Check Point CEO Announces Intention to Stand Down

Check Point CEO Gil Shwed has announced his intention to step down from his role after 30 years at the helm of the cybersecurity vendor.
Co-founded in 1993 by Shwed and Marius Nacht and Shlomo Kramer - who are no longer with the company - Check Point's initial technology was built on the concept of stateful inspection.
This became the foundation for the company's first core product, FireWall-1.
Check Point rolled out its software blade architecture in 2009, and executed a series of acquisitions including security service edge vendor Perimeter 81 in 2023.


This Cyber News was published on www.darkreading.com. Publication date: Tue, 06 Feb 2024 16:20:20 +0000


Cyber News related to Check Point CEO Announces Intention to Stand Down

Check Point CEO Announces Intention to Stand Down - Check Point CEO Gil Shwed has announced his intention to step down from his role after 30 years at the helm of the cybersecurity vendor. Co-founded in 1993 by Shwed and Marius Nacht and Shlomo Kramer - who are no longer with the company - Check ...
5 months ago Darkreading.com
GigaOm's Cloud Network Security Radar Ranks Check Point as the Industry Leader - This article introduces GigaOm's inaugural Radar for Cloud Network Security and explains why Check Point was ranked as the Leader as well as a Fast Mover. Firstly, it is the cloudified version of Check Point's on-premises network security, from which ...
6 months ago Blog.checkpoint.com
Check Point Supercharges Brisbane Catholic Education's Security Stack to Improve Threat Detection and Streamline Manageability - Brisbane Catholic Education is a learning community comprising more than 140 schools that deliver quality learning outcomes to 77,000 prep-to-year-12 students. BCE's education and administrative workflows are powered by a large and distributed hybrid ...
2 months ago Blog.checkpoint.com
Mimecast Announces New CEO - PRESS RELEASE. LEXINGTON, Mass., January 16, 2024 - Mimecast Limited, an advanced email and collaboration security company, announced today the appointment of Marc van Zadelhoff as CEO, with Mimecast Co-Founder and current CEO Peter Bauer remaining a ...
5 months ago Darkreading.com
Check Point VPN zero-day exploited in attacks since April 30 - Threat actors have been exploiting a high-severity Check Point Remote Access VPN zero-day since at least April 30, stealing Active Directory data needed to move laterally through the victims' networks in successful attacks. Check Point warned ...
1 month ago Bleepingcomputer.com
OpenAI ousted CEO Sam Altman, but is reportedly reconsidering the move - Shortly before the one-year mark of ChatGPT being unveiled, on Friday, OpenAI revealed in a blog post that Sam Altman is departing his role as CEO and leaving his position on the board of directors due to a lack of confidence in his leadership ...
7 months ago Zdnet.com
BT's Successor Allison Kirkby CEO On 1 February - With current chief executive Philip Jansen stepping down at the end of the month, BT confirms February start for new boss. BT Group has confirmed the start date of its first female chief executive, who will lead the former UK telecoms incumbent from ...
5 months ago Silicon.co.uk
Unveiling the New Threats: Rhadamanthys v0.5.0 A Research Overview by Check Point Research - Key Insights: The Evolving Threat: The Rhadamanthys stealer, a multi-layered malware, is now available in its latest iteration, version 0.5.0, enhancing its capabilities and introducing new spying functions. Check Point Research's Expert Analysis: ...
6 months ago Blog.checkpoint.com
Microsoft Defender for Endpoint is Integrated with Check Point Horizon XDR/XPR - Microsoft Defender for Endpoint integrates with Check Point's extended detection and response solution - Horizon XDR/XPR. One-click integration connects the endpoint solution and telemetry is added to the XDR/XPR artificial intelligence driven data ...
6 months ago Blog.checkpoint.com
CRN Recognizes three Check Point Channel Stars in its 2024 Women of the Channel list - CRN has recognized Check Point's Head of Americas Channel Sales, Nisha Holt, for her outstanding achievements as one of the Women of the Channel Power 100. Rebecca James and Lauren Ventura have also earned a spot on the esteemed Women of the Channel ...
1 month ago Blog.checkpoint.com
Enhance your VPN Security Posture! - Over the past few months, we have observed increased interest of malicious groups in leveraging remote-access VPN environments as an entry point and attack vector into enterprises. Attackers are motivated to gain access to organizations over ...
1 month ago Blog.checkpoint.com
Check Point releases emergency fix for VPN zero-day exploited in attacks - Check Point has released hotfixes for a VPN zero-day vulnerability exploited in attacks to gain remote access to firewalls and attempt to breach corporate networks. On Monday, the company first warned about a spike in attacks targeting VPN devices, ...
1 month ago Bleepingcomputer.com
Should You Shut Down Your Computer Every Night? - Although PCs benefit from an occasional reboot, it's not necessary to turn off your computer every night. The decision to let your computer sleep vs. shut down depends on considerations such as the device's age, your usage habits, and whether you ...
5 months ago Pandasecurity.com
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution - RansomLord: Open-source anti-ransomware exploit toolRansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. Attackers are probing Check Point Remote Access VPN devicesAttackers ...
1 month ago Helpnetsecurity.com
Hackers target Check Point VPNs to breach enterprise networks - Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company warned in a Monday advisory. Remote Access is integrated into all Check Point network firewalls. It can be configured ...
1 month ago Bleepingcomputer.com
CVE-2018-0234 - A vulnerability in the implementation of Point-to-Point Tunneling Protocol (PPTP) functionality in Cisco Aironet 1810, 1830, and 1850 Series Access Points could allow an unauthenticated, remote attacker to cause an affected device to reload, ...
4 years ago
Empowering Women in Cybersecurity: Bridging the Gender Gap - On the occasion of the International Day of Women and Girls in Science, it is crucial to address the gender disparity that still persists in the cybersecurity sector. While the field has seen significant growth over the years, women continue to be ...
4 months ago Blog.checkpoint.com
Raspberry Robin malware evolves with early access to Windows exploits - Recent versions of the Raspberry Robin malware are stealthier and implement one-day exploits that are deployed only on systems that are susceptible to them. One-day exploits refer to code that leverages a vulnerability that the developer of the ...
4 months ago Bleepingcomputer.com
A High Fee Discovered for the Latest Dingo Cryptocurrency Token - Researchers at IT security company Check Point Security have identified Dingo Token as a potential scam after discovering a function that allows the project's owner to manipulate trading fees up to 99% of the transaction value. Check Point has ...
1 year ago Bleepingcomputer.com
Getting to Know: Royce Ho - I graduated from Singapore Management University with a double major in Information Systems and Information Security and Assurance. That was when my curiosity in cybersecurity was piqued, and the knowledge that I gained throughout my academic days ...
6 months ago Blog.checkpoint.com
Ongoing enterprise hacking campaign targets Check Point VPNs - Intrusions infiltrating enterprise networks through Check Point Remote Access VPN instances are underway, according to BleepingComputer. Attackers have conducted three attempts to compromise Check Point VPN solutions through old VPN local accounts ...
1 month ago Packetstormsecurity.com
Check Point warns of threat actors targeting VPNs - Check Point Software Technologies warned of attempted attacks against its VPNs by targeting accounts that use passwords as the only means of authentication. The warning came via a Monday blog post urging readers to improve their VPN security ...
1 month ago Techtarget.com
Spear Phishing vs Phishing: What Are The Main Differences? - Almost half of them used phishing to obtain the passwords of users. Highly targeted phishing campaigns against specific individuals or types of individuals are known as spear phishing. It's important to be able to spot phishing in general. For ...
5 months ago Techrepublic.com
OpenAI Launches Security Committee Amid Ongoing Criticism - The new committee comes in the wake of two key members of the Superalignment team - OpenAI co-founder Ilya Sutskever and AI researcher Jan Leike - left the company. The shutting down of the superalignment team and the departure of Sutskever and Leike ...
1 month ago Securityboulevard.com
New Relic CEO sets observability strategy for the AI age - The executive that replaced Gary Steele as CEO at Proofpoint when Steele left for Splunk has now followed Steele's path from cybersecurity to the helm of an observability company. Ashan Willy was appointed CEO at New Relic in December, a month after ...
1 week ago Techtarget.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)