ChatGPT-4 and cyber crime, insights from a Nasdaq TradeTalk
In this edited excerpt from a recent Nasdaq TradeTalk, Check Point’s Head of Engineering, U.S East, Mark Ostrowski, discusses the concerns that ChatGPT-4 raises. ChatGPT-3 has evolved into ChatGPT-4. What does that mean and why is that giving bad actors a dangerous amount of power? It’s a good question. I think that what we’ve discovered since November of last year, when ChatGPT was first released, is that ChatGPT has really...
Exciting AI breakthroughs: Risks, distractions, new threats
In this exclusive CyberTalk interview, Global Cyber Security Strategist and Evangelist for Check Point, Edwin Doyle, provides unique and insightful perspectives pertaining to industry, innovation and what the future of AI holds. He unpacks how groundbreaking AI language models will transform the labor market, the business landscape, cyber security and so much more. Find out about the AI breakthroughs that are already making an impact...




How AI is helping companies fight document fraud
In an exclusive interview with David Hobbs, a fraud expert at Check Point, Conor Burke, the co-founder and CTO of Inscribe, sheds light on his AI-powered startup’s efforts to combat document fraud. As financial institutions prioritize the improvement of risk data availability, quality and timeliness, AI-powered fraud and credit insights can simplify decision-making, minimize uncertainty and reduce costs. Keep reading to find out...




Is your organization among the 1 in 10 with malware traffic? DNS data reveals scary truth
EXECUTIVE SUMMARY: In a new report, cyber security researchers have highlighted just how widespread malware threats really are, illuminating the dangers of threats specific to DNS infrastructure. Last year, between 10% and 16% of organizations saw DNS traffic originating on their networks towards command-and-control (C2) servers associated with botnets and other malicious threats. Over 25% of that traffic was directed to servers...
2023 Power 100 honorees, highlighting women’s leadership in tech
EXECUTIVE SUMMARY: In a world that’s constantly changing, it’s important to recognize those who are making an impact in their field. That’s why it’s so exciting to hear that Rupal Hollenbeck and Nisha Holt have been named SIA Women in Security Forum (WISF) Power 100 honorees. These two women are at the forefront of the security industry, and their contributions are nothing short of inspiring and inimitable. Rupal Hollenbeck,...

Cyber security for the public sector: What you need to know
By Mazhar Hamayun, cyber security engineer and member of the Office of the CTO at Check Point. In the digital age, public sector organizations face a myriad of cyber security challenges that can potentially compromise sensitive information and critical infrastructure. From phishing schemes to ransomware attacks, public sector organizations must stay ahead of threats while simultaneously working with limited resources and complying...

Increasing infrastructure security by reducing complexity
By Deryck Mitchelson, Field CISO EMEA, Check Point Software Technologies. Cyber complexity can impede efforts to secure systems. In particular, cyber security complexity increases risks, drives high costs, and can result in sub-par decision-making. By pursuing a simplification agenda, leaders can build true cyber security resilience. Reducing complexity means focusing on operational overlap, on duplication and on trying to reduce the...

A shocking truth: One in five government employees, indifferent to workplace hacks
EXECUTIVE SUMMARY: Around the globe, cyber risks are intensifying. Responding to these growing challenges requires developing new partnerships, encouraging inter-departmental collaboration, pursuing innovative cyber...


