploy products faster than ever, but...
Electric vehicle cyber security risks and best practices (2023) – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years...
Mastering shadow AI: Your guide to gaining control – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: For many organizations, artificial intelligence has become a critical tool. A staggering 37% of companies are currently using AI...
Elevating instant messaging security in 5 steps – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: In our highly interconnected and fast-paced digital world, instant messaging has become an indispensable tool for business professionals of...
Top strategies: How CISOs can become board-ready – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Corporate boards are actively searching for CISOs who demonstrate technical expertise, but who also possess strong leadership skills, can...
Monoculture: Could this risk affect your organization in a major way? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Marco Eggerling, Field CISO, EMEA Quick introduction to monocultures As an information security professional, you’ve likely heard the term ‘monoculture’...
20 artificial intelligence podcasts to listen to right now – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau In the last eight months, AI has gone mainstream. There’s been an explosion of interest in the topic and one of...
How cyber and physical security can work together – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Contributed by April Miller, Senior Writer for Rehack.com. A cyber-physical security strategy combines the best of both worlds, integrating physical and digital...
How AI is transforming cyber security: For everyone, everywhere – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Mark Ostrowski is Head of Engineering, U.S. East, for Check Point, a global cyber security company. With over 20 years of...
U.S. launches Cyber Trust Mark initiative to protect IoT and consumers – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: In recent years, the IoT industry has seen exponential growth. Presently, there are 15 billion smart devices in existence...
How we might be able to ruin art, save society and speak to whales – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Robert Falzon is currently the Head of Engineering, Canada, within the office of the CTO for Check Point Software Technologies Inc.,...
5 ways you can leverage AI to defeat cyber crime – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Artificial intelligence doesn’t just bolster cyber security. It serves as a resource-leveling force-multiplier, expanding what’s possible. AI can offer...
These scary AI-driven social engineering techniques should be on your radar – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Keely Wilkins is an Evangelist with the Office of the CTO as well as a Pre-Sales Security Engineer at Check Point....
Artificial intelligence in cyber security and healthcare – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Cindi Carter is a Field CISO, Americas, with Check Point Software Technologies. In this insightful interview, Field CISO Cindi Carter delves...
Highly effective responses to the alarming democratization of AI – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Brian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the modern secured...
10 insanely effective ways to prevent sophisticated cyber attacks – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Modern cyber attacks are sophisticated, relentless and widespread. They often leverage evasive, multi-stage strategies that go undetected by the...
AI and network security: The tricky balance between efficiency and risk (management) – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Gergana Kungalova is Security Engineer for Check Point in Bulgaria. She started her journey in the Cyber Security field as Network...
GitHub offers beta passkey opt-in (as alternative to passwords and 2FA) – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Key highlights GitHub users can now upgrade security keys to passkeys, bolstering overall account security. For GitHub users, passkeys...
AI in the OT/IoT environment: Deus ex machina – the good, bad & ugly – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Antoinette Hodes is a Global Solutions Architect, specializing in IoT, and serves as an Evangelist with the Check Point Office of...
Meta’s Twitter rival Threads; user privacy strategies that can protect your account – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Up until last Thursday, OpenAI’s ChatGPT held the record for the fastest stratospheric platform growth ever, reaching 10 million...
Owning cyber resilience — whose job is it anyway? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: The frequency and severity of cyber disruptions highlight the need for robust cyber resilience planning. Recent statistics reveal some...