Check Point
Check Point | News, how-tos, features, reviews, and videos
"Security should be invisible"
A Q&A with Guy Guzner, Co-founder and CEO, Fireglass.
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
Tech Primer
Red team versus blue team: How to run an effective simulation
Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.
Tech Primer
How to survive (and thrive) in the CISO hot seat
The CISO role is more varied and more pressure-filled than ever. CSO Online looks at how you can be successful in a post where security incidents and management feuds can cost you your job.
Solve cybercrime by permanently linking physical space and cyberspace
A discussion of how to dramatically reduce cybercrime, cyber-terrorism, and cyber-espionage by using biometric credentials for internet transactions.
eBook
Special report: platforms play big in the cloud
This latest report in our C-Suite 360 series takes a full-spectrum look at the opportunities and risks in cloud computing, offering up the expert information your organization needs to set its cloud strategy.
Research/Infographic
Research report: IT security's looming tipping point
Even as security draws board-level attention, many IT professionals give their organizations’ infosec practices low marks. This special report from CIO, CSO and Computerworld reveals how to tip the balance in the right direction.
eGuide
The CSO identity management survival guide
This guide will help you communicate through the challenges of identity management, learn from success stories and discover the most valuable features of today's identity management tools.
Live from Tel Aviv, it’s CyberTech
I attended the Cybertech Conference & Exhibition in Tel Aviv. Now that I have caught my breath, here’s my account.
CheckPoint, Watchguard earn top spots in UTM shootout
UTM appliances for SMB security are getting smaller, more powerful and more feature rich.
Time to modernize thinking, technology in fighting malware
A recent analysis of network traffic in thousands of organizations found the majority of them were hosting malware and bots, a clear signal that it is time for companies to move quickly to modern-day methods for detecting malicious...
The Emerging Cybersecurity Software Architecture
It's been a busy week for the information security industry. FireEye announced the acquisition of nPulse which adds network forensics to its advanced malware detection/response portfolio. IBM chimed in with a new Threat Prevention...
The Future of Network Security in the Data Center – Flexible, Distributed, and Virtual
Think of a modern enterprise data center. There are likely hundreds of physical servers hosting thousands of VMs. Individual systems are connected via 10gbE links that likely feed 40gb cores. Local data centers connect over DWDM,...
Managing IT Risk Associated with Mobile Computing Security
When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of...
If I were the next CEO of Symantec
As you've probably noted by now, Symantec just announced that CEO Steve Bennett is out and is being replaced by board member Michael Brown on a temporary basis. The board will now conduct a search for a permanent CEO.Under Steve...
Hot Topics at the RSA Conference
It's the calm before the storm and I'm not talking about the unusual winter weather. Just a few days before the 2014 RSA Security Conference at the Moscone Center in San Francisco.In spite of this year's controversy over the...
Paradigm Shift in the Security Industry: FireEye acquires Mandiant
As an industry veteran, I’ve witnessed my share of IT transformations. Yup, I’m old enough to remember the transitions from mainframes to mini-computers, to client/server computing, to Internet computing, etc. Each of these IT...
New Year’s Forecast for the Information Security Industry: Part 1
I hope my cybersecurity colleagues enjoyed their holiday these past few weeks. It was surely well deserved as the year 2013 will be remembered as a whirlwind of activity featuring successful IPOs and scary security incidents. Given...