Jony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software. Check Point Software CISO Jony Fischbein has a lot...
Read moreJony Fischbein shares the concerns and practices that are top-of-mind in his daily work leading security at Check Point Software. Check Point Software CISO Jony Fischbein has a lot...
Read moreWhy corporate boards put their digital transformation at risk
February 1 2020Security breaches always seem to be in the news, but only a handful of organizations are protecting themselves against these threats by actively reducing their cyber-risk exposure. Research by...
Read moreWhy corporate boards put their digital transformation at risk
February 1 2020Security breaches always seem to be in the news, but only a handful of organizations are protecting themselves against these threats by actively reducing their cyber-risk exposure. Research by...
Read moreAccording to an InfoScales report, 95% of successful cyberattacks have human error as the leading cause – most notably company employees falling for phishing scams. This is an important...
Read moreAccording to an InfoScales report, 95% of successful cyberattacks have human error as the leading cause – most notably company employees falling for phishing scams. This is an important...
Read moreName That Toon: Private (Button) Eye
February 1 2020Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. A new month is upon us,...
Read moreName That Toon: Private (Button) Eye
February 1 2020Feeling creative? Submit your caption in the comments, and our panel of experts will reward the winner with a $25 Amazon gift card. A new month is upon us,...
Read moreEarlier this year, Facebook released an emergency patch after it discovered a software vulnerability in the voice over IP (VoIP) code used in WhatsApp that allowed attackers to remotely...
Read more
Recent Comments