Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Cyber threat prevention ahead of U.S. elections

    Mark Ostrowski, Head of Engineering, U.S. East, Check Point

    Mark Ostrowski is Head of Engineering, U.S. East, for Check Point, a global cyber security company. With over 20 years of experience in IT security, he has helped design and support some of the largest security environments in the country. Mark actively contributes to national and local media, discussing cyber security and its effects in […]

    Source: CyberTalk | Published: Mar 1, 2024
  • Ransomware paralyzes healthcare organizations, jeopardizing compensation

    Healthcare concept art

    EXECUTIVE SUMMARY: Across the United States, healthcare providers are struggling to process payments due to a week-long ransomware outage affecting a linchpin group within the American healthcare industry. According to the American Hospital Association (AHA), which represents nearly 5,000 hospitals, healthcare networks, and other healthcare providers, some large hospital chains cannot process payments at all. […]

    Source: CyberTalk | Published: Feb 29, 2024
  • Must-know network security management insights (2024)

    Network security management insights and team of people working on network security

    EXECUTIVE SUMMARY: Network security management refers to the processes and systems that administrators put into place for the purpose of overseeing, regulating and safeguarding an organization’s network infrastructure. A network security management strategy protects the heart of an organization – keeping employees productive, products competitive and the business resilient, even as disaster strikes. Amidst a […]

    Source: CyberTalk | Published: Feb 28, 2024
  • Apple cancels car project, instead ramping up this initiative…

    Apple store logo

    EXECUTIVE SUMMARY: Apple has spent years and billions of dollars not-so-secretly preparing for the release of a luxurious electric vehicle with self-driving features. After years of work, the project is ultimately being canceled. In a meeting earlier today, the company announced the change and noted that many of the engineers who were involved in “Project […]

    Source: CyberTalk | Published: Feb 27, 2024
  • Telemetry data, the new oil: the importance of securing IoT

    Miri Ofir, R&D Director and ANtoinette Hodes, Global Solutions Architect, IoT and Evangelist

    Miri Ofir is the Research and Development Director at Check Point Software. Antoinette Hodes is a Global Solutions Architect and an Evangelist with the Check Point Office of the CTO. Introduction In today’s interconnected world, the Internet of Things (IoT) has become ubiquitous, enabling the efficient exchange of data between various devices and systems. IoT […]

    Source: CyberTalk | Published: Feb 27, 2024
  • Scam alert! The most subtle tax season scams to avoid this year

    Tax season scams

    EXECUTIVE SUMMARY: Cyber scammers love tax season. Emotions run high and it’s easy for scammers to prey on FUD (fear, uncertainty and doubt). In the U.S., almost everyone is petrified (and peeved) by the tax system’s complexity, discouraged by deceptive tax service providers, and perpetually uncertain about their calculations. Then of course, there’s also the […]

    Source: CyberTalk | Published: Feb 26, 2024
  • 7 best practices for tackling dangerous emails

    White envelope icon on green background, representative of email security

    EXECUTIVE SUMMARY: Email is the #1 means of communication globally. It’s simple, affordable and easily available. However, email systems weren’t designed with security in mind. In the absence of first-rate security measures, email can become a hacker’s paradise, offering unfettered access to a host of tantalizingly lucrative opportunities. Regarding email threat prevention, adherence to security […]

    Source: CyberTalk | Published: Feb 23, 2024
  • Aussie data breach report exposes supply chain risks

    3D rendering of Australia

    EXECUTIVE SUMMARY: Approximately 60% of Australian organizations lack a comprehensive understanding of third-party data breach risks, with over 50% failing to implement impactful measures to assist with long-term third-party risk management. Authorities are concerned… The Office of the Australian Information Commissioner’s recent data breach report highlights growing concern over supply chain risks and breaches. The […]

    Source: CyberTalk | Published: Feb 22, 2024
  • Threat prevention & defense for government agencies

    Check Point, Pete Nicoletti, Field CISO Americas

    Pete Nicoletti is a Field CISO for the Americas region at Check Point. Pete has 32 years of security, network, and MSSP experience and has been a hands-on CISO for the last 17 years. Pete’s cloud security deployments and designs have been rated by Garter as #1 and #2 and he literally “wrote the book” […]

    Source: CyberTalk | Published: Feb 22, 2024
  • Hackers can steal your face to create deepfakes that empty bank accounts

    Asian person deepfake concept art

    EXECUTIVE SUMMARY: A new form of mobile malware is designed to harvest personal information, including facial biometric data, which hackers then process for the purpose of generating deepfakes. Once the deepfakes are deployed, they deceive electronic security systems, allowing hackers to break into bank accounts and disappear with the funds. The hackers are also impersonating […]

    Source: CyberTalk | Published: Feb 21, 2024
  • Cyber inequality crisis is weakening our global defences

    Deryck Mitchelson, Field CISO EMEA, Check Point

    By Deryck Mitchelson, Field CISO EMEA, Check Point The disparity in cyber defense budgets is significantly contributing to a deteriorating security landscape. A vast chasm exists between nations and businesses that have the financial power to implement advanced cyber security technologies and those that do not. As a result, when financially well-resourced groups engage partners […]

    Source: CyberTalk | Published: Feb 20, 2024
  • 10 ways to elevate public sector cyber security

    Cyber security lock and code concept art

    EXECUTIVE SUMMARY: Across the past 18 months, a variety of major global hacking campaigns have plagued public sector groups; from government agencies, to hospitals, to educational institutions. During the second quarter of 2023, cyber attacks affecting public sector organizations increased by 40 percent, as compared to the first quarter. By the third quarter of the […]

    Source: CyberTalk | Published: Feb 16, 2024