As artificial intelligence becomes more deeply embedded in business operations, it’s also reshaping how cyber threats evolve. The same technologies helping organizations improve efficiency and automate decision-making are now being co-opted and weaponized by threat actors. The inaugural edition of…
Category: Check Point Blog
Elevating MSSP Managed Security Services with Managed Detection and Response (MDR)
In today’s rapidly evolving cyber security landscape, managed security service providers (MSSPs) must continuously innovate to meet the growing demands of their clients. As an MSSP, one powerful way to enhance your service portfolio and deliver exceptional value is by…
Check Point CloudGuard WAF Wins American Business Award for Cyber Security
We’re proud to announce that Check Point CloudGuard has been named a Silver Stevie Award winner in the Best Cloud Security Solution category at the 2025 American Business Awards! This prestigious recognition reflects CloudGuard’s impact in enabling secure, scalable, and…
Rising Mobile Threats: Closing the Security Gap in Your Organization’s Device Strategy
As advanced mobile threats become more prevalent, it’s crucial for organizations to understand that mobile devices have become significant targets for cyber criminals. With the growing reliance on mobile communication and remote work by both businesses and government agencies, attackers…
Employee Spotlight: Getting to Know Anthony Gallo
Anthony, can you tell us a bit about yourself? I am originally from New Jersey, but currently live in South Carolina. I am an attorney on the Check Point team covering the Americas, working closely with many different business units…
Check Point and Illumio Partner to Accelerate Zero Trust with Proactive Threat Prevention and Microsegmentation
Dynamic hybrid data center cloud environments are growing, leading to a larger attack surface. The mix of on-premises and multiple cloud platforms creates complex interconnections that are hard to monitor. Traditional network segmentation is insufficient as workloads move fluidly between…
Securing the Hybrid Workforce in the Age of AI: 5 Priorities for 2025
Generative AI is transforming the modern workplace. It offers new opportunities but also unprecedented risks, such as industrial-scale exploit production and data leaks through employee use of GenAI tools. In 2025, defending a hybrid workforce means adapting fast, securing smarter,…
Cyber Criminals Exploit Pope Francis Death to Launch Global Scams
Following Pope Francis’ death, as is common with global events of this nature, cyber criminals have launched a variety of malicious campaigns. This tactic isn’t new—cyber attackers have long exploited major world events, from the passing of Queen Elizabeth II…
Introducing ATAM 360°: Your Comprehensive Cyber Security Package
At Check Point, comprehensive cyber security with unmatched support is a top priority. We’re excited to introduce ATAM 360°, Check Point’s newly enhanced Advanced Technical Account Management (ATAM), a subscription-based service customized to your organization’s needs, with a designated engineer…
The Green IT Approach To Cyber Security And What Efficient Implementation Can Achieve
In today’s digital landscape, organizations face the dual challenge of maintaining robust cyber security measures while also reducing their environmental impact to manage risks and realize opportunities. In recognition of Earth Day 2025, we’d like to discuss why the convergence…