Home RSS Feed

RSS Feed

Subscribe to Cybertalk’s RSS (Really Simple Syndication) feeds to get news delivered directly to your desktop!

Click here to copy Url for RSS Reader
  • Must-know insights when navigating the CISO career path

    CISO career path and business performance indicators concept art

    EXECUTIVE SUMMARY: The CISO career path is as exciting as it is fraught with perils. Modern CISOs exist at the intersection of technology, security and business strategy. The stakes are high and the simplest of initiatives can easily command commendation or crumble and collapse, ending in highly visible, catastrophic failures. Succeeding within a CISO role […]

    Source: CyberTalk | Published: May 22, 2024
  • 5 ways to effectively communicate cyber security value to the board

    CISO giving presentation to Board; concept art

    EXECUTIVE SUMMARY: Historically, communicating the value of cyber security to the board has always been a challenge. Cyber security staff and solutions are typically out-of-sight and out-of-mind, until something goes terribly wrong. Although there isn’t a single, uniform way to convey cyber security’s value to the board, there are a variety of highly effective strategies […]

    Source: CyberTalk | Published: May 21, 2024
  • How platformization is transforming cyber security

    Manuel Rodriguez, Security Engineering Manager

    With more than 15 years of experience in cyber security, Manuel Rodriguez is currently the Security Engineering Manager for the North of Latin America at Check Point Software Technologies, where he leads a team of high-level professionals whose objective is to help organizations and businesses meet their cyber security needs. Manuel joined Check Point in […]

    Source: CyberTalk | Published: May 20, 2024
  • How AI turbocharges your threat hunting game

    Portrait of cyber security engineer, concept art

    EXECUTIVE SUMMARY: Over 90 percent of organizations consider threat hunting a challenge. More specifically, seventy-one percent say that both prioritizing alerts to investigate and gathering enough data to evaluate a signal’s maliciousness can be quite difficult. Threat hunting is necessary simply because no cyber security protections are always 100% effective. An active defense is needed, […]

    Source: CyberTalk | Published: May 17, 2024
  • SugarGh0st RAT variant, targeted AI attacks

    Abstract, holographic and neon concept, indicative of artificial intelligence (AI) and ghost RAT

    EXECUTIVE SUMMARY: Cyber security experts have recently uncovered a sophisticated cyber attack campaign targeting U.S-based organizations that are involved in artificial intelligence (AI) projects. Targets have included organizations in academia, private industry and government service. Known as UNK_SweetSpecter, this campaign utilizes the SugarGh0st remote access trojan (RAT) to infiltrate networks. In the past, SugarGh0st RAT […]

    Source: CyberTalk | Published: May 16, 2024
  • Lost in translation | Abbreviations and acronyms in cyber security

    Antoinette Hodes, Global Solutions Architect - IoT

    By Antoinette Hodes, a Check Point Global Solutions Architect and Evangelist with the Check Point Office of the CTO. Cyber security professionals commonly throw around industry-specific acronyms in a bid to simplify communication and to save time. But linguistic shortcuts have their disadvantages, especially when it comes to communicating across teams… In the way that […]

    Source: CyberTalk | Published: May 15, 2024
  • 5 key takeaways for CISOs, RSA Conference 2024

    Speaker giving a talk at RSA Conference 2024

    EXECUTIVE SUMMARY: Last week, over 40,000 business and cyber security leaders converged at the Moscone Center in San Francisco to attend the RSA Conference, one of the leading annual cyber security conferences and expositions worldwide, now in its 33rd year. Across four days, presenters, exhibitors and attendees discussed a wide spectrum of topics, including groundbreaking […]

    Source: CyberTalk | Published: May 14, 2024
  • AI is changing the shape of leadership – how can business leaders prepare?

    Cyber security, leadership, artificial intelligence, globe concept

    By Ana Paula Assis, Chairman, Europe, Middle East and Africa, IBM. EXECUTIVE SUMMARY: From the shop floor to the boardroom, artificial intelligence (AI) has emerged as a transformative force in the business landscape, granting organizations the power to revolutionize processes and ramp up productivity. The scale and scope of this shift is fundamentally changing the […]

    Source: CyberTalk | Published: May 13, 2024
  • 10 ways generative AI drives stronger security outcomes

    cyber security and generative AI concept art

    EXECUTIVE SUMMARY: Eighty-seven percent of cyber security professionals recognize the potential inherent in leveraging AI for security purposes. The growing volume and sophistication of cyber attacks point to the critical need for new and innovative ways to protect businesses from cyber skullduggery. However, despite widespread and rabid enthusiasm for generative AI, generative AI adoption in […]

    Source: CyberTalk | Published: May 10, 2024
  • Beware of cyber scams: How hackers tried to scam me

    Lari Luoma, Principle Security Consultant

    Lari Luoma has over 20 years of experience working in the fields of security and networking. For the last 13 years, he has worked with Check Point Professional Services as a security consultant, helping customers worldwide implement the best-in-class cyber security. He is a subject matter expert in hyper-scalable security solutions. EXECUTIVE SUMMARY: Cyber crime […]

    Source: CyberTalk | Published: May 9, 2024
  • Two-thirds of organizations are not prepared for AI risks

    AI concept art

    EXECUTIVE SUMMARY: Artificial intelligence is the new epicenter of value creation. Employees across industries are ecstatic about deploying easily accessible generative AI tools to elevate the quality of their output and to improve efficiency. According to the latest research, 60% of employees use generative AI tools to augment their efforts. Roughly 42% of organizations say […]

    Source: CyberTalk | Published: May 8, 2024
  • The all-star AI-powered, cloud-delivered security platform you need

    Check Point Gil Shwed Infinity Platform, Infinity AI Copilot

    EXECUTIVE SUMMARY: Cyber criminals are weaponizing advanced tactics, including intricate social engineering campaigns, to carry out malicious activities. Last year, social engineering attempts rose by 464%. Often a result of social engineering attempts, ransomware attacks have reportedly increased by 90%. Amidst this unsettling attack landscape, it can be difficult and stressful to secure data and […]

    Source: CyberTalk | Published: May 7, 2024