Check Point CEO Announces Intention to Stand Down

Check Point CEO Gil Shwed has announced his intention to step down from his role after 30 years at the helm of the cybersecurity vendor.
Co-founded in 1993 by Shwed and Marius Nacht and Shlomo Kramer - who are no longer with the company - Check Point's initial technology was built on the concept of stateful inspection.
This became the foundation for the company's first core product, FireWall-1.
Check Point rolled out its software blade architecture in 2009, and executed a series of acquisitions including security service edge vendor Perimeter 81 in 2023.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 16:20:20 +0000


Cyber News related to Check Point CEO Announces Intention to Stand Down

Check Point CEO Announces Intention to Stand Down - Check Point CEO Gil Shwed has announced his intention to step down from his role after 30 years at the helm of the cybersecurity vendor. Co-founded in 1993 by Shwed and Marius Nacht and Shlomo Kramer - who are no longer with the company - Check ...
1 year ago Darkreading.com
GigaOm's Cloud Network Security Radar Ranks Check Point as the Industry Leader - This article introduces GigaOm's inaugural Radar for Cloud Network Security and explains why Check Point was ranked as the Leader as well as a Fast Mover. Firstly, it is the cloudified version of Check Point's on-premises network security, from which ...
1 year ago Blog.checkpoint.com
Check Point Supercharges Brisbane Catholic Education's Security Stack to Improve Threat Detection and Streamline Manageability - Brisbane Catholic Education is a learning community comprising more than 140 schools that deliver quality learning outcomes to 77,000 prep-to-year-12 students. BCE's education and administrative workflows are powered by a large and distributed hybrid ...
1 year ago Blog.checkpoint.com
Check Point VPN zero-day exploited in attacks since April 30 - Threat actors have been exploiting a high-severity Check Point Remote Access VPN zero-day since at least April 30, stealing Active Directory data needed to move laterally through the victims' networks in successful attacks. Check Point warned ...
1 year ago Bleepingcomputer.com CVE-2024-24919
Mimecast Announces New CEO - PRESS RELEASE. LEXINGTON, Mass., January 16, 2024 - Mimecast Limited, an advanced email and collaboration security company, announced today the appointment of Marc van Zadelhoff as CEO, with Mimecast Co-Founder and current CEO Peter Bauer remaining a ...
1 year ago Darkreading.com
Why Your CISO Should Report to the CEO, Not the CIO - In an era where cyber threats dominate boardroom discussions, the reporting structure of a Chief Information Security Officer (CISO) has profound implications for organizational resilience. Elevating the CISO to report directly to the CEO signals a ...
1 month ago Cybersecuritynews.com
BT's Successor Allison Kirkby CEO On 1 February - With current chief executive Philip Jansen stepping down at the end of the month, BT confirms February start for new boss. BT Group has confirmed the start date of its first female chief executive, who will lead the former UK telecoms incumbent from ...
1 year ago Silicon.co.uk
Unveiling the New Threats: Rhadamanthys v0.5.0 A Research Overview by Check Point Research - Key Insights: The Evolving Threat: The Rhadamanthys stealer, a multi-layered malware, is now available in its latest iteration, version 0.5.0, enhancing its capabilities and introducing new spying functions. Check Point Research's Expert Analysis: ...
1 year ago Blog.checkpoint.com
Microsoft Defender for Endpoint is Integrated with Check Point Horizon XDR/XPR - Microsoft Defender for Endpoint integrates with Check Point's extended detection and response solution - Horizon XDR/XPR. One-click integration connects the endpoint solution and telemetry is added to the XDR/XPR artificial intelligence driven data ...
1 year ago Blog.checkpoint.com
CRN Recognizes three Check Point Channel Stars in its 2024 Women of the Channel list - CRN has recognized Check Point's Head of Americas Channel Sales, Nisha Holt, for her outstanding achievements as one of the Women of the Channel Power 100. Rebecca James and Lauren Ventura have also earned a spot on the esteemed Women of the Channel ...
1 year ago Blog.checkpoint.com
Enhance your VPN Security Posture! - Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and attack vector into enterprises. Attackers are motivated to gain access to organizations over ...
1 year ago Blog.checkpoint.com
Check Point releases emergency fix for VPN zero-day exploited in attacks - Check Point has released hotfixes for a VPN zero-day vulnerability exploited in attacks to gain remote access to firewalls and attempt to breach corporate networks. On Monday, the company first warned about a spike in attacks targeting VPN devices, ...
1 year ago Bleepingcomputer.com CVE-2024-24919
Should You Shut Down Your Computer Every Night? - Although PCs benefit from an occasional reboot, it's not necessary to turn off your computer every night. The decision to let your computer sleep vs. shut down depends on considerations such as the device's age, your usage habits, and whether you ...
1 year ago Pandasecurity.com
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution - RansomLord: Open-source anti-ransomware exploit toolRansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. Attackers are probing Check Point Remote Access VPN devicesAttackers ...
1 year ago Helpnetsecurity.com CVE-2024-24919 CVE-2024-23108 CVE-2023-34992
Hackers target Check Point VPNs to breach enterprise networks - Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company warned in a Monday advisory. Remote Access is integrated into all Check Point network firewalls. It can be configured ...
1 year ago Bleepingcomputer.com
CVE-2018-0234 - A vulnerability in the implementation of Point-to-Point Tunneling Protocol (PPTP) functionality in Cisco Aironet 1810, 1830, and 1850 Series Access Points could allow an unauthenticated, remote attacker to cause an affected device to reload, ...
5 years ago
Empowering Women in Cybersecurity: Bridging the Gender Gap - On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue to be ...
1 year ago Blog.checkpoint.com
Raspberry Robin malware evolves with early access to Windows exploits - Recent versions of the Raspberry Robin malware are stealthier and implement one-day exploits that are deployed only on systems that are susceptible to them. One-day exploits refer to code that leverages a vulnerability that the developer of the ...
1 year ago Bleepingcomputer.com CVE-2023-36802 CVE-2023-29360
A High Fee Discovered for the Latest Dingo Cryptocurrency Token - Researchers at IT security company Check Point Security have identified Dingo Token as a potential scam after discovering a function that allows the project's owner to manipulate trading fees up to 99% of the transaction value. Check Point has ...
2 years ago Bleepingcomputer.com
Getting to Know: Royce Ho - I graduated from Singapore Management University with a double major in Information Systems and Information Security and Assurance. That was when my curiosity in cybersecurity was piqued, and the knowledge that I gained throughout my academic days ...
1 year ago Blog.checkpoint.com
Ongoing enterprise hacking campaign targets Check Point VPNs - Intrusions infiltrating enterprise networks through Check Point Remote Access VPN instances are underway, according to BleepingComputer. Attackers have conducted three attempts to compromise Check Point VPN solutions through old VPN local accounts ...
1 year ago Packetstormsecurity.com
Check Point warns of threat actors targeting VPNs - Check Point Software Technologies warned of attempted attacks against its VPNs by targeting accounts that use passwords as the only means of authentication. The warning came via a Monday blog post urging readers to improve their VPN security ...
1 year ago Techtarget.com
Check Point Acknowledges Data Breach, Claims Information is 'Old - While Check Point maintains the breach is contained and poses “no risk to Check Point customers,” security experts continue to question how the attackers initially gained access, the true extent of compromised data, and why there appears ...
2 months ago Cybersecuritynews.com CVE-2024-24919
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
1 year ago Techrepublic.com
OpenAI Launches Security Committee Amid Ongoing Criticism - The new committee comes in the wake of two key members of the Superalignment team - OpenAI co-founder Ilya Sutskever and AI researcher Jan Leike - left the company. The shutting down of the superalignment team and the departure of Sutskever and Leike ...
1 year ago Securityboulevard.com