KRACK Attack: How Secure is Your Wi-fi Connection?

KRACK Attack: How Secure is Your Wi-fi Connection?

A cyber security researcher of KU Leuven in Belgium, Mathy Vanhoef, has revealed a flaw in Wi-Fi’s WPA2’s cryptographic protocols. The discovery is alarming as the WPA2 protocol, the most common and secure Wi-Fi access protocol since 2004, is trusted by all for keeping Wi-Fi connections safe. read more

Check Point vSEC for Azure Stack seamlessly secures the hybrid-cloud

Check Point vSEC for Azure Stack seamlessly secures the hybrid-cloud

Using the hybrid cloud is much like streaming a movie on a home theatre system. Pulling the film from the cloud to your big screen TV, the home theatre experience marries the benefits of the public cloud with the comfort of not having to leave the house and overpay for popcorn. The hybrid cloud, with the public cloud benefits such as agility, elasticity, and on-demand computing, allows organisations to have complete control over their data, deploying the services to best meet their unique business, technical, and regulatory requirements.  And one of the best ways for organisations to deploy hybrid cloud is with Microsoft Azure Stack. read more

Microsoft Beefs Up Enterprise Mobility With Check Point Tie Up

Microsoft Beefs Up Enterprise Mobility With Check Point Tie Up

Is your mobile enterprise protected effectively?

Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defence (MTD) solution, with Microsoft’s Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach to manage mobile devices and protect against advanced mobile attacks. read more

Check Point’s Cyber Security Predictions for 2017

Check Point’s Cyber Security Predictions for 2017

2016 proved to be another year of devastating data breaches, spanning across multiple industries, across both large and small companies alike. There have been many sobering moments throughout the year, validating once again, that no one is immune to sophisticated cyberattacks. read more