Category: Check Point Blog

Ensuring HIPAA Compliance with Secure Remote Access

When it comes to remote access, healthcare organizations must contend with the same challenges as their counterparts in many other industries: remote workers and third-party contractors need fast, reliable connections to enterprise resources. The security team also needs to defend…

Building Cyber Resilience with Trofi Security and Check Point

As the digital threat landscape grows increasingly complex, organizations are under mounting pressure to secure their environments against a variety of risks, from ransomware and phishing to sophisticated zero-day exploits. Businesses need security solutions that not only prevent breaches but…

DeepDLL– A New Approach to Detect Malicious DLLs

Cyber attackers are increasingly using DLL (Dynamic Link Library) files to spread malware. Modern attack chains have complex multi-stage flows and DLL is a common step in all major malware families. Methods like DLL hijacking, sideloading, and reflective DLL injection…

New Opportunities for Communication Service Providers

The internet is the ‘new’ corporate network, and Communication Service Providers (CSPs) are well-positioned to enable their clients’ ongoing digital transformations. The emergence of 5G and the standardization of work from anywhere are only reinforcing this shift. CSPs have the…

Getting to Know Katya Pikkarainen

Katya, can you tell us a bit about yourself? I have a Bachelor of Science in Business Management from the University of Minnesota, and I’m currently an Account Manager living in Minnesota, where I was born and raised. What led…