Source: www.cybertalk.org – Author: slandau EXECUTIVE SUMMARY: Celebrate Earth Day 2023! Cyber security professionals are recognizing the role that they can play in supporting environmental initiatives...
Author:
Cyber security technology integration, intrapreneurship & beyond
In this edited interview excerpt from The Women in Technology Podcast, Check Point Global Cyber Security Warrior and Evangelist Micki Boland speaks with Becky Schneider about...
The ESG Manager role & the importance of Environmental, Social & Governance strategy
In this exclusive CyberTalk.org interview, Idan Eden, the ESG Manager for Check Point, shares her expertise on the rapidly growing importance of ESG in corporate decision-making....
Greening your security: Earth Day tips for cyber security experts
EXECUTIVE SUMMARY: Celebrate Earth Day 2023! Cyber security professionals are recognizing the role that they can play in supporting environmental sustainability initiatives and realizing how sustainability...
Navigating the Pandora’s Box that is ChatGPT: Insights from a Global CISO
Jonathan Fischbein is the Chief Information Security Officer for cyber security vendor Check Point Software. He has more than 25 years’ experience in high-tech security markets,...
Why cyber security should be treated as an ESG issue
EXECUTIVE SUMMARY: The World Economic Forum describes cyber security as one of the top five global risks, highlighting the need for organizations to integrate cyber security...
Why BISOs should oversee policy & report to CROs
By Edwin Doyle, Global Cyber Security Strategist. Cyber security policy is a comprehensive framework consisting of guidelines, protocols, principles and regulations that aim to safeguard an...
Climate change, cyber security and saving the planet
EXECUTIVE SUMMARY: Although the topics of climate change and cyber security seem worlds apart, the reality is that they’re deeply interconnected. The intersection of the two...
What to know: New AI rules in the U.S.
EXECUTIVE SUMMARY: As the fastest-growing consumer application in history, with more than 100 million monthly active users, ChatGPT has gained the attention of lawmakers and policy...
CISO insights on ChatGPT: Game-changer or security threat?
EXECUTIVE SUMMARY: As the AI revolution continues to sweep the world, OpenAI’s ChatGPT tool has emerged as a groundbreaking force in the realm of natural language...
7 tips for tackling cyber security technical debt
EXECUTIVE SUMMARY: The cyber risk landscape is evolving. Novel attack types are appearing at an unprecedented rate. Cyber criminals are constantly seeking new ways to infiltrate...
Twitter no longer exists, it’s just X Corp. now
EXECUTIVE SUMMARY: In a move sparking intense speculation, Twitter technically “no longer exists” after a merge with X Corp., according to a document submitted to a...
New landscapes in cloud security (2023)
Richard Flanders has 35 years’ experience in advising clients on all aspects of enterprise IT. He has held senior roles at VMware, Fujitsu and Computacenter and...
Strengthening security: A comprehensive, consolidated & collaborative approach
EXECUTIVE SUMMARY: In 2023, the global cost of cyber attacks is expected to exceed $8 trillion dollars. In 2022, cyber attacks increased by nearly 40%, worldwide,...
Blue-chip insights: The value of a CIO & CDO alliance
EXECUTIVE SUMMARY: The partnership between the Chief Information Officer (CIO) and the Chief Data Officer (CDO) is critical in today’s data-driven business landscape. The CIO is...
How machine learning algorithms detect ransomware attacks
By Zac Amos, Features Editor, Rehack.com. How can businesses and users stay ahead of the ever-evolving risk of ransomware attacks? An increasing number of cyber attacks occur every...
Celebrate Identity Management Day with these best practices
EXECUTIVE SUMMARY: Happy Identity Management Day! Established in 2021, in partnership with the National Cybersecurity Alliance, Identity Management Day is held on the second Tuesday of...
Check Point’s President on her journey, vision and growth strategy
EXECUTIVE SUMMARY: In this powerful and engaging interview, Check Point’s President Rupal Hollenbeck dynamically describes how the company’s innovation is redefining real-world potentialities, she shows how...
The new & dangerous way Log4j is being exploited
EXECUTIVE SUMMARY: The Log4j vulnerability posed a multi-faceted challenge for organizations and management teams worldwide. Leading cyber security authorities have urged organizations to remain acutely aware...
AI and cyber security: Trends, challenges and future prospects
Yaniv Shechtman has over 15 years of expertise in cyber security, AI, and product management. At Check Point, Yaniv’s primary responsibility is to shape Check Point’s...
Microsoft leads global crackdown against Cobalt Strike, protecting healthcare from ransomware
EXECUTIVE SUMMARY: Microsoft, the Health Information Sharing and Analysis Center (Health-ISAC) and other partners have announced a widespread technical and legal crackdown against servers hosting “cracked”...
What is an ‘island hopping’ attack? (and how to stop one)
EXECUTIVE SUMMARY: At the mention of island hopping, you’re likely dreaming about adventures in Hawaii, the Caribbean, or similar destinations with majestic views and white-sand beaches....
Supercharge your small business with these 15 AI tools
EXECUTIVE SUMMARY: Small businesses are facing an increasing number of demands, and need innovative solutions to stay competitive in today’s fast-paced digital landscape. Technological advancements, like...
Ensuring safe AI: Policy conundrums for a responsible future
Check Point Software’s cyber security evangelist Ashwin Ram shares insights into artificial intelligence, policy development and cyber security. It is clear that the utilization of Generative...
6G for executives: What will the business impact look like?
EXECUTIVE SUMMARY: The next generation of connectivity is on the horizon. It’s expected to be 100X faster than 5G. Possibly 1,000X faster. But it’s not just...
Endpoint security: Challenges, solutions and best practices
By Anas Baig, product manager and cyber security expert with Securiti. Doing business in the public sphere leaves entities open to malicious attacks. A study conducted...
Credit card fraud: Why should you care?
By Dr. Ken Knapton, CIO Progrexion. Credit card fraud continues to be a significant concern for both consumers and businesses. Not only can it result in...
Endpoint security: Challenges, solutions and best practices
By Anas Baig, product manager and cyber security expert with Securiti. Doing business in the public sphere leaves entities open to malicious attacks. A study conducted...