Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Deepfake misuse & deepfake detection (before it’s too late)

    Micki Boland, Check Point Cyber Security Expert, and Member of the Office of the CTO

    Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and […]

    Source: CyberTalk | Published: Jul 26, 2024
  • Evolving cyber security in the financial services sector

    Bank concept art

    EXECUTIVE SUMMARY: The financial sector is a leading target for cyber criminals and cyber criminal attacks. Markedly improving the sector’s cyber security and resilience capabilities are a must. While the sector does have a comparatively high level of cyber security maturity, security gaps invariably persist and threaten to subvert systems. As Check Point CISO Pete […]

    Source: CyberTalk | Published: Jul 25, 2024
  • Synergy between cyber security Mesh & the CISO role: Adaptability, visibility & control

    Angel Salazar Velasquez, Security Engineering Manager, Office of the CTO, Check Point

    With over two decades of experience in the cyber security industry, I specialize in advising organizations on how to optimize their financial investments through the design of effective and cost-efficient cyber security strategies. Since the year 2000, I’ve had the privilege of collaborating with various channels and enterprises across the Latin American region, serving in […]

    Source: CyberTalk | Published: Jul 22, 2024
  • SEC charges against SolarWinds largely dismissed

    Legal concept, cyber security

    EXECUTIVE SUMMARY: In a landmark case, a judge dismissed most of the charges against the SolarWinds software company and its CISO, Timothy Brown. On July 18th, U.S. District Judge Paul Engelmayer stated that the majority of government charges against SolarWinds “impermissibly rely on hindsight and speculation.” The singular SEC allegation that the judge considered credible […]

    Source: CyberTalk | Published: Jul 19, 2024
  • How platformization is transforming cyber security

    Manuel Rodriguez, Security Engineering Manager

    With more than 15 years of experience in cyber security, Manuel Rodriguez is currently the Security Engineering Manager for the North of Latin America at Check Point Software Technologies, where he leads a team of high-level professionals whose objective is to help organizations and businesses meet their cyber security needs. Manuel joined Check Point in […]

    Source: CyberTalk | Published: Jul 17, 2024
  • AI-powered protection, redefining resilience

    Cyber security concept art

    EXECUTIVE SUMMARY: At Check Point, on AI Appreciation Day, we’re reflecting on the pivotal role of artificial intelligence in cyber security. Although AI provides new capabilities for cyber criminals, as Check Point expert Keely Wilkins points out, “AI is just the mechanism used to commit the crime.” If AI didn’t exist, cyber criminals would find […]

    Source: CyberTalk | Published: Jul 16, 2024
  • AI data security: 8 essential steps for CISOs in the age of generative AI

    Data science, big data, cyber security concept art

    EXECUTIVE SUMMARY: Artificial intelligence and large language models are transforming how organizations operate. They’re also generating vast quantities of data – including synthetic text, code, conversational data and even multi-media content. This introduces increased potential for organizations to encounter hacking, data breaches and data theft. This article outlines eight essential steps that cyber security stakeholders […]

    Source: CyberTalk | Published: Jul 15, 2024
  • EU says Elon Musk’s X allowed disinformation to run wild

    Elon Musk's Twitter/X platform

    EXECUTIVE SUMMARY: The tech media mogul’s platform is the first to see charges under a new EU social media law. The European Union is taking Elon Musk to task over his transformation of the Twitter social media site (now X) into a haven for disinformation and dubious content. On Friday, the EU Commission formally charged […]

    Source: CyberTalk | Published: Jul 12, 2024
  • Infostealers: What are they & far-reaching effects on data security

    Hendrik de Bruin, Security Engineer, Office of the CTO

    By Hendrik De Bruin, Security Engineer, Check Point Software Technologies. Infostealers…ransomware’s lesser-known cousin When it comes to malware, ransomware usually steals the limelight, largely because of the direct, devastating impact that ransomware often causes. However, ransomware’s lesser-known cousin, the “infostealer,” is slowly but surely gaining ever-more attention. Over the last few years, we have noticed […]

    Source: CyberTalk | Published: Jul 11, 2024
  • 5 CISO trends to keep up with during July of 2024

    Cyber security news for executives: July 2024 trends

    EXECUTIVE SUMMARY: What is the word ‘agile’ spelled backwards? CISO. (Just kidding, but it should be) As we enter July of 2024, contending with the current cyber security landscape demands unprecedented levels of vigilance and strategic agility. This month brings a convergence of developments and challenges with far-reaching implications. From a high-impact vulnerability in ubiquitous […]

    Source: CyberTalk | Published: Jul 10, 2024
  • Transforming network security | Three ways AI can boost infrastructure operations

    Ulrica de Fort Menares, VP of Product Management for Infrastructure Assurance, BlueCat Networks

    By Ulrica de Fort-Menares, Vice President of Product Management for Infrastructure Assurance at BlueCat Networks Artificial intelligence (AI) has the power to reshape how you operate your network security infrastructure. Firewalls have been a first line of defense in network security for many years and must always be operational. Maintaining five nines, or service availability […]

    Source: CyberTalk | Published: Jul 9, 2024
  • How to evolve security, if employees can’t outsmart AI-powered phishing

    Phishing and AI abstract concept art

    EXECUTIVE SUMMARY: Until recently, the signs of a phishing scam were relatively obvious – typos, “dear”, clumsy grammar, a cloying sense of urgency. Not only did people know what to watch for, but they also felt confident in their abilities to detect a phishing email and to avoid a malicious link or attachment. But new […]

    Source: CyberTalk | Published: Jul 3, 2024