Cloud, mobile deployments weakest links in enterprise networks: Report

Check Point Software Technologies Ltd., a cyber security solutions firm, in its third installment of the 2019 Security Report highlights how threat actors are increasingly targeting the weakest, least protected points in an organization’s IT infrastructure – their public cloud and mobile deployments.

The third report reveals the key cyber-attack trends used by criminals to target enterprise cloud and mobile estates during 2018. It also reveals enterprise IT and security teams’ key security concerns about these deployments. Highlights of the third installment include:

Read more

You may also like

Comments are closed.