Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: At the beginning of 2023, CISOs were optimistic about the prospect of higher budgets for cyber security, anticipating continued...
Author:
Critical infrastructure security: Challenges and best practices – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Mazhar Hamayun, Regional Architect and member of the Office of the CTO at Check Point. Introduction The lifeblood of our contemporary...
Prevention-first: Protecting cities from ransomware – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Pete Nicoletti, Check Point Field CISO, Americas In recent months, several American cities were hit by debilitating and disruptive ransomware...
Unprecedented security risks, electric vehicle chargers – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Last year, global sales for electric vehicles (EVs) increased by 60% worldwide and one in every seven passenger cars...
Safeguarding SMBs: Trends, challenges, best practices & smart security strategies – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Don’t miss this outstanding, knowledge-packed CyberTalk.org interview with Shahar Divon, Head of Global SMB Sales at Check Point. He delves into...
‘Volt Typhoon’ infiltrates US critical infrastructure organizations – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: The state-sponsored cyber criminal group known as ‘Volt Typhoon’ has launched a new series of cyber attacks that have...
C-suite and managers, the disconnect around cyber risk – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Do you ever feel as though you and your boss have totally different visions for and expected outcomes around...
An ounce of prevention is worth a pound of cure – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: It has become painfully obvious that cyber security is critical in enabling clinicians to provide quality care to patients....
Healthcare attacks are increasing: Why zero trust will prevent care disruptions – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Itai Greenberg, Chief Strategy Officer, Check Point. EXECUTIVE SUMMARY: Healthcare cyber attacks are on the rise. Zero trust is a...
What is business identity theft and how can you prevent it? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: In the way that the identity of a person can be stolen, the identity of a business can also...
Why are we still talking about email security? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Email security compromises are among the costliest in cyber. Last year, organizations...
A new malware threat is stealing 2FA codes and passwords – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: A recently released report from Check Point Research shows that a new type of malware has been discovered. Dubbed...
The future of cyber security: 9 trends to watch in 2023 – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Anas Baig, product manager and cyber security expert with Securiti. As data sharing becomes routine in business settings, companies need...
The quantum security era is coming – here’s how leaders can prepare for it – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Michele Mosca, Chief Executive Officer of evolutionQ and Vikram Sharma, Founder and Chief Executive Officer, QuintessenceLabs. EXECUTIVE SUMMARY: Quantum computers...
CISO and board collaboration, driving better outcomes together – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Your organization’s board has a unique role to play in managing cyber risks. Board members are not involved in...
Adversary in-the-Middle attack, what is it? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Should you be more concerned about the threats filtering into your employees’ inboxes? Over 3.4 billion phishing emails are...
Devising a security strategy for ICS, moving to the self-defending framework – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Bio: 25+ years of total experience in the IT industry including in the security & networking domain, spanning enterprise, banking &...
Are your employees missing these social engineering red flags? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Social engineering is one of the most significant and difficult network security challenges to contend with. Due to the...
Unconsidered benefits of a consolidation strategy every CISO should know – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Pete has 32 years of Security, Network, and MSSP experience and has been a hands-on CISO for the last 17 years...
Massive cyber espionage operation uncovered in South Asia – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: A vicious series of cyber attacks has targeted social media accounts belonging to individuals across South Asia. In this...
Ransomware gang hijacks university’s emergency alert system, threatens students – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: On May 1st, a group of cyber criminals hacked into and gained control over a U.S. university’s emergency alert...
Will the EU’s new cyber security law change the game? – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau Peter Sandkuijl, a resident of The Netherlands, is a senior security specialist who has operated in the security market for over...
20 of the best cyber security podcasts to listen to now – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: As businesses become increasingly dependent on emerging technology, the importance of strong cyber security has never been more apparent....
The future of cellular IoT – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Antoinette Hodes, a Check Point Global Solutions Architect for the EMEA region and an Evangelist with the Check Point Office...
ChatGPT hacking, it’s only just begun… – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Since its November debut on the world stage, the popular AI-powered chatbot, ChatGPT, has continuously attracted cyber criminal attention....
Hacktivism and the new age of cyber warfare – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau By Sergey Shykevich, Threat Intelligence Group Manager, Check Point. Hacktivism has traditionally been associated with loosely managed underground cyber criminal entities....
The future is now! Mind-bending highlights from RSA 2023 – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: At this year’s RSA Conference, we witnessed some of the brightest minds in cyber security gathered to discuss the...
Microsoft’s next-level nomenclature, naming hacking groups – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Last week, Microsoft’s cyber security division announced that it is changing its taxonomy for naming hacking groups. Previously, Microsoft...
Access management made easy, boosting security with user provisioning – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: What is user provisioning? User provisioning enables management teams to control access to business resources, strengthening data security by...
10 new and dangerous malware threats to watch out for (2023 edition) – Source: www.cybertalk.org
Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Discover 10 of the most dangerous malware threats and learn how to identify, prevent and defend against attacks. Malware-based...