Check Point

Check Point | News, how-tos, features, reviews, and videos

"Security should be invisible"

A Q&A with Guy Guzner, Co-founder and CEO, Fireglass.


Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

How to survive (and thrive) in the CISO hot seat

The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.

false identity

Solve cybercrime by permanently linking physical space and cyberspace

A discussion of how to dramatically reduce cybercrime, cyber-terrorism, and cyber-espionage by using biometric credentials for internet transactions.

Special report: platforms play big in the cloud

This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.

Research report: IT security's looming tipping point

Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.

The CSO identity management survival guide

This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.

benjamin netanyahu cybertech2016

Live from Tel Aviv, it’s CyberTech

I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.

010515 utm 1

CheckPoint, Watchguard earn top spots in UTM shootout

UTM appliances for SMB security are getting smaller, more powerful and more feature rich.

security warning malware

Time to modernize thinking, technology in fighting malware

A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious...

The Emerging Cybersecurity Software Architecture

It's been a busy week for the information security industry.  FireEye announced the acquisition of nPulse which adds network forensics to its advanced malware detection/response portfolio.  IBM chimed in with a new Threat Prevention...

The Future of Network Security in the Data Center – Flexible, Distributed, and Virtual

Think of a modern enterprise data center.  There are likely hundreds of physical servers hosting thousands of VMs.  Individual systems are connected via 10gbE links that likely feed 40gb cores.  Local data centers connect over DWDM,...

Managing IT Risk Associated with Mobile Computing Security

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk.  Why?  Many CISOs I spoke with at the time said it was purely a matter of scale.  All of a sudden, large enterprises had thousands of...

If I were the next CEO of Symantec

As you've probably noted by now, Symantec just announced that CEO Steve Bennett is out and is being replaced by board member Michael Brown on a temporary basis. The board will now conduct a search for a permanent CEO.Under Steve...

Hot Topics at the RSA Conference

It's the calm before the storm and I'm not talking about the unusual winter weather.  Just a few days before the 2014 RSA Security Conference at the Moscone Center in San Francisco.In spite of this year's controversy over the...

Paradigm Shift in the Security Industry: FireEye acquires Mandiant

As an industry veteran, I’ve witnessed my share of IT transformations. Yup, I’m old enough to remember the transitions from mainframes to mini-computers, to client/server computing, to Internet computing, etc. Each of these IT...

New Year’s Forecast for the Information Security Industry: Part 1

I hope my cybersecurity colleagues enjoyed their holiday these past few weeks. It was surely well deserved as the year 2013 will be remembered as a whirlwind of activity featuring successful IPOs and scary security incidents. Given...

Load More
You Might Also Like