Check Point Software today announced a Secure AI Advisory Service, a new service designed to help enterprises accelerate AI adoption with governance, risk management and regulatory compliance embedded from the start.
AI is moving from experimentation to core business infrastructure. Yet in many organizations, deployment is outpacing oversight. Boards and executive teams are facing increased regulatory scrutiny, operational risk and accountability gaps as AI systems expand across hybrid networks, cloud environments and digital workspaces. Secure AI Advisory provides a structured, intelligence-driven framework to bring clarity and control to AI transformation. The service embeds governance, risk assessment and regulatory alignment across the full AI lifecycle, enabling measurable risk reduction and responsible scaling from day one.
This new service is part of the CPR Act, Check Point’s Cyber Resilience and Response unit, which delivers AI governance with global threat intelligence to provide actionable guidance. Unlike one-off assessments or standalone consulting, CPR Act integrates AI governance into the security lifecycle, connecting intelligence, readiness, detection, and response. This ensures controls and monitoring to adapt to new AI risks, regulations, and threats, offering organizations a single accountable partner from strategy through execution.
Enterprises require more than policy guidance. They need operational frameworks that align innovation with accountability and risk transparency. Secure AI Advisory delivers:
- AI governance frameworks aligned to business strategy
- AI risk and impact assessments with prioritized mitigation roadmaps
- Regulatory readiness aligned to EU AI Act, GDPR, ISO 42001 and NIST AI RMF
- Executive and practitioner enablement to operationalize controls
The service is available in three tiers, Essential, Enhanced and Total, supporting organizations at every stage of AI maturity. All tiers include access to Check Point’s interactive AI Risk and Compliance Dashboard for continuous visibility and structured oversight.
Secure AI Advisory complements Check Point’s prevention-first security architecture, supporting secure AI adoption across Hybrid Mesh Network Security, Workspace Security, Exposure Management and AI Security. This integrated approach enables organizations to govern AI consistently across multivendor and hybrid environments without adding operational complexity.
By combining vendor agnostic advisory with intelligence-led insight, Check Point helps enterprises transform AI from a source of uncertainty into a controlled driver of growth. Secure AI Advisory reinforces Check Point’s commitment to securing the AI transformation. By embedding governance, risk management and compliance into AI strategy at the outset, organizations can accelerate innovation while protecting resilience, reputation and shareholder value.

Iran–US Escalation Heightens Risk to Industrial Systems: CloudSEK
Posted in Commentary with tags CloudSEK on March 5, 2026 by itnerdCloudSEK today released a threat landscape assessment warning that more than 60 hacker groups mobilised within hours of the February 28, 2026 Iran–US military escalation — and that tens of thousands of US industrial control systems remain directly reachable from the internet, many with no authentication beyond a factory-default password.
The report, “A Threat Actor Landscape Assessment of ICS/OT Targeting in the 2026 Iran–US Conflict,” identifies a two-tier threat ecosystem: nation-state APTs pre-positioned inside US networks for years, and a fast-expanding pool of state-backed hacktivist proxies that need nothing more than an exposed device and a motivation to cause national-headline disruption.
CloudSEK’s report finds that the industrial attack surface remains exposed at scale. In the United States alone, researchers identified approximately 182.2K internet-exposed industrial and automation-related assets (including both live and historically observed systems). Many of these were found to be actively reachable and exposed without authentication.
The exposure is not limited to the U.S.: Israel recorded around 104.9K such assets, while the United Kingdom showed roughly 88.8K exposed assets. CloudSEK notes that these listings represent industrial or automation-related devices observed on the public internet, underscoring the scale of potential targeting during periods of geopolitical escalation.
Key highlights from the report
Why default access and exposed interfaces remain a critical risk
CloudSEK’s assessment notes that many industrial environments remain vulnerable because exposed devices and interfaces can be identified quickly through standard internet scanning. In such cases, attackers may not need to exploit software vulnerabilities — they only need to find an exposed system and gain access using weak or default authentication.
This dynamic becomes more dangerous during periods of escalation, when some actors prioritise visibility and disruption over stealth.
Recommended actions for operators and defenders
CloudSEK urges critical infrastructure owners and operators to prioritise immediate, practical defensive measures:
Leave a comment »