S07E01: CPX 2025 Recap
I talk about the highlights from CPX 2025 and include a mention to our upcoming Be Your Own TAC Part Deux session for EMEA and Americas on 27 March 2025!...
Learn about Cyber Security topics through brief, informal conversations with experts from Check Point. Topics include: Incident Response, Customer Success Stories, Cyber Security Trends and Technologies.
I talk about the highlights from CPX 2025 and include a mention to our upcoming Be Your Own TAC Part Deux session for EMEA and Americas on 27 March 2025!...
Some recent threads on CheckMates worth further discussion. Properly defining the Internet within a security policy, let's discuss! NAT Tip AnyDesk - on DHS Compliant version sk182752: Harmony Endpoint Client blocks AnyDesk vpnconfig alternative R81.20 High CPU being reported by Solarwinds and TOP sk101878: CPView Utility sk178566: Skyline Deployment sk92402: How to query utilization of individual CPU cores via SNMP 2M DNS Queries Per Day Single Domain Solution Introducing CheckMatesAI...
An excerpt of our No Suits No Ties session on recovering from a Ransomware outbreak .
An excerpt of our Infinity Identity TechTalk done back at the end of October.
An excerpt from our GenAI Security TechTalk from September. GenAI Security from Check Point Unveiling the Future of Network Security in the Era of AI
An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds , where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.
PhoneBoy talks about a paper written by Antoinette Hodes called Pay Now or Pay Later , understanding the costly consequences of neglecting OT/ICS Cybersecurity. https://www.checkpoint.com/solutions/iot-security/ https://www.industrialcybersecuritypulse.com/facilities/throwback-attack-an-insider-releases-265000-gallons-of-sewage-on-the-maroochy-shire/...
PhoneBoy talks about the new features and functionality in the R82 release for Quantum Security Gateways and Management . Now that R82 is out, how about an AI generated podcast about it? R82 Quantum Security Management Administration Guide: Self Managed Security Gateways Known Limitations for Scalable Platforms (Maestro Appliances, Chassis, and ElasticXL)...
An excerpt from a great TechTalk we did back in June on Threat Hunting with Memory Forensics given by Monnappa who also teaches Check Point's Threat Hunting Using Memory Forensics course....
NO SUITS, NO TIES aims to shed light on how Check Point MDR and Incident Response Analysts play a pivotal role in proactively identifying and responding to these threats when they are least expected. This is an an audio version of our first No Suits, No Ties session entitled Going Equipped To Compromise where we discuss real-world examples from real cases where ‘utilities’ were and are being used in compromise incidents. The session will cover: The type of tools being used and how they are lever...
PhoneBoy talks about some recent topics on the CheckMates community: DNS forwarding for Internal Domain Fun with Check Point Dynamic IP Gateways in R77.20 with Gaia How to create object for private cloud Kubernetes on SmartConsole How to read packet-captured file by fw monitor sk30583: What is FW Monitor? sk182438: R81.10.15 for Quantum Spark Appliances sk182467: Enterprise Endpoint Security E88.60 macOS Clients R81.20 Open Server Hardware Requirements MDS R81.20 on KVM, fresh install broken Dee...
In this episode, we'll discuss some new features in Harmony Endpoint as well as best practices for deployment. These are excerpts from recent TechTalks: Harmony Endpoint: Packing a Punch Mastering Endpoint Security...
In this episode, we discuss a handful of recent threads on CheckMates including: Adding multiple values using mgmt_cli Adding administrators via mgmt_cli CheckMates Live Canada: Management API Best Practices Interface Order on VMware Central management and certificate based VPNs Can I manually update AntiVirus and Antibot through cli iperf test speeds are different on internal and external for QoS testing SKs mentioned: sk69261: How to change interface naming on Open Servers running Gaia OS sk21...
In this episode, we talk about how Check Point has shifted the paradigm in Email Security. This is an except from our Paradigm Shift TechTalk back in May.
In this episode, we talk about how Check Point has shifted the paradigm in Cloud Security. This is an except from our Paradigm Shift TechTalk back in May.
PhoneBoy discuses some recent threads in the CheckMates Cyber Security Community: Traffic Generated by Load Tester is Dropped dmd_mgmt Process Using Several CPUs at 100% HTOP ALL CPU SND STUCK 100% Update SNX for Linux on Gateway Weird Behavior with CPNotEnoughDataForRuleMatch Referenced SKs: sk32578: SecureXL Mechanism sk178070: HyperFlow in R81.20 and higher sk178566: Skyline Deployment sk92402: How to query utilization of individual CPU cores via SNMP sk87522: Quantum Spark Appliances - How t...
In this episode, we provide an excerpt of our previous TechTalk on Harmony SASE where we include a case study where we were able to migrate a customer to Harmony SASE literally over a weekend!
In this episode, we provide an excerpt of our previous TechTalk on Infinity AI Copilot with focus around Quantum Security Gateway management use cases.
In this episode, we share some excerpts from our TechTalk on What's New in Quantum Spark back in March, provide information on the Early Availability of R81.10.15, and some Q&A around Quantum Spark appliances. What's New Quantum Spark 1900/2000 Appliances TechTalk: Video, Slides, and Q&A Join R81.10.15 Early Availability...
In this episode, we share some excerpts from a couple of recent sessions we did on Identity Awareness Best Practices. Identity Awareness TechTalk with Peter Elmer Identity Awareness Best Practices with PhoneBoy...
In this episode, PhoneBoy talks about CVE-2024-24919 and five ways generative AI will impact CISOs and cyber security teams . Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information Disclosure Preventative Hotfix for CVE-2024-24919 - Quantum Spark Gateways Infinity AI Copilot...
In this episode, PhoneBoy talks about how AI can be used for Threat Hunting. How AI turbocharges your threat hunting game 5 ways ChatGPT and LLMs can advance cyber security
In this episode, PhoneBoy talks about how organizations can be better prepared for the use of AI. Two Thirds of Organizations Are Not Prepared for AI Risks NIST’s AI Risk Management Framework ISACA’s new online courses Australia’s Artificial Intelligence Ethics Framework Principles for the security of machine learning Check Point’s whitepaper concerning the prevention of next generation threats through AI and innovation. Global Skill Development Council Generative AI in Risk and Compliance The I...
In this episode, PhoneBoy talks about cybersecurity then and now along with how AI can be leveraged to improve your security posture. Links: Check Point Software Rings the Opening Bell Hands on with Infinity AI Copilot TechTalk on CheckMates How AI Can Benefit Zero Trust...
Are open source projects really under siege ?
PhoneBoy talks about how XDR solutions should improve your cyber security posture, but not all do. XDR Researcher Turns XDR Software Into Perfect Malware What is XDR? Endpoint Security VPN configuration options are obscured in trac.config file Harmony Endpoint Sense of Urgency...
A brief overview of the product announcements made at CPX 2024. The materials are available on CheckMates: https://community.checkpoint.com/t5/General-Topics/CPX-2024/m-p/208174#M34494
Reviewing some of the top cyber security stories for 2023. Hope to see everyone at CPX 2024 !
In this episode, PhoneBoy talks about fraud and how to be resilient against it. 6 types of fraud to remain aware of (and other trends) 10 ways to reduce your risk of cyber fraud Quantum SASE
In this episode, PhoneBoy covers three stories: Kerberoasting attacks explained (and how to prevent them) 7 actionable security automation best practices 5 emerging malware threats, record-breaking malware activity...