Podcast by Check Point CheckMates
Some recent discussions on the CheckMates community:IKEv2 Benefitssk166415Harmony Email and Collaboration and Microsoft DirectSendShow NAT Tablesfwxalloc top usersfw up_executeMaestro Masters Architectures and Optimizationhttps://community.checkpoint.com/t5/Maestro/Maestro-Q-amp-A-R82-Highlights-and-Common-Questions/td-p/247980Check Point Quantum Management MCP Server
Professional Services Consultant Lari Luoma gives an introduction to Maestro and how it is different from ElasticXL, launched as part of the R82 release.Quantum Maestro Introduction sessionQuantum Maestro Architectures and Optimization sessionJoin us for Maestro Migration and Upgrade Best Practices on June 3rd: EMEA, AMER
Product Manager Amit Navon discusses discusses the four ways Check Point provides a hybrid SASE solution.
Product Manager Bar Yassure discusses what we did to improve performance and stability in the E88.70 release of Harmony Endpoint.
A talk given by Morten Sørensen on Network Segmentation at CPX 2025 in Vienna.
An except from Tim Hall's Be Your Own TAC Part Deux session on User-Space Performance Pack (UPPAK) for Quantum Security Gateways.
An excerpt from a session with Danny Jung, Cyber Security Evangelist at SITS Group at CPX 2025 Vienna: Maestro for Everyone!
I talk about the highlights from CPX 2025 and include a mention to our upcoming Be Your Own TAC Part Deux session for EMEA and Americas on 27 March 2025!
Some recent threads on CheckMates worth further discussion.Properly defining the Internet within a security policy, let's discuss!NAT TipAnyDesk - on DHS Compliant versionsk182752: Harmony Endpoint Client blocks AnyDeskvpnconfig alternativeR81.20 High CPU being reported by Solarwinds and TOPsk101878: CPView Utilitysk178566: Skyline Deploymentsk92402: How to query utilization of individual CPU cores via SNMP2M DNS Queries Per DaySingle Domain SolutionIntroducing CheckMatesAI
An excerpt of our No Suits No Ties session on recovering from a Ransomware outbreak.
An excerpt of our Infinity Identity TechTalk done back at the end of October.
An excerpt from our GenAI Security TechTalk from September.GenAI Security from Check PointUnveiling the Future of Network Security in the Era of AI
An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.
PhoneBoy talks about a paper written by Antoinette Hodes called Pay Now or Pay Later, understanding the costly consequences of neglecting OT/ICS Cybersecurity.https://www.checkpoint.com/solutions/iot-security/https://www.industrialcybersecuritypulse.com/facilities/throwback-attack-an-insider-releases-265000-gallons-of-sewage-on-the-maroochy-shire/
PhoneBoy talks about the new features and functionality in the R82 release for Quantum Security Gateways and Management.Now that R82 is out, how about an AI generated podcast about it?R82 Quantum Security Management Administration Guide: Self Managed Security GatewaysKnown Limitations for Scalable Platforms (Maestro Appliances, Chassis, and ElasticXL)
An excerpt from a great TechTalk we did back in June on Threat Hunting with Memory Forensics given by Monnappa who also teaches Check Point's Threat Hunting Using Memory Forensics course.
NO SUITS, NO TIES aims to shed light on how Check Point MDR and Incident Response Analysts play a pivotal role in proactively identifying and responding to these threats when they are least expected.This is an an audio version of our first No Suits, No Ties session entitled Going Equipped To Compromise where we discuss real-world examples from real cases where ‘utilities' were and are being used in compromise incidents.The session will cover:The type of tools being used and how they are leveragedHow to interpret detection events when these tools are deployedHow much time you might have to respond once the first event is seenWhat visibility may be lost when ‘killer' or ‘disruption' tools are usedWhat response and containment activities to focus on where these tools have been observed
PhoneBoy talks about some recent topics on the CheckMates community:DNS forwarding for Internal DomainFun with Check Point Dynamic IP Gateways in R77.20 with GaiaHow to create object for private cloud Kubernetes on SmartConsoleHow to read packet-captured file by fw monitorsk30583: What is FW Monitor?sk182438: R81.10.15 for Quantum Spark Appliancessk182467: Enterprise Endpoint Security E88.60 macOS ClientsR81.20 Open Server Hardware RequirementsMDS R81.20 on KVM, fresh install brokenDeep Dive on the latest R82 TLS Inspection Enhancements! - Recording & Q&A
In this episode, we'll discuss some new features in Harmony Endpoint as well as best practices for deployment. These are excerpts from recent TechTalks:Harmony Endpoint: Packing a PunchMastering Endpoint Security
In this episode, we discuss a handful of recent threads on CheckMates including:Adding multiple values using mgmt_cliAdding administrators via mgmt_cliCheckMates Live Canada: Management API Best PracticesInterface Order on VMwareCentral management and certificate based VPNsCan I manually update AntiVirus and Antibot through cliiperf test speeds are different on internal and external for QoS testingSKs mentioned:sk69261: How to change interface naming on Open Servers running Gaia OSsk21156: How to disable CRL validation when authenticating a VPN with certificatessk26628: Command to erase all Certificate Revocation Lists (CRL) from cachesk116340: Security Gateway tries to fetch CRL even though CRL is distributed over IKEsk143972: How to trigger an update for Application Control / Anti-Virus /Anti-Bot / IPSsk105179: How to clear Anti-Virus and Anti-Bot kernel cache
In this episode, we talk about how Check Point has shifted the paradigm in Email Security. This is an except from our Paradigm Shift TechTalk back in May.
In this episode, we talk about how Check Point has shifted the paradigm in Cloud Security. This is an except from our Paradigm Shift TechTalk back in May.
PhoneBoy discuses some recent threads in the CheckMates Cyber Security Community:Traffic Generated by Load Tester is Droppeddmd_mgmt Process Using Several CPUs at 100%HTOP ALL CPU SND STUCK 100%Update SNX for Linux on GatewayWeird Behavior with CPNotEnoughDataForRuleMatchReferenced SKs:sk32578: SecureXL Mechanismsk178070: HyperFlow in R81.20 and highersk178566: Skyline Deploymentsk92402: How to query utilization of individual CPU cores via SNMPsk87522: Quantum Spark Appliances - How to connect to the office using the SSL VPN (SSL Network Extender)?Documentation References:SSL Network Extender Administration Guide: Getting Started with SSL Network ExtenderR81.20 Mobile Access Administration Guide: The Legacy Mobile Access PortalWant to see more episodes like this? Leave a comment on CheckMates on the thread for this episode: S06E12: Recently on CheckMates
In this episode, we provide an excerpt of our previous TechTalk on Harmony SASE where we include a case study where we were able to migrate a customer to Harmony SASE literally over a weekend!
In this episode, we provide an excerpt of our previous TechTalk on Infinity AI Copilot with focus around Quantum Security Gateway management use cases.
In this episode, we share some excerpts from our TechTalk on What's New in Quantum Spark back in March, provide information on the Early Availability of R81.10.15, and some Q&A around Quantum Spark appliances.What's New Quantum Spark 1900/2000 Appliances TechTalk: Video, Slides, and Q&AJoin R81.10.15 Early Availability
In this episode, we share some excerpts from a couple of recent sessions we did on Identity Awareness Best Practices.Identity Awareness TechTalk with Peter ElmerIdentity Awareness Best Practices with PhoneBoy
In this episode, PhoneBoy talks about CVE-2024-24919 and five ways generative AI will impact CISOs and cyber security teams.Preventative Hotfix for CVE-2024-24919 - Quantum Gateway Information DisclosurePreventative Hotfix for CVE-2024-24919 - Quantum Spark GatewaysInfinity AI Copilot
In this episode, PhoneBoy talks about how AI can be used for Threat Hunting.How AI turbocharges your threat hunting game5 ways ChatGPT and LLMs can advance cyber security
In this episode, PhoneBoy talks about how organizations can be better prepared for the use of AI.Two Thirds of Organizations Are Not Prepared for AI RisksNIST's AI Risk Management FrameworkISACA's new online coursesAustralia's Artificial Intelligence Ethics FrameworkPrinciples for the security of machine learningCheck Point's whitepaper concerning the prevention of next generation threats through AI and innovation.Global Skill Development Council Generative AI in Risk and ComplianceThe International Association of Privacy Professionals AI governance trainingThe SANS Institute offers an AI Security Essentials for Business Leaders
In this episode, PhoneBoy talks about cybersecurity then and now along with how AI can be leveraged to improve your security posture.Links:Check Point Software Rings the Opening BellHands on with Infinity AI Copilot TechTalk on CheckMatesHow AI Can Benefit Zero Trust
PhoneBoy talks about how XDR solutions should improve your cyber security posture, but not all do.XDR Researcher Turns XDR Software Into Perfect MalwareWhat is XDR?Endpoint Security VPN configuration options are obscured in trac.config fileHarmony EndpointSense of Urgency
A brief overview of the product announcements made at CPX 2024. The materials are available on CheckMates: https://community.checkpoint.com/t5/General-Topics/CPX-2024/m-p/208174#M34494
Reviewing some of the top cyber security stories for 2023. Hope to see everyone at CPX 2024!
In this episode, PhoneBoy talks about fraud and how to be resilient against it.6 types of fraud to remain aware of (and other trends)10 ways to reduce your risk of cyber fraudQuantum SASE
In this episode, PhoneBoy covers three stories:Kerberoasting attacks explained (and how to prevent them)7 actionable security automation best practices5 emerging malware threats, record-breaking malware activity
In this episode, PhoneBoy talks about the challenges with ensuring security with open-source software, which is in many products and services you use today.
In this episode, PhoneBoy talks with Aaron Brongersma about his exploration of AI tools, the issues with data residency and AI, the societal issues with AI, AI as a Service, and a few words about Quantum SASE.
Some questions and answers around Blockchain Security from our TechTalk on Blockchain Security.
PhoneBoy talks to Adam Gray, CTO of Novacoast about how ChatGPT is used by threat actors to compromise systems, the GPT-4 System Card, where ChatGPT seems to be useful in general with respect to cyber security, ChatGPT writing legal briefs, what early search engines and ChatGPT have in common, and how the more some things change, the more they stay the same.
A discussion between Check Point's Chief Strategy Officer Itai Greenberg and Idan Levin, Partner at Collider Ventures about the security trends related to blockchain security.
In this episode, PhoneBoy talks to Adam Gray, CTO of Novacoast to discuss some of what he's seen as part of their MSSP operations, including Living off the Land attacks, how AI is being actively used to exploit vulnerabilities, mobile security, CIS Controls, browser extensions, the data modern cars collect and share, password managers being a source of compromise, biometrics, why organizations use MSSPs like Pillr, automation and orchestration, vulnerability management, and Windows XP still being in use.
In this episode, I talk about how over-provisioning identities in the cloud leads to "shadow access" by malicious actors...and what you can do about it.Eight Key Success Factors for Cloud-Native Application Protection (CNAPP)CloudGuard Cloud Native Application Protection Platform
In this episode, PhoneBoy talks about some of the more rogue uses of GPT-like tools.ChatGPT generates 'convincing' fake scientific article'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark WebThe WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated attacksLowering the Bar(d)? Check Point Research's security analysis spurs concerns over Google Bard's limitations
In this episode, PhoneBoy talks with Aaron Brongersma about the challenges of ensuring your code is secure, particularly when people who traditionally haven't written code are having to do so to leverage certain technologies like ChatGPT.VSCode Security: Malicious Extensions Detected- More Than 45,000 Downloads- PII Exposed, and Backdoors Enabled
Ralph Bonnell did a great session on DNS as a CheckMates TechTalk. You can access the materials (including some Q&A) here.
In this episode, PhoneBoy covers a few recent stories related to the legal and cybersecurity issues related to generative AIs such as ChatGPT.Highly effective responses to the alarming democratization of AIBreaking GPT-4 Bad: Check Point Research Exposes How Security Boundaries Can Be Breached as Machines Wrestle with Inner ConflictsAuthors Accuse OpenAI of Using Pirate Sites to Train ChatGPT
Cyber Security Evangelist Ashwin Ram talks about ChatGPT in the context of Artificial Intelligence and the Evolving Threat Landscape.Full TechTalk: https://community.checkpoint.com/t5/General-Topics/AI-and-the-Evolving-Threat-Landscape-TechTalk-Video-Slides-and-Q/m-p/181992/highlight/true#M30319
Another series of headlines from our friends at CyberTalk.orgWhat is purple teaming and why is it useful?One easy way to secure your Android6 simple & straightforward Cyber Monday fraud prevention tipsCanada advances cyber security via Indo-Pacific Strategy
Second in a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We discuss some of his tips in this episode.The book I mentioned in this section: Building Internet Firewalls 2nd Edition.