Category: Check Point Blog

Cloud Security in Action: Meet Check Point CloudGuard

Digital transformation and the widespread adoption of cloud technologies are creating mega-shifts across all industries. The adoption of cloud is far from straightforward and linear, as companies navigate their cloud adoption journey in phases. Moreover, the range of technologies employed…

Check Point Recognized on the 2023 CRN Edge Computing 100 List

Today, accelerated cloud adoption and hybrid work require security to expand beyond the traditional network perimeter, making edge security a paramount focus. CRN’s fourth-annual Edge Computing 100 list honors trailblazing vendors leading the channel with next-generation technology that helps build…

Getting to Know Zehra Hussain

Zehra Hussain is an Incident Response Analyst based in Sydney, Australia. Her role involves responding to security incidents and ensuring the protection of sensitive data and systems. With a background in digital forensics and satellite engineering, Zehra brings unique expertise…

Why OSS Packages Can’t Scale without New Security Measures

In the vibrant arena of software development, open-source software (OSS) has emerged as a vital catalyst for spurring innovation, nurturing collaboration, and boosting cost efficiency. OSS projects have seen explosive growth, with millions of dedicated developers contributing to a jaw-dropping…