Are we prepared for 2019’s cyber security challenges?
"Technology is a queer thing. It brings you great gifts with one hand, and it stabs you in the back with the other," wrote novelist and scientist CP Snow in the New York Times in 1971. It still rings true today. Every new tool or technology we use introduces new...
Will Chrome update stop online ad abuse?
Google has taken another positive step toward making the Internet a safer place with the launch of Chrome 71. By Grant Hamilton, Check Point country manager South Africa Building on the ad-blocking measures introduced in Chrome 64 and 68, which prevented sites from...
Check Point named IDC MarketScape leader
Check Point Software Technologies has been named as leader in the IDC MarketScape: Worldwide Mobile Threat Management Software 2018-2019 Vendor Assessment. It is the second-consecutive year Check Point was named a leader in this category with its SandBlast Mobile...
Security challenges in the multi-cloud
The cloud argument has been settled and there is no doubt on the minds of the CIO and IT in general that the cloud is now just an extension of one's infrastructure. The current debate on the table is the adoption of a multi- or dispersed-cloud approach - and what this...
Collaboration key to protecting critical infrastructure
National power grids are increasingly becoming a target of hackers and attacks. Several hacks have been reported across the globe in recent years, drawing the world's attention to the vulnerability of national power supply systems, and bringing into question the...
What’s causing today’s IT security gap?
What's stopping global businesses from protecting their assets despite significant investments in cyber security programmes? That's the question we asked ourselves when trying to determine what the reasons are behind the dangerous gap in modern IT security. By Simon...
DarkVishnya cyber-robberies hit Eastern Europe
During 2017 and 2018, Kaspersky Lab experts were involved in incident response following a number of cyber-robberies targeting financial organisations in Eastern Europe. The researchers discovered that in each case the corporate network was breached through an unknown...
Stay safe from mobile threats during the holidays
Digital transformation has pushed employees to use their personal devices for work. BYOD was previously a privilege extended to employees, but now becoming a critical component of today's business infrastructure strategy. This problem is about to get worse as we enter...
The hidden cost of cryptojacking
After gaining momentum in mid-2017, we have seen a worldwide boom of digital cryptocurrencies like Bitcoin. Cryptocurrencies have become synonymous with Ransomware attacks, but now cybercriminals have discovered another way to make money - mining cryptocurrencies....
The state of cybersecurity
On 30 November 1988 the Association for Computing Machinery (ACM) championed Computer Security Day. Since then technology breakthroughs have revolutionised the way we do business and communicate across borders. With these technology developments, new threats have...
Check Point debuts CloudGuard SaaS
Check Point Software Technologies has announced the general availability of CloudGuard SaaS, a cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point's CloudGuard portfolio of cloud...
Card skimming gets more aggressive
Card skimming - the act of copying data from a credit card either to make a physical or virtual copy of the card - is not a new tactic for criminals. As a result, many an unsuspecting card payer has been unpleasantly surprised by unauthorised payments made on their...