Intelligent CISO Issue 38 | Page 10

Check Point Software names new VP of sales in EMEA ybersecurity solutions
C vendor , Check Point Software
67 % of enterprise environments still run protocol exploited by WannaCry and NotPetya
E and response , has released a security advisory about the prevalence of insecure protocols in enterprise IT environments .
news

Check Point Software names new VP of sales in EMEA ybersecurity solutions

C vendor , Check Point Software

Technologies , has appointed Thorsten Freitag as its new Vice President of Sales in EMEA , to lead the growth of its operations across this broad geography .
Freitag joined Check Point in 2020 as its VP of Sales for Europe . He has more than 30 years of experience in leading tech companies , during which time he has held senior executive positions in the areas of product , operations and sales .
Check Point Software is active in more than 50 countries in EMEA and works closely with thousands of partners and customers . The company employs over 750 employees in the region .
Dan Yerushalmi , COO , Check Point Software , said : “ We warmly welcome Thorsten to Check Point ’ s global sales management . Organisations all over EMEA are going through a rapid Digital Transformation , which requires the level of security provided by the Check Point Security Infinity architecture and our leading solutions . I am confident that Thorsten ’ s experience will catapult one of Check Point ’ s most important and growing markets .”
“ I am extremely excited to join Check Point and take a leading role in its important efforts to better secure the world ,” said Freitag .
“ Like never before , Digital Transformation presents enterprises with new and exciting opportunities that need to be secured . I am proud to have joined a global company , which provides the most comprehensive and advanced cybersecurity solutions .”

67 % of enterprise environments still run protocol exploited by WannaCry and NotPetya

xtraHop , a leader in cloud-native network detection

E and response , has released a security advisory about the prevalence of insecure protocols in enterprise IT environments .

The report details the ongoing use of deprecated and insecure protocols , including Server Message Block version one ( SMBv1 ), which was exploited by the WannaCry ransomware variant to encrypt nearly a quarter of a million machines worldwide four years ago . gives malicious actors access to sensitive personal and business data .
• NTLM : Despite the recommendation from Microsoft that organisations cease use of NTLM in favour of the much more secure Kerberos authentication protocol , NTLM is still quite common .
• HTTP : When plaintext credentials are transmitted over HTTP , those credentials are left exposed – the Internet equivalent of shouting passwords across a crowded room .
In early 2021 , the ExtraHop threat research team conducted primary research examining the prevalence of insecure protocols in enterprise environments , specifically SMBv1 , Link-Local Multicast Name Resolution ( LLMNR ), NT Lan Manager ( NTLMv1 ) and Hypertext Transfer Protocol ( HTTP ). The research uncovered alarming usage of these protocols that expose organisations and their customers to considerable risk .
• SMBv1 : This protocol has been exploited for attacks like WannaCry and NotPetya and can quickly spread malware to other unpatched servers across a network .
• LLMNR : LLMNR can be exploited to gain access to the user credential hashes . These credential hashes can be cracked to expose actual login information that
10 www . intelligentciso . com