Check Point SoftwareVerified account

@CheckPointSW

Welcome to the Future of Cyber Security. Providing solutions across all vectors to prevent 5th generation cyber attacks.

San Carlos, CA | Tel Aviv, IL
Joined April 2009

Tweets

You blocked @CheckPointSW

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @CheckPointSW

  1. Pinned Tweet

    . uncovered four security vulnerabilities in Suite that would have allowed the hacker to target victims using malicious Office document programs including and . Learn more about the patched vulnerabilities:

    Undo
  2. Head of Cloud and Telco Sales, Erez Yarkoni, explains the surge in customers moving to the , during the CloudMates Live Show. Meet the CloudMates community, here:

    Undo
  3. .'s outlined today's trends in securing the modern with Check Point's . "As attacks continue to grow, a need for greater has evolved. Sophisticated tools are not used enough":

    Undo
  4. So how do you improve your posture in a post-pandemic world? shares that considering a approach and segmenting critical systems and are two out of six steps to prevent sophisticated attacks:

    Undo
  5. ., CISO at , discusses post-pandemic rapid adoption and how NHS secured their and . As a result, patient health data is now safe from attacks & :

    Undo
  6. .'s discusses the organization's challenges, and how NHS Scotland hyperscaled their after health data volumes increased tenfold. Learn more about their story here:

    Undo
  7. "Our must be enabled to complement our strategies by giving us the freedom to choose when and where our workloads go", shares Itai Greenberg. "Selecting the right workload, to which provider, is instrumental to migrating successfully":

    Undo
  8. While the pandemic accelerated , Itai Greenberg, VP of Product Management at Check Point, warns that organizations should not underestimate potential risks in the transformation journey. Get the solutions to the :

    Undo
  9. Maya Horowitz explains the Codecov and why these types of attacks are so devastating. "Once the chain is , hundreds of more customers can be breached - these attacks can quickly compromise your enterprise ".

    Undo
  10. can quickly compromise your enterprise . So how do you proactively protect your enterprise in the new post-pandemic world? Maya Horowitz, Director, Threat Intelligence & Research at Check Point, deep dives into protection:

    Undo
  11. "In a triple extortion attack, the threat actor blackmails the customers of the victim organization, putting more pressure on the victim", says Maya Horowitz, Director, Threat Intelligence & Research at Check Point:

    Undo
  12. What are the highest-profile cyber attacks in 2021? Maya Horowitz, Director, Threat Intelligence & Research at Check Point, deep dives into double-extortion , , and supply chain and their impact on the :

    Undo
  13. "Complexity is not good. There is a direct relationship between complexity and the number of breaches your organization has", shares , VP of Security & Trust at on the discussion of complex security solutions doing more harm than good:

    Undo
  14. .'s asks attendees about the current conversations around the need for greater and . He shares that by 2024, 80% of enterprises will focus on overhauling infrastructure costs by reducing operational complexity:

    Undo
  15. "The most important data center initiative is ensuring data security and compliance", shares , VP of Security & Trust at , outlining the urgent need to modernize and security.

    Undo
  16. ., VP of Security & Trust at , shares his insights on the relationship of complexity, resiliency, and security in his session "Data Center Optimization within a Transition to .":

    Undo
  17. "As attacks continue to grow, a need for greater has evolved. Sophisticated tools are not used enough." How do you improve your cyber security posture in a post-pandemic world? shares the best practices:

    Undo
  18. .'s explains how hackers moved through the chaos of the pandemic and remote capabilities to affect technology weak points. "Dependence on technology has driven significant connectedness, which expands the attack surface".

    Undo
  19. The pandemic caused the surface to change overnight. What are today's and security challenges and how do we overcome them? Global Cyber Leader, US Principal, Deloitte & Touche explains:

    Undo
  20. attacks have surged 102% globally in the past year. The recent rise in ransomware attacks dictates a need for greater and . "We have the solutions to handle the challenges - We just need to adopt them".

    Undo
  21. Today's offer complex challenges. Attack points and methods have grown with Gen V threats such as the rise of sophisticated attacks this year. "It's clearly a cyber pandemic", shares Check Point CEO, Gil Shwed:

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·