In celebration of Asian American and Pacific Islander Heritage Month, we are shining a spotlight on some of our AAPI employees. We sat down with Jenny Nguyen, a campaign operations manager in our Redwood City office, to discuss her favorite…
Category: Check Point Blog
Drop My VPN – Are You Nuts?
If the title of this post caught your attention, maybe you’ve thought about moving on from your VPN because of performance issues or security concerns but are still researching alternatives. On the other hand, perhaps you actually do think it’s…
Spoofing Shein for Credential Harvesting
Introduction Shein is one of the most popular shopping apps in the world. In fact, it’s the second most downloaded shopping app globally, with over 251 million downloads. The e-commerce platform is Googled more frequently than major brands like Nike…
Unpacking the New DHS Guidelines for Securing Critical Infrastructure from AI-related Threats
Under President Biden’s Executive Order regarding the safe development and use of Artificial Intelligence, the Department of Homeland Security published new guidelines about how to secure critical infrastructure from AI-related threats. The guidelines are focused on three key categories. The…
Extending SASE Protection Into the Browser
If you want to protect your remote workers one of the best places to start is the web browser. It’s the primary portal to our workday for accessing everything from files to SaaS applications or just browsing the web. That’s…
Infinity Global Services’ Cyber Park Introduces “Nemesis” – A Cyber Security Adventure Awaits!
Welcome to a world where every click can lead to an adventure, and every challenge conquered is a step closer to becoming a cyber guardian. Infinity Global Services’ or ‘IGS’ Cyber Park is thrilled to unveil our latest escapade into…
Celebrating 5 Years of Excellence with Check Point’s Hacking Point Program
As we mark the 5th anniversary of the Hacking Point program, a pivotal component of Check Point Infinity Global Services’ (IGS) MASTER pillar, it’s a moment of reflection, celebration, and anticipation. The journey of Hacking Point has been nothing short…
7 Essentials Every Data Security Posture Management (DSPM) Must Have
An interesting side-effect of the proliferation of cloud-native software development is the blurred lines between the roles of InfoSec and DevOps teams in protecting application and user data. Until recently, DevSecOps was mostly about securing and protecting the code, the…
Check Point Awarded AI Security Innovator of the Year at GISEC
In a year marked by rapidly evolving cyber threats, Check Point is thrilled to receive the edge Security Leadership Award for AI Security Innovator of the Year! The edge Security Leadership Award shines a spotlight on industry visionaries who are…
Check Point Named Strategic Leader in AV-Comparatives EPR Report
Check Point Harmony Endpoint has been recognized as a Strategic Leader in AV-Comparatives’ 2023 Endpoint Prevention and Response (EPR) report. This accolade underscores Harmony Endpoint’s exceptional capabilities in proactively defending against advanced cyber threats. The AV-Comparatives EPR report is a…