Cybersecurity

Fifth-generation cyberattacks are here. How can the IT industry adapt?

Most businesses' security procedures remain second- or third-generation. Image: Getty Images/iStockphoto

Itai Greenberg

Vice-President, Product Management, Check Point

Share:

Our Impact
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale

Stay up to date:

Cybersecurity

Have you read?

Healthcare sector cyberattacks in 2020 Image: Check Point

Attacks targetting remote connection vulnerabilities Image: Check Point

Discover

What is the Forum doing to avert a cyber pandemic?

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:

CybersecurityCybercrimeFourth Industrial Revolution

Share:

Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

How to protect your company from cyber attack - the Global Cybersecurity Outlook at Davos 2022
About Us
Events
Media
Partners & Members
Language Editions

Privacy Policy & Terms of Service

© 2022 World Economic Forum