Three FIFA World Cup Scams You Should Know

Contributed by George Mack, Content Marketing Manager, Check Point Software. The 2022 FIFA World Cup is possibly the biggest spectacle of the year. With an expected viewership of over 1 billion viewers, hackers see this as the opportunity of a lifetime to scam their way into victims’ bank accounts or steal personal information. All major […]

How to reduce industrial cyber attacks during cloud transformation

Contributed by April Miller, Senior Writer for Rehack.com. Cloud transformation is a critical step for businesses undertaking Industry 4.0 initiatives. However, this transition also comes with new risks that industrial organizations may be unfamiliar with, leaving them vulnerable to cyber attacks. As manufacturers and companies in other heavy industries implement more digital technologies, they must […]

As a technology leader, Celebrate National Computer Security Day!

As a technology leader, you know that cyber security is a rapidly-evolving area and that there are still many multi-tiered challenges and opportunities ahead. The stakes are high, and security threats are proliferating. As the world becomes increasingly connected, a new level of attention to cyber security and data privacy is needed – […]

Canada advances cyber security via Indo-Pacific Strategy

On Sunday, Canada launched its much-anticipated Indo-Pacific Strategy, which is designed to advance military and cyber security efforts in the region. According to a 26-page Canadian document, the Indo-Pacific Strategy involves heavily reworking foreign investment rules. This is intended to protect intellectual property, to prevent unchecked mining of valuable mineral supplies, and to […]

A Q&A with Mimi Keshani, COO and Co-Founder of Hadean

Mimi Keshani is Hadean’s COO, driving its pioneering work in defense and the metaverse. With a strong background in technological sciences, Mimi was instrumental in early iterations of Hadean’s technology, namely simulations of protein-protein interactions and COVID-19 pandemic modelling, as well as its applications to gaming. Since then, she has been central in guiding the company’s technology towards its current […]

6 simple & straightforward Cyber Monday fraud prevention tips

Starting on November 28th, Cyber Monday is the season’s second-major shopping event, second-only to Black Friday, with mega-sales and deep discounts that are accessible from the comfort of your couch. Excited about stocking up on everyday kitchen essentials, epic electronics or must-have fitness gear? Cyber Monday was founded by the National Retail Federation […]

One easy way to secure your Android

Contributed by George Mack, Content Marketing Manager, Check Point Software. The Android operation system has been around for over a decade and has come a long way since then. New features, a wide variety of apps, upgraded camera phones, and an aesthetically pleasing user interface have led to a gigantic install base: A whopping 2.8 […]

Cloud configuration security practices impact

Businesses face inherent risks when using the cloud and with the pace of cloud adoption and innovation there is evidence from the Cyber Security Hub survey that security activity is not keeping pace w…

The top XDR investment decisions for CISOs

CISOs and security owners, especially those operating SMBs, face several challenges, including stretched budgets, lack of in-house resources, misconfigured security solutions and existing traditional…