Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Is your outdated WAN putting the brakes on your business? What to watch for

    Network cyber security concept art

    Peter Elmer, Check Point Office of the CTO and Mor Ahuvia, Check Point Office of the CTO. By 2026, 70% of enterprises will have adopted SD-WAN. The shift towards cloud-based services and infrastructure is driving organizations to rethink their networking infrastructure. At present, your organization may be experiencing some of the following challenges: Core WAN […]

    Source: CyberTalk | Published: Mar 18, 2024
  • Victim of cyber crime? 7 crucial steps your business should take

    Photo of smart cyber security engineer

    EXECUTIVE SUMMARY: For a business, falling victim to cyber crime is a disquieting and stressful experience. In the immediate aftermath, there are a number of hurdles to clear and obstacles to overcome. Potentially worsening the degraded cyber security situation, failure to act fast can exacerbate financial or reputational damage, and even lead to legal consequences. […]

    Source: CyberTalk | Published: Mar 15, 2024
  • Anticipating the future of malicious open-source packages: next gen insights

    Ori Abramovsky, Developer-First Head of Data Science

    Ori Abramovsky is the Head of Data Science of the Developer-First group at Check Point, where he leads the development and application of machine learning models to the source code domain. With extensive experience in various machine learning types, Ori specializes in bringing AI applications to life. He is committed to bridging the gap between […]

    Source: CyberTalk | Published: Mar 15, 2024
  • Securing Kubernetes: mitigating the RCE flaw for Windows nodes

    Cyber security staff launching software update

    EXECUTIVE SUMMARY: As the backbone of modern container orchestration, Kubernetes plays a pivotal role in managing workloads across clusters. However, recent research has shed light on a critical vulnerability that demands attention from security practitioners. In this article, we delve into the specifics of the flaw and provide practical steps that can help you safeguard […]

    Source: CyberTalk | Published: Mar 14, 2024
  • The best cloud security tools have these features…

    The best cloud security tools have the attributes that are described in this article.

    EXECUTIVE SUMMARY: In the digital age, cloud computing has become an indispensable catalyst for business growth and agility. Nearly 90% of organizations report hosting sensitive data or workloads in the public cloud, while a staggering 76% have adopted a multi-cloud strategy – a figure that’s expected to rise in the near future. The shift to […]

    Source: CyberTalk | Published: Mar 13, 2024
  • A primer on MESH networks and MESH cyber security

    Gergana Kungalova, Security Engineer, Office of the CTO

    Gergana Kungalova is a Security Engineer for Check Point in Bulgaria. She started her journey in the Cyber Security field as Network Security Support Engineer, working with customers across the globe. In her current role, she is connecting people and processes with technology by matching the clients’ business needs with security solutions and services. In […]

    Source: CyberTalk | Published: Mar 12, 2024
  • The 10 most dangerous ransomware groups right now

    System hack concept art

    EXECUTIVE SUMMARY: Ransomware can ravage a business in seconds; inhibiting data access, cutting into profits, and tarnishing a carefully crafted reputation. In 2023, every week, on average, 1 out of every 34 organizations worldwide experienced an attempted ransomware attack, representing an increase of 4% compared to the same period last year. In many cases, it […]

    Source: CyberTalk | Published: Mar 11, 2024
  • A strategic shift to AI-powered and cloud-delivered solutions

    Mark Ostrowski, Head of Engineering, U.S. East, Check Point

    EXECUTIVE SUMMARY: AI is revolutionizing businesses worldwide. Enterprises are being reinvented through artificial intelligence. AI is also separating the industry leaders from the industry followers.  In the U.S., 73% of companies have already adopted artificial intelligence. Within certain sectors, experts expect that, on an annual basis, AI could contribute $4.4 trillion to the economy. But, […]

    Source: CyberTalk | Published: Mar 11, 2024
  • Best practices, breaking barriers & business opportunities

    Konstantina Koukou, Cyber Security Specialist, Office of the CTO

    Konstantina Koukou is a well-rounded, tech-savvy electrical engineering graduate with a specialization in Information and Telecommunication Systems and a Master’s degree in Business Administration. She has 13 years of experience in different roles, from technical to consulting, and a passion for cyber security. Today, we’re taking the opportunity to highlight talented women in cyber security, […]

    Source: CyberTalk | Published: Mar 8, 2024
  • Making cyber security more diverse and inclusive (starting now!)

    Cindi Carter, Field CISO Americas, CyberTalk.org

    Cindi Carter is a Field CISO for the Americas region at Check Point. Happy International Women’s Day! As we recognize this day and celebrate the social, economic, political and cultural achievements of women, let’s also note that there is still much more work to be done, especially in relation to getting women involved in cyber […]

    Source: CyberTalk | Published: Mar 8, 2024
  • This International Women’s Day, meet a true technology trailblazer…

    Micki Boland, Cyber security expert and evangelist

    Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and […]

    Source: CyberTalk | Published: Mar 8, 2024
  • JetBrains TeamCity supply chain bug, servers still unpatched and vulnerable

    Software concept

    EXECUTIVE SUMMARY: Security experts have warned that cyber criminals are exploiting a critical TeamCity vulnerability en masse. Hackers are creating hundreds of new user accounts on compromised servers.  TeamCity as a target First released in 2006, the popular commercial software known as TeamCity enables developers to create and test software in an automated fashion. It […]

    Source: CyberTalk | Published: Mar 7, 2024