Cybersecurity

Fifth-generation cyberattacks are here. How can the IT industry adapt?

Most businesses' security procedures remain second- or third-generation. Image: Getty Images/iStockphoto

Itai Greenberg

Vice-President, Product Management, Check Point

Share:

Our Impact
The Big Picture
Explore and monitor how Cybersecurity is affecting economies, industries and global issues
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale

Stay up to date:

Cybersecurity

Have you read?

Healthcare sector cyberattacks in 2020
Healthcare sector cyberattacks in 2020 Image: Check Point

Attacks targetting remote connection vulnerabilities
Attacks targetting remote connection vulnerabilities Image: Check Point

Discover

What is the Forum doing to avert a cyber pandemic?

Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:

CybersecurityCybercrimeFourth Industrial Revolution

Share:

Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

From stricter reporting rules to a new cyber threat hub, the EU is upgrading its cybersecurity law

Spencer Feingold and Filipe Beato

December 2, 2022

About Us
Events
Media
Partners & Members
Language Editions

Privacy Policy & Terms of Service

© 2022 World Economic Forum