-
Firebase CLI Installer Making Calls to Google Analytics
Firebase is a mobile and web application development platform provided by Google. One of the tools available for the platform is the Firebase CLI tool (GitHub repo) which helps developers interact with the platform from command line. An automatic install script is offered among other options, which allows installation of the CLI tool via the…
-
New Tools for Addressing Supply Chain Attacks
In the recent codecov.io security incident, an attacker modified a shell script used by a common software development tool for code coverage. This modification did not take place at the original source code repository where it would have been visible to others, but after the code was packaged and placed on the web server from…
-
No Excuses: Why Multi-Factor Authentication is Non-Negotiable
Breaches are not a matter of if but when, which is why relying solely on passwords is a dangerous oversight. As the Product Security Manager for Harmony SASE, I’ve seen the destruction firsthand, and I’m here to tell you that MFA is not just “good practice” — it’s the absolute minimum standard of care. Why…
-
6 Key Insights from Check Point’s Cloud Security Report 2025
Cloud environments are evolving faster than many security teams can adapt. As hybrid, multi-cloud, edge, and SaaS adoption accelerates, organizations face fragmented systems, inconsistent controls, and widening attack surfaces. Threat detection is often delayed, tools are overwhelmed, and many defenses have become outdated, all while attackers are scaling and automating attacks. Check Point commissioned a…
-
Understanding Gartner Market Guide for Cloud Web Application and API Protection: How CloudGuard WAF Sets a New Standard in Web & API Protection
How the market is evolving and why now, more than ever, you need an AI powered WAF What defines a next-generation web application and API protection (WAAP) platform? How can security teams keep pace with today’s fast-moving, API-driven threat landscape without slowing down innovation? According to the latest Gartner Market Guide for WAAP: “Security and…
-
Lumma Infostealer – Down but Not Out?
Key Findings: The takedown achieved a significant disruption to Lumma infostealers’ infrastructure, but likely didn’t permanently affect most of its Russia-hosted infrastructure. Lumma’s developers are undertaking significant efforts to reinstate the activity and to conduct business as usual. There seems to be a significant reputational damage to the Lumma infostealer, and the key factor for…
-
Quantum Force Firewalls Bring Lightning-Fast Cyber Security to the Branch Office
Our hyperconnected world demands more from cyber security than ever before. Security leaders must prevent intrusions at the network level, but also protect a distributed, cloud-enabled workforce in hybrid roles and in branch offices with the same enterprise-grade security that protects a company’s headquarters. A significant portion of work – and the workforce – resides…
-
Accelerate your Operations with AI Powered Security Management and Quantum Smart-1 Management 700/7000 Series Appliances
Check Point introduces powerful all-in-one Quantum Smart-1 700/7000 Security Management appliances to manage security policies for both on-premises and cloud firewalls, delivering consolidated visibility, logging, compliance, and auditing across enterprise networks. These new 7th generation Quantum Smart-1 Security Management appliances boost efficiency by delivering 2X expansion in managed gateways, up to a 70% increase in…
-
Employee Spotlight: Getting to Rolando Panez
Rolando, can you tell us a bit about yourself? I’m a proud father of three beautiful girls. I was born and raised in Florida. I received a master’s degree in electrical engineering at the University of Florida. I worked on ASIC and board design for the space industry before transitioning to cyber security sales. What…
-
Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments
We’re excited to share that Check Point is acquiring Veriti, the first to introduce preemptive exposure management which automatically remediates threat exposures and prevents threat across complex multi-vendor estates. In the era of hyperconnectivity and AI, reactive security is too slow AI has brought cyber security to a tipping point, enabling the launch of attacks…