
Cyber Talk
131 FOLLOWERS
Provides expertly curated cyber security resources, cyber security news about current events and insights for executives, plus news trending now on ransomware, malware, phishing, and other issues executed by hackers.
Cyber Talk
2d ago
Micki Boland is a global cyber security warrior and evangelist with Check Point’s Office of the CTO. Micki has over 20 years in ICT, cyber security, emerging technology, and innovation. Micki’s focus is helping customers, system integrators, and service providers reduce risk through the adoption of emerging cyber security technologies. Micki is an ISC2 CISSP and holds a Master of Science in Technology Commercialization from the University of Texas at Austin, and an MBA with a global security concentration from East Carolina University.
Are deepfakes the 21st century’s answer to photoshopp ..read more
Cyber Talk
2d ago
EXECUTIVE SUMMARY:
Holiday cheer is in the air! Many of us are eager to gather, express gratitude, and give gifts. Unfortunately, the festive season is also when scams start to skyrocket, souring the spirit of celebration.
Even if you’re a cyber scam prevention pro, take the opportunity to raise awareness about scams among your colleagues, friends and loved ones.
Scammers target people in the following ways. We’re here to help you and yours avoid a heartbreaking holiday season.
10 common holiday scams and how to avoid them
1. Deceptive social media advertisements. These direct users to fraudul ..read more
Cyber Talk
3d ago
EXECUTIVE SUMMARY:
Holiday cheer is in the air! Many of us are eager to gather, express gratitude, and give gifts. Unfortunately, the festive season is also when scams start to skyrocket, souring the spirit of celebration.
Even if you’re a cyber scam prevention pro, take the opportunity to raise awareness about scams among your colleagues, friends and loved ones.
Scammers target people in the following ways. We’re here to help you and yours avoid a heartbreaking holiday season.
10 common holiday scams and how to avoid them
1. Deceptive social media advertisements. These direct users to fraudul ..read more
Cyber Talk
4d ago
By Antoinette Hodes, a Check Point Global Solutions Architect for the EMEA region and an Evangelist with the Check Point Office of the CTO.
In today’s rapidly evolving world, IoT has emerged as a transformative force, revolutionizing industries and enhancing our daily lives. At the same time, the urgent need to address environmental concerns and strive for a sustainable future has become increasingly apparent. The convergence of IoT and sustainability holds immense potential to drive positive change and shape a greener world.
Defining IoT and sustainability
The Internet of Things refers to th ..read more
Cyber Talk
5d ago
When assuming a new role, top CISOs continuously stay appraised of new threats and even proactively engage with emerging technologies. But even the most astute and technically talented of CISOs can bungle this one thing…
While CISOs often approach new roles with a deep understanding of external threats, CISOs have traditionally underestimated the threats within their own perimeter.
We’re not talking about malicious insider threats here – Rather, we’re referring to the lack of interest in, resistance to and sometimes, blatant dismissal of, cyber security concerns among staff.
One of the biggest ..read more
Cyber Talk
6d ago
EXECUTIVE SUMMARY:
You’re invited! The premiere cyber security event of the year awaits. Registration for CPX 2024 is open. This event brings together the top minds in cyber security; industry executives, CISOs, business strategists, thought leaders, innovators and more. Explore perspectives and gain insights into the latest cyber security trends, challenges and opportunities of next year and beyond.
To maximize learning, bring your entire team. Participate in sessions together or send small delegations to individual talks in order to cover more ground, sharing key take-aways later. Whatever y ..read more
Cyber Talk
1w ago
By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies.
The interconnectedness of the global marketplace means that a single supply chain disruption can compromise hundreds or thousands of organizations. To provide context, the average auto manufacturer retains 250 tier-one suppliers and 18,000 across the full value chain. Proctor & Gamble has over 75,000 suppliers and the French oil company Total does business with more than 150,000 different firms.
Organizations that fail to future-proof systems against cyber supply chain threats may see their own demise, alo ..read more
Cyber Talk
1w ago
EXECUTIVE SUMMARY:
The Cactus cyber criminal group is currently exploiting three different security flaws within the Qlik Sense platform, a versatile cloud analytics engine, in order to execute ransomware attacks.
In the past, Cactus criminals have targeted prominent global, commercial organizations; embarrassing victims by publishing their names and brief corresponding descriptions on a dark web leak channel.
To avoid the Qlik Sense threat, understand the Cactus group’s tactics, techniques and procedures (TTPs). Keep reading to learn more:
Critical vulnerabilities
In August, Qlik ..read more
Cyber Talk
1w ago
Brian Linder is an Emerging Threats Expert and Evangelist in Check Point’s Office of the CTO, specializing in the modern secured workforce. Brian has appeared multiple times on CNBC, Fox, ABC, NBC, CBS, and NPR radio, and hosts Check Point’s CoffeeTalk Podcast and Weaponizers Underground, and has teamed on keynote CyberTalks at Check Point’s CPX360 events. For 20+ years, Brian has been an advisor at the C-level to firms big and small in financial, legal, and telecommunications, on next generation cyber security solutions and strategies for cloud, mobile, and network. Brian holds a B.S. in comp ..read more
Cyber Talk
1w ago
By Zac Amos, Features Editor, Rehack.com.
While many people are aware of blockchain technology on account of cryptocurrency, they are unfamiliar with the fact that it can serve as a valuable solution for securing IoT devices. Since blockchains rely on a decentralized system, they are essentially very difficult to compromise.
This can make blockchains a strong choice for enhancing IoT security. In this article, learn more about blockchain technology and how it can play a crucial role in making IoT devices more secure.
What is blockchain technology?
As the name suggests, blockchain tec ..read more