If there was a hack, then there was a hacker – cyber threat analysis is a detective’s job, like an Agatha Christie novel. See how Check Point Research unravels cyber mysteries, what clues they look for and what tools they use to solve cases such as “Cyber on the Orient Express” and “Eye on the Nile”.
Related Posts
Gamification listing
PARTICIPATE NOW |
|
sponsors-RCA

Whitepapers
Tips: Top 6 Recommendations to Improve User Productivity with More Secure Network Edges
Security experts’ top recommendations for improving user productivity and securing the edge in a WFA …Download WhitepaperAccidental Convergence: Ultimate Guide To Secured IT/OT Operations
Key things you need to know about IT/OT convergenceDownload Whitepaper2022 Top Strategic Security Trends by Gartner: CSMA
All you need to know about Cybersecurity Mesh to attain a more defensive security postureDownload Whitepaper5 Keys to a Secure Work-From-Anywhere Solution
Here are 5 essential keys to securing work-from-anywhere for APAC organizationsDownload Whitepaper
More News
Case Studies
Transport industry a major cyber target: Indonesia acts to ramp up defenses
The country’s largest taxi operator turns to AI-driven cybersecurity upgrades to protect its critical national …Read morePhilippines payment platform hardens cloud application security infrastructure
This includes rooting out vulnerabilities in container images and serverless functions, cloud misconfigurations, and hidden …Read moreIndonesian transport firm puts cybersecurity first as it pivots to digital
With multiple payment gateways, apps and APIs in use nationwide, the fast-growth business recognizes the …Read moreFortinet’s zero-trust security boosts innovation development of automotive manufacturing industry
How automotive manufacturers can leverage the zero-trust approach to secure operational technology.Read more