Podcasts about check point software technologies

Israeli security company

  • 75PODCASTS
  • 106EPISODES
  • 30mAVG DURATION
  • 1MONTHLY NEW EPISODE
  • Mar 6, 2025LATEST
check point software technologies

POPULARITY

20172018201920202021202220232024


Best podcasts about check point software technologies

Latest podcast episodes about check point software technologies

Podcasty Aktuality.sk
SHARE: Na diaľku im dokázali vypnúť auto. Pozor na IoT zariadenia

Podcasty Aktuality.sk

Play Episode Listen Later Mar 6, 2025 39:15


V domácnostiach i firmách máme čoraz viac zariadení, o ktorých si ani nemusíme uvedomovať, že sa pripájajú na internet. Práve preto môžu predstavovať bránu pre potenciálnych útočníkov. Súhrnne sa týmto zariadeniam hovorí aj internet vecí či skrátene IoT.Prečo práve tento segment môže predstavovať obzvlášť nebezpečnú zraniteľnosť? Sú vôbec spôsoby, ako sa efektívne brániť, alebo jednoducho treba počítať s tým, že nejaké slabšie ohnivko sa vždy nakoniec nájde? A ako sa pripraviť na budúcnosť, v ktorej bude na internet pripojené prakticky všetko?Na tieto a ďalšie otázky odpovedajú v najnovšom špeciálnom podcaste SHARE o kybernetickej bezpečnosti vedúci bezpečnostný inžinier Check Point Technologies Tomáš Vobruba a konzultant pre kyberbezpečnosť kritickej infraštruktúry Accura Martin Fábry.V podcaste hovoríme o týchto témach:Prečo sa o IoT hovorí ako o samostatnej kategórií zariadení.Ktoré takéto zariadenia najčastejšie bývajú terčom útokov.Ako v USA hackli robotické vysávače.Či vie útočník na diaľku vypnúť moderné auto.Ako sa pripraviť na budúcnosť, kde budú IoT aj humanoidné roboty a niekto ich hackne.Podcast vznikol v spolupráci so spoločnosťou Check Point Software Technologies.Viac na - https://zive.aktuality.sk/clanok/RaQz4it/na-dialku-im-dokazali-vypnut-auto-ci-ovladat-vysavac-internet-veci-robi-aj-z-beznych-veci-terce-podcast/

The Money Show
Record-Breaking $1.5 Billion Crypto Heist: Expert Insights on the Breach

The Money Show

Play Episode Listen Later Feb 24, 2025 75:28


Stephen Grootes speaks to Hendrik de Bruin, Head of SADC Security Consulting at Check Point Software Technologies, about the record-breaking $1.5 billion crypto heist, where hackers breached an offline Ethereum wallet, and what this means for the future of crypto security. In other interviews, Ervin Tu, President and Chief Investment Officer at Prosus Group, talks about the company's massive R79 billion acquisition of Netherlands-based food delivery giant Just Eat.See omnystudio.com/listener for privacy information.

The Best of the Money Show
$1.5-billion crypto heist - largest by hackers to date

The Best of the Money Show

Play Episode Listen Later Feb 24, 2025 7:13


Stephen Grootes speaks to Hendrik de Bruin, Head of SADC Security Consulting at Check Point Software Technologies, about the record-breaking $1.5 billion crypto heist, where hackers breached an offline Ethereum wallet, and what this means for the future of crypto security.See omnystudio.com/listener for privacy information.

Leap Academy with Ilana Golan
Gil Shwed: Building Check Point into a $20B Empire and Defining the Future of Cybersecurity

Leap Academy with Ilana Golan

Play Episode Listen Later Feb 20, 2025 57:23


Gil Shwed built Check Point into a $20 billion cybersecurity giant, but it all began with a flaw he spotted as a programmer in the Israeli military. Tasked with connecting classified networks, he uncovered a vulnerability, and the idea for a firewall was born. A few years later, he launched Check Point, betting on internet security before the web even existed. At 26 years old, he took the company public despite his doubts. Three decades later, he stepped down as CEO, having reshaped cybersecurity forever. In this episode, Gil joins Ilana to share how he built a problem-solving mindset, landed game-changing deals, scaled a startup from nothing, and led a multibillion-dollar company for 30 years. Gil Shwed is the co-founder and Executive Chairman of Check Point Software Technologies, one of Israel's largest tech companies and the world's top cybersecurity firm. He was the CEO for 30 years, the longest of any CEO on Nasdaq, and still helps guide the company today. In this episode, Ilana and Gil will discuss: (00:00) Introduction  (01:32) Early Programming Passion (02:17) Gaining Problem-Solving Skills in the Military (06:25) The Security Flaw That Inspired Check Point (07:45) How Early Jobs Shaped His Path to Check Point (12:26) Realizing the Need for Firewalls Ahead of Time (15:12) Raising Capital Without VC Funding (17:47) Convincing Companies to Adopt Firewalls (21:06) Closing a $1M Deal After 100 Days of Hustle (28:34) Why Gil Reluctantly Took Check Point Public (33:03) The Secret to His Leadership Success (36:03) Navigating Market Changes and Stress (41:08) How Gil Stays Ahead in Business (44:05) Stepping Down as CEO After 30 Years (49:00) Minimizing Risks in Business (52:13) Building a Startup That Lasts Gil Shwed is the co-founder and Executive Chairman of Check Point Software Technologies, one of Israel's largest tech companies and the world's top cybersecurity firm. He saw early on how important cybersecurity would be as the world became more connected, helping Check Point grow into a leader in the industry. Gil was the CEO for 30 years, the longest of any CEO on Nasdaq, and still helps guide the company today. Connect with Gil: Gil's Website: https://www.checkpoint.com/  Leap Academy: Ready to make the LEAP in your career? There is a NEW way for professionals to Advance Their Careers & Make 5-6 figures of EXTRA INCOME in Record Time. Check out our free training today at leapacademy.com/training

Defence Connect Podcast
CYBER UNCUT: Cyber attacks increased year on year in 2024 and the latest in cyber security news

Defence Connect Podcast

Play Episode Listen Later Jan 20, 2025 26:54


In this episode of the Cyber Uncut podcast, hosts David Hollingworth and Daniel Croft take yet another look back at a year of cyber incidents and talk about how 2024 saw incidents rise by almost half again. The pair also look at a hacktivist group targeting Australian websites, the still ongoing UnitedHealth saga, a dangerous hacking that may be on the horizon, and the latest in ransomware attacks on Australian organisations. Hollingworth and Croft kick off the chat with Check Point Software Technologies' look back at the year that was, with 2024 seeing 44 per cent more cyber incidents than the previous year. The pair talk about how that matches their expectations, from nation-state actors to hacktivists and, of course, ransomware and cyber crime. Croft then goes into his own investigations into the RipperSec hacktivist group, while Hollingworth looks into vulnerabilities impacting a popular firewall device that has been extensively exploited in the past and could well be about to be hacked en masse again. Finally, Croft looks at the latest chapter in the UnitedHealth hack from last year and some rather disturbing allegations that the giant insurance company is not entirely being above board with its reporting. The pair then look back at the week that just passed and the nearly half-dozen ransomware attacks targeting organisations in the ANZ region. It's been a busy start to the year. Enjoy the podcast, The Cyber Uncut team

Cyber Security Uncut
Cyber attacks increased year on year in 2024 and the latest in cyber security news

Cyber Security Uncut

Play Episode Listen Later Jan 17, 2025 26:54


In this episode of the Cyber Uncut podcast, hosts David Hollingworth and Daniel Croft take yet another look back at a year of cyber incidents and talk about how 2024 saw incidents rise by almost half again. The pair also look at a hacktivist group targeting Australian websites, the still ongoing UnitedHealth saga, a dangerous hacking that may be on the horizon, and the latest in ransomware attacks on Australian organisations. Hollingworth and Croft kick off the chat with Check Point Software Technologies' look back at the year that was, with 2024 seeing 44 per cent more cyber incidents than the previous year. The pair talk about how that matches their expectations, from nation-state actors to hacktivists and, of course, ransomware and cyber crime. Croft then goes into his own investigations into the RipperSec hacktivist group, while Hollingworth looks into vulnerabilities impacting a popular firewall device that has been extensively exploited in the past and could well be about to be hacked en masse again. Finally, Croft looks at the latest chapter in the UnitedHealth hack from last year and some rather disturbing allegations that the giant insurance company is not entirely being above board with its reporting. The pair then look back at the week that just passed and the nearly half-dozen ransomware attacks targeting organisations in the ANZ region. It's been a busy start to the year. Enjoy the podcast, The Cyber Uncut team

Business Day Spotlight
Cyber threats costing SA economy, Check Point says

Business Day Spotlight

Play Episode Listen Later Dec 9, 2024 22:43


The impact and cost of cyber attacks on SA's economy is the focus of this edition of Business Day Spotlight. Host Mudiwa Gavaza is joined byHendrik de Bruin, head of SADC security consulting at Check Point Software Technologies. Through the discussion, the expert outlines his firm's latest findings on the economic impact of cyber attacks; ways in which attacks are taking places; and measures to reduce the risk. Business Day Spotlight is a MultimediaLIVE Production.

Hradec Králové
Zprávy pro Královéhradecký kraj: Hackeři stále víc útočí na české instituce. S kyberútokem se musela vypořádat i radnice v Borohrádku

Hradec Králové

Play Episode Listen Later Nov 13, 2024 2:09


V Česku přibývá kybernetických útoků, letos jich může být až 100 tisíc. Ukazují to data americko-izraelské IT skupiny Check Point Software Technologies. Jednomu takovému útoku čelil nedávno také Městský úřad v Borohrádku. Provoz radnice to úplně ochromilo na několik dní. Teď už si ale obyvatelé města znovu můžou vyřídit veškerou agendu.

Total Information AM
Cyberattacks up 75% in the last year

Total Information AM

Play Episode Listen Later Oct 21, 2024 9:12


Aaron Rose, Security Architect Manager at Check Point Software Technologies joins Megan and Tom to talk about drastic increase of cyberattacks in the last year

Screaming in the Cloud
Battling Back Against Data Breaches with Maya Levine

Screaming in the Cloud

Play Episode Listen Later Aug 27, 2024 33:19


Data breaches can throw countless lives into disarray. With massive leaks and compromises happening on what feels like a daily basis, what can be done to protect people and services? On this episode, Sysdig Product Manager Maya Levine joins us for a discussion on the current state of affairs in the world of cybersecurity. Why do these attacks keep happening? Are they becoming too frequent? What can we do to prevent them? Maya has all the answers as well as tips to help keep you and your organization safe.Show Highlights:(0:00) Intro(0:37) Sysdig sponsor read(0:58) Product management at Sysdig(2:09) Are cyber attacks becoming more frequent in the cloud?(5:58) Urgency (or lack thereof) while under attack (10:37) Motives and methods in modern data breaches(15:57) Sysdig sponsor read(16:20) The cost (and necessity) of audit logging(18:46) “If breach is inevitable, what can people do?”(22:36) Maya's “I am Confused” talk(25:40) Stopping attacks before they spiral out of control(32:32) Where can find more from Maya and SysdigAbout Maya Levine:Maya Levine is a Product Manager for Sysdig. Previously she worked at Check Point Software Technologies as a Security Engineer and later a Technical Marketing Engineer, focusing on cloud security. Her earnest and concise communication style connects to both technical and business audiences. She has presented at many industry conferences, including AWS re:Invent and AnsibleFest. She has also been regularly interviewed on television news channels, written publications, and podcasts about cybersecurity.Links:Maya's LinkedIn: https://www.linkedin.com/in/maya-levine/Sysdig: https://sysdig.com/SponsorSysdig: https://sysdig.com/

Podcast AWS LATAM
EP225: Seguridad de APIs en AWS

Podcast AWS LATAM

Play Episode Listen Later Aug 16, 2024 17:47


En este episodio Ana Barragán y Adriana Osorio, nos contaran las opciones que nos ofrece AWS para asegurar las APIs que publicamos a través de Amazon ApiGateway. Nos enfocaremos en los tipos de controles de seguridad que podemos aplicar dependiendo del tipo de API y el caso de uso.Noticia extraida de: El último Cloud Security Report 2024 de Check Point Software Technologies

TechCentral Podcast
TCS+ | Check Point dissects the complexities of cloud security

TechCentral Podcast

Play Episode Listen Later Jun 11, 2024 21:57


Promoted | Check Point's Rudi van Rooyen explains why cloud security is not as straightforward as organisations might assume. The software security landscape is in a constant state of flux. According to research undertaken by Check Point Software Technologies – an AI-powered, cloud-delivered cybersecurity platform provider protecting over 100 000 organisations worldwide – African organisations have been attacked on average 2 508 times a week in the last six months. This compares to 1 379 per organisation globally. Some 70% of malicious files impacting African organisations were delivered via e-mail in the last 30 days, while the most common vulnerability exploit type is “information disclosure”, impacting 75% of organisations. The race is therefore on between threat actors looking to exploit organisations and cybersecurity experts who protect sensitive organisational data. In this episode of TCS+, Rudi van Rooyen, security engineer at Check Point Software Africa, offers a deep dive into the ins and outs of software system security for organisations of any size. Van Rooyen unpacks: • Why cloud migration is not a cure-all for software security issues in an organisation, and how security in a cloud setting should be approached. • How Check Point manages to maintain a prevention-first approach to cybersecurity despite new types of attacks being developed daily. • How AI is helping the chief information security officer cope with skills shortages and overwork by simplifying security operations. • How Check Point's virtual CISO function assists security leads in addressing their cybersecurity concerns. • Insights into how much cybercrime impacts the South African economy. • What Check Point recommends organisations do to better protect themselves against cybercriminals. Insightful, important and sometimes technical, this discussion is critical for any information security expert or business owner looking to better protect their enterprise against cyber threats. * This promoted content was paid for by the party concerned TechCentral

The Construction Life
#584 The truth of cyber safety with Robert Falzon of Check Point Software Technologies

The Construction Life

Play Episode Listen Later Jun 2, 2024 92:09


Robert teaches us the dangers of technology and how it's used against us for profit. We talk about what we can do to protect ourselves from the poorly regulated technology that surrounds us on this episode of The Construction Life Podcast. Find Robert Falzon of Check Point Software Technologies at CheckPoint.com and on LinkedIn. Reach out at Robert@Falzon.com. Stay connected with The Construction Life Podcast by texting Manny at 416 433-5737 or emailing him at manny@theconstructionlife.com. If you have something to contribute to the podcast, email info@theconstructionlife.com to schedule a time to join us in studio. Are you interested in the latest trends in building, renovation, home improvement, real estate, architecture, design, engineering, contracting, trades, and DIY? Look no further! Our construction podcast and social media content cover a wide range of topics, including project management, safety, best practices, business development, leadership, marketing, customer service, productivity, sustainability, technology, innovation, and industry news

Innovation in Government
CISOs are playing a larger role to get agencies ready for AI

Innovation in Government

Play Episode Listen Later May 28, 2024 28:00


Cindi Carter, the global CISO for the Americas for Check Point Software Technologies, said AI can help augment cyber defenses already in place at many agencies. Learn more about your ad choices. Visit podcastchoices.com/adchoicesSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Innovation in Government
CISOs are playing a larger role to get agencies ready for AI

Innovation in Government

Play Episode Listen Later May 28, 2024 28:00


Cindi Carter, the global CISO for the Americas for Check Point Software Technologies, said AI can help augment cyber defenses already in place at many agencies.

T2S2
Deepfake audio is very real and very dangerous, with Check Point's Sergey Shykevich – T2S2

T2S2

Play Episode Listen Later May 24, 2024 12:57


Is what you're hearing really real? Deepfake videos have gotten a lot of attention (especially after it happened to Taylor Swift) but more troubling are deepfake audio recordings, Sergey Shykevich, threat intelligence group manager at Check Point Software Technologies, tells Stuff editor-in-chief Toby Shapshak. Read more on Stuff.

Hoy en la Historia de Israel
Check Point, la empresa líder en ciberseguridad

Hoy en la Historia de Israel

Play Episode Listen Later Mar 13, 2024 2:38


En 1994, en plena expansión de la informática y el uso generalizado de soluciones tecnológicas en empresas y entidades gubernamentales, el ingeniero informático israelí Gil Shwed, egresado de la Universidad Tecnológica de Israel, desarrolló una solución para abordar los crecientes desafíos de seguridad asociados con la gestión de la información en la web. Su innovador software patentado, ofrecía una sólida protección para la infraestructura de internet, sentando las bases para la creación de Check Point Software Technologies, una empresa líder mundial en seguridad informática. A lo largo de tres décadas de evolución, Check Point ha atendido a más de 100.000 clientes, fortaleciendo la seguridad de datos y protegiendo los activos informáticos de empresas y entidades de todo el mundo. En la actualidad, la compañía ofrece sofisticadas soluciones de quinta generación en ciberseguridad, destacándose como una de las principales empresas tecnológicas de Israel que cotizan en la bolsa. Check Point ha perfeccionado sus sistemas para prevenir ataques, violaciones de seguridad y chantajes por parte de ciberterroristas, quienes buscan robar información, alterar bases de datos o causar caos en la red. Sus sistemas generan alertas y establecen bloqueos clave para impedir actividades delictivas, con una supervisión constante de las amenazas las 24 horas del día. Gil Shwed, creador y accionista actual de Check Point, ha sido reconocido por sus contribuciones a la industria y la sociedad. En 2005, recibió un doctorado honorario en ciencias, en 2010 fue galardonado como emprendedor del año, y en 2018 fue honrado con el prestigioso Premio Israel, el más alto honor cultural otorgado por el Estado de Israel. Check Point no solo es un testimonio del ingenio y el espíritu emprendedor israelí, sino que también es una empresa reconocida a nivel mundial por sus servicios en el campo de la ciberseguridad.

CXOInsights by CXOCIETY
PodChats for FutureCISO: Why we need to worry

CXOInsights by CXOCIETY

Play Episode Listen Later Feb 11, 2024 9:43


The WEF Global Cybersecurity Outlook 2024 reveals a divide between those who are resilient and those who aren't. Emerging technologies will only widen this gap. Vivek Gullapalli, global CISO for APAC at Check Point Software Technologies opines that in the digital world, most “everything is highly interconnected, with the seemingly singular exception of cyber security, which remains locked in isolation, and bridging this gap will be critical to business success.In this PodChat for FutureCISO, Check Point Software Technologies' president for APJ, Sharat Sinha, summarises the region's cybersecurity landscape, its leaders' concerns and some options for moving forward.1. How has cybersecurity in Asia evolved since the end of the pandemic?2. As I understand it, cybersecurity is now an all-of-enterprise concern. And yet, different personas view their involvement and responsibility differently. Among leading organisations in Asia, what is the best practice when it comes to ensuring participation in cybersecurity matters?3. Given the increased concern around escalating costs (particularly in the use of cloud and now AI), how should CISOs work with CIOs and CFOs to better manage the rising cost of cybersecurity? 4. Given the many options and pathways to securing the business, what is your advice for CISOs and Boards looking at their cybersecurity options in 2024 and beyond?

CXOInsights by CXOCIETY
PodChats for FutureCISO: The next evolution of cybersecurity

CXOInsights by CXOCIETY

Play Episode Listen Later Feb 10, 2024 13:22


The Global Cybersecurity Outlook 2024 paints a grim picture: there is a growing inequity between cyber-resilient organisations and those that are not. Among 120 executives attending the World Economic Forum's annual meeting on cybersecurity, fewer than one in 10 respondents believe that in the next two years, generative AI will give an advantage to defenders over attackers.It doesn't help that cyber-skills and talent shortages continue to widen, with 52% of public organisations citing this lack of talent and resources as the biggest challenge when designing for cyber resilience.In the race to develop the next generation of tools and techniques, FutureCISO spoke to Gil Shwed, founder and CEO, of Check Point Software Technologies, for his thoughts on the next evolution of cybersecurity.1. In your view, what are the three biggest developments in cybersecurity in 2024?2. How will these developments impact cybersecurity practice and profession in the years ahead?3. With the maturing of AI, is it time to practice offensive cybersecurity?                 a. How will this offensive strategy impact the CISO's team in the performance of their duties?4. There is an expectation that AI will be embedded in many of the critical business applications. How will this impact SecOps? Any suggestions for CIOs and CISOs to ready their respective teams for this inevitability?

CXOInsights by CXOCIETY
PodChats for FutureCISO: Narrowing the gender gap in cybersecurity

CXOInsights by CXOCIETY

Play Episode Listen Later Feb 10, 2024 16:43


While the underrepresentation of women in cybersecurity is starting to improve – 20% in 2019 compared to 10% in 2013, that trend isn't translating in the higher echelons of cybersecurity power. An Altrata report estimates that only 16% of CISOs are women.FutureCISO spoke to Rupal Hollenbeck, president of Check Point Software Technologies, on the long road for women in cybersecurity.1. What is your view of women representation in the cybersecurity space?2. Estimates put women professionals in cybersecurity at 24%. What is driving this inequality in representation in the cybersecurity space?3. What needs to happen to encourage greater participation of women in the cybersecurity space?4. For women aspiring to enter the security space, what characteristics must they hone, qualifications do they need to build?5. What personal risks should those interested in pursuing a CISO career keep in mind?6. Any advice for those interested in pursuing a career in cybersecurity?

Shaka: Extra Time
FLASHPOINT IRAN: US, Britain Get Tougher on Yemen's Houthis by Sinking Boats, Issuing Warning - January 02, 2024

Shaka: Extra Time

Play Episode Listen Later Jan 3, 2024 25:00


Former U.S. National Intelligence Manager for Iran Norman Roule on U.S. and Britain toughening their responses to attacks by Yemen's Iran-backed Houthis on Red Sea shipping. Check Point Software Technologies' Gil Messing on last month's escalation in cyber attacks on infrastructure in Iran and Israel with each side blaming the other. Independent environmental journalist Sanam Mahoozi on how December's dangerous air pollution levels in Iran's big cities affect health, livelihoods of Iranians.

Anker-Aktien Podcast
Crowdstrike Aktienanalyse 2023 // Investitionschance oder Risiko? Eine umfassende Bewertung

Anker-Aktien Podcast

Play Episode Listen Later Nov 24, 2023 27:41


Crowdstrike, ein Schwergewicht im Bereich der Cybersecurity, steht heute bei uns im Rampenlicht. In diesem Podcast schauen wir uns an, was diese Aktie gerade so spannend macht und ob sie das Zeug hat, langfristig eine Top-Investition zu sein. Crowdstrike ist nicht nur ein Name in der Welt der digitalen Sicherheit, sondern ein echter Vorreiter. Mit innovativen Lösungen im Kampf gegen Cyberkriminalität und einer breiten Palette an Sicherheitsprodukten hat sich Crowdstrike einen Namen gemacht. Von fortschrittlicher Endpoint-Security bis zu AI gestützten bedrohungsbasierten Analysen bietet das Unternehmen alles, was moderne Unternehmen in der heutigen digitalen Landschaft benötigen. Aber wie steht es um die Aktie? Ist Crowdstrike ein Investment wert? In diesem Video nehmen wir die finanziellen Kennzahlen unter die Lupe, werfen einen Blick auf die Marktstellung des Unternehmens und diskutieren die Zukunftsaussichten in der rasant wachsenden Cybersecurity-Branche. Hier erfährst du alles über:- Die aktuellen Finanzen von Crowdstrike: Umsatz, Gewinn, Cashflow – was sagen die Zahlen?- Die Marktposition von Crowdstrike: Wie schneidet das Unternehmen im Vergleich zu seinen Wettbewerbern ab?- Chancen und Risiken: Was bringt die Zukunft für Crowdstrike und seine Aktionäre? // Inhaltsverzeichnis: //00:00 Intro00:58 Langfristiger Chart von CrowdStrike 02:07 CrowdStrike vs. S&P 500 vs. SPDR Technology ETF vs. iShares Digital Security ETF03:10 CrowdStrike vs. Zscaler vs. Secunet vs. Check Point Software Technologies vs. Palo Alto vs. Fortinet 03:50 CrowdStrike: Historie & Geschäftsbereiche 04:37 Einsatzgebiete von CrowdStrike 08:52 CrowdStrike-Pakete und Preise 11:03 Gartner Hype Cycle12:55 Eigentümerstruktur von CrowdStrike 13:33 CEO: George Kurtz14:03 CrowdStrike: Umsatz & Margen Entwicklung 15:07 Umsatz nach Segment & Region 16:07 CrowdStrike: Gewinn- & Cashflow-Entwicklung18:04 CrowdStrike: Bilanz-Überblick 18:42 Übernahme von Bionic & Aktienrückkäufe19:36 CrowdStrike: Kennzahlen-Überblick (KGV)20:33 CrowdStrike: Piotroski- & Levermann-Score21:21 Unternehmensbewertung zu CrowdStrike23:16 Chartanalyse zu CrowdStrike24:40 Ist die Aktie von CrowdStrike derzeit ein Kauf? 26:08 Disclaimer 27:32 Danke fürs Zuhören! // Zum kostenlosen Strategie-Gespräch anmelden: //

Telecom Reseller
D&H bulks up portfolio to include Extreme Networks and Check Point, Podcast

Telecom Reseller

Play Episode Listen Later Nov 7, 2023


D&H bulks up portfolio: D&H is expanding its vendor line card and recently signed with Extreme Networks and Check Point. In this podcast Jason Bystrak, Senior Vice President of Modern Solutions of D&H Distributing discusses how these two new offering fit in with the broader D&H approach, how they match Jason's mission to deliver modern solutions how Extreme Networks and Check Point represent expanded channel opportunities, along with end user solutions. Extreme Networks, Inc. (EXTR) is a leader in cloud networking focused on delivering services that connect devices, applications, and people in new ways. We push the boundaries of technology leveraging the powers of machine learning, artificial intelligence, analytics, and automation. 50,000 customers globally trust our end-to-end, cloud-driven networking solutions and rely on our top-rated services and support to accelerate their digital transformation efforts and deliver progress like never before. Jason Bystrak D&H Distributing has entered into a new distribution agreement with Check Point Software Technologies, a leading provider of cyber security solutions globally. D&H will carry Check Point's full suites of solutions including Quantum, CloudGuard, Harmony and Horizon solutions, expanding the roster of partners in its Modern Security portfolio. Building on its robust relationships within the MSP and MSSP communities, D&H aims to bolster Check Point's market presence, ensuring that the SMB and mid-market segments benefit from their top-tier cyber security technology. Jason also discusses the recently hosted Fall THREAD Technology Conference, which was held in Las Vegas, for the first time. We learn about valuable feedback, at the conference on AI, and other opportunities. Visit D&H Distributing

Anker-Aktien Podcast
Palo Alto vs. Fortinet // Aktien-Duell 2023 // Cybersicherheit als Investment-Chance?

Anker-Aktien Podcast

Play Episode Listen Later Oct 20, 2023 31:43


Palo Alto und Fortinet gehören zu den prominenten Größen im Bereich der Cybersecurity, agieren jedoch meistens im Hintergrund. Palo Alto Networks ist ein multinationales Unternehmen, das sich auf fortschrittliche Cybersicherheitslösungen spezialisiert hat. Es bietet umfassende Dienstleistungen in den Bereichen Bedrohungsabwehr, Firewall-Sicherheit und Netzwerksicherheit. Fortinet ist ein weltweit führender Anbieter von Cybersicherheitslösungen, der sich auf Netzwerksicherheit und Bedrohungsabwehr konzentriert. Das Unternehmen ist bekannt für seine hochentwickelten Firewalls und integrierten Sicherheitsplattformen. In diesem Video werden wir die Unterschiede und Gemeinsamkeiten zwischen beiden Unternehmen genauer beleuchten. Wir werden auch analysieren, ob derzeit ein Kauf von einem der beiden Unternehmen sinnvoll ist und welches von ihnen möglicherweise mehr Rendite verspricht. // Inhaltsverzeichnis: //00:00 Intro00:58 Langfristiger Chart: Palo Alto vs. Fortinet 02:17 Palo Alto & Fortinet vs. S&P 500 vs. SPDR Technology ETF vs. iShares Digital Security ETF04:20 Palo Alto & Fortinet vs. Zscaler vs. Check Point Software Technologies vs. CrowdStrike vs. Cisco05:25 Cybersecurity & Wachstum im Überblick07:31 Palo Alto im Überblick09:36 Fortinet im Überblick10:55 Inhaberschaft: Palo Alto & Fortinet14:02 CEOs: Nikesh Arora & Ken Xie 14:32 Umsatz- & Margen-Entwicklung 15:46 Umsatz nach Region und Segment17:31 Gewinn- & Cashflow-Entwicklung19:33 Bilanz-Überblick 20:26 Aktienrückkäufe21:01 Kennzahlen-Überblick (KGV)22:10 Piotroski-Score 23:04 Unternehmensbewertung: Palo Alto23:50 Unternehmensbewertung: Fortinet24:30 Chartanalyse: Palo Alto26:54 Chartanalyse: Fortinet30:42 Disclaimer31:31 Danke fürs Zuhören! // Zum kostenlosen Strategie-Gespräch anmelden: //

Mental Toughness Mastery Podcast with Sheryl Kline, M.A. CHPC
Creating a Safe Environment for Diverse Teams to Have a Voice

Mental Toughness Mastery Podcast with Sheryl Kline, M.A. CHPC

Play Episode Listen Later Aug 24, 2023 22:33


Coletta Vigh, former head of Head of Worldwide Channel Strategy and Growth Initiatives for Check Point Software Technologies, is a testament to the power of adaptability, cultural immersion, and relentless pursuit of excellence. From her early days in the hospitality sector in Japan to her pivotal role in shaping global channel strategies, she has consistently demonstrated the importance of a positive mindset and the value of diverse experiences.In our discussion, Coletta dives deep into the challenges she faced, the pivotal moments that shaped her amazing career, and the significance of fostering diverse teams. Whether you're an emerging professional or a seasoned expert, Coletta's insights will undoubtedly inspire and provide valuable lessons for all.TIMESTAMPS:6:27: Comfort zone: The conversation shifts to the importance of stepping out of one's comfort zone8:48: Positive mindset- Coletta emphasizes her positive and persistent approach to challenges.11:57: Hire smart - Coletta speaks on the significance of diverse teams and creating safe environments.16:08 - Management: Coletta shares her approach to managing potential disruptions in meetings.17:47: Set the stage - The discussion turns to setting the stage for meetings and ensuring inclusivity.KEY TAKEAWAYS:Positive mindset is key. Understand your goals and drive towards your goals with a positive mindset.Positive as well as persistent.  Keep striving towards your goals, even when you hear the word ‘no'.  If you do something that's not correct then ask the right questions: so how do I do that?You can't do everything yourself, so hire smart. Your idea that starts as a seed can grow and flourish with the right people supporting you and contributing.Set the stage: Let the team know your intentions for a meeting and what you are looking to achieve.  Prep new hires on what meetings are for and how they work.  Create safe spaces for your team to come together.To stay up-to-date with future interviews and gain valuable resources on building mindset and influence for real change, be sure to connect with me on LinkedIn, AND to learn more about how to build the mindset and influence for real change, join our community at www.sherylkline.com.Finally, if I can help you or your team, please email me at info@sherylkline.com

Earnings Season
Check Point Software Technologies Ltd., Q2 2023 Earnings Call, Jul 26, 2023

Earnings Season

Play Episode Listen Later Jul 28, 2023 56:08


Check Point Software Technologies Ltd., Q2 2023 Earnings Call, Jul 26, 2023

Founder Storiez
Startup Struggles to a $200 Million Acquisition to CheckPoint | Zohar Alon, Co-founder of Dome9 and Angel Investor | Luck, Skill, and Perseverance and why you need it

Founder Storiez

Play Episode Listen Later Jun 30, 2023 59:37


Zohar Alon is an entrepreneur and founder of several successful startups. He co-founded Dome9, which Check Point Software Technologies acquired in 2018 for $200 million. Alon is also a co-founder and chairman of the Israeli cybersecurity think tank Cyberstarts, and an active investor and mentor in the startup community.  we delve into his story and his journey of overcoming immense challenges in building successful startups. Alon shares his experience of almost shutting down his company, the heartbreak of an acquisition deal falling apart, and the invaluable lessons he learned along the way. In this conversation  we will gain a deeper understanding of the true grit and determination it takes to build a successful startup.  

Global Value
Check Point Software Stock Analysis | CHKP Stock | $CHKP Stock Analysis | Best Stock to Buy Now?

Global Value

Play Episode Listen Later Feb 20, 2023 14:16


In this video, we'll perform a CHKP stock analysis and figure out what the company looks like based on the numbers. We'll also try to figure out what a reasonable fair value is for Check Point Software Technologies. And answer is Check Point Software one of the best cybersecurity stocks to buy at the current price? Find out in the video above! Global Value's Check Point Software Technologies Ltd. stock analysis. Check out Seeking Alpha Premium and score an annual plan for just $119 - that's 50% off! Plus all funds from affiliate referrals go directly towards supporting the channel! Affiliate link - https://www.sahg6dtr.com/H4BHRJ/R74QP/ Check Point Software Technologies Ltd. ($CHKP) | Check Point Software Technologies Ltd. Stock Value Analysis | Check Point Software Technologies Ltd. Stock Dividend Analysis | CHKP Dividend Analysis | $CHKP Dividend Analysis | Check Point Software Technologies Ltd. Intrinsic Value | CHKP Intrinsic Value | $CHKP Intrinsic Value | Check Point Software Intrinsic Value | Check Point Software Technologies Ltd. Discounted Cash Flow Model | Check Point Software Technologies Ltd. DCF Analysis | CHKP Discounted Cash Flow Analysis | CHKP DCF Model #CHKP #Checkpoint #stockmarket #dividend #stocks #investing #valueinvesting (Recorded December 29, 2022) ❖ MUSIC ❖ ♪ "Lift" Artist: Andy Hu License: Creative Commons Attribution 3.0. ➢ http://creativecommons.org/licenses/b... ➢ https://www.youtube.com/watch?v=sQCuf...

Audio News
YAHOO ES LA MARCA MÁS SUPLANTADA POR LOS CIBERDELINCUENTES

Audio News

Play Episode Listen Later Feb 2, 2023 2:13


Según el Informe Brand Phishing Report del cuarto trimestre de 2022 de Check Point Software Technologies, Yahoo fue la marca mas imitada por los ciberdelincuentes en ataques phishing en los últimos tres meses de 2022.

2B Bolder Podcast : Career Insights for the Next Generation of Women in Business & Tech
2B Bolder Featuring Micki Boland a Global Cybersecurity Warrior and Evangelist

2B Bolder Podcast : Career Insights for the Next Generation of Women in Business & Tech

Play Episode Listen Later Jan 16, 2023 38:55


In episode #73 of the 2B Bolder Podcast, Micki Boland shares her passion for global cybersecurity.  Micki is a fierce warrior and evangelist with Check Point Software Technologies' Office of the CTO.   She has over 20 years of experience in IT, cybersecurity, and emerging technology innovation.  Micki holds an ISC2 CISSP, a Master of Science in Technology Commercialization from the University of Texas at Austin, MBA with a Global Security Concentration from East Carolina University.   Micki also writes cybersecurity articles for Cybertalk.org and has written for Dark Reading, Silicon Angle, and Decipher, along with frequently speaking with the broadcast media and radio shows regarding cybersecurity for and in emerging technology, the global threat landscape, tips and resources for consumers and enterprise organizations, Dark Web, Cyber Warfare, AI (ML) in cybersecurity, cloud security and DevSecOps.    Tune in to hear why there has never been a better time for women to enter and excel in cyber security.Connect with Micki Boland on LinkedInLearn about  Check Point TechnologiesFree Cyber Security Training Antifragile By Nassim Nicholas Taleb (book referenced in the show)The 2B Bolder Podcast provides first-hand access to some amazing women. Guests will include women from leading enterprise companies to startups, women execs, coders, account execs, engineers, doctors, and innovators.Listen to 2B Bolder for more career insights from women in tech and business.Support the show

Capital
Digital Business: Ciberseguridad 2023: retos y tendencias 16/01/2022

Capital

Play Episode Listen Later Jan 16, 2023 19:40


En los últimos años hemos visto cómo el tema de la ciberseguridad ha pasado del departamento de TI a la sala de juntas. A medida que han proliferado los ataques y han aumentado las posibles sanciones, tanto normativas como en términos de pérdida de confianza de los clientes, se ha convertido en una prioridad en todos los niveles de la organización. Hoy en Digital Business hacemos balance de 2022 ¿cuáles han sido los ciberataques más importantes? ¿Están las empresas protegidas ante un posible ataque cibernético? ¿Y las administraciones? Los ciberdelincuentes, ¿atacan tanto a grandes como a pequeñas y medianas empresas? ¿Cúanto cuesta diseñar e implementar una estrategia de ciberseguridad? ¿El teletrabajo es una puerta abierta a los ciberdelincuentes? El Internet de las Cosas, la Nube, dispositivos personales y de trabajo conectados, bots, redes sociales .. ¡cada vez más puertas abiertas a los ciberdelincuentes? ¿Quiénes son los ciberdelincuentes? ¿Qué buscan? Responden en Capital Intereconomía ** Victor Molina Rodríguez, Channel & Telco SE Team Leader en Check Point Software Technologies, Ltd. Madrid ** Víctor Deutsch, autor de Ciberseguridad para directivos. ** José M. Viñals, jurista y profesor del IEB.

IT Visionaries
The Vital Role of High-Tech in Healthcare

IT Visionaries

Play Episode Listen Later Jan 10, 2023 41:52


The primary goal of cybersecurity is human safety. Even if high-tech isn't typically equated with healthcare, Cindi Carter, Global CISO of Check Point Software Technologies, explains why it should be. Tune in to learn:Why high-tech is imperative for healthcare (3:37)The vulnerability of medical records (08:40)Healthcare cybersecurity predictions for 2023-24 (30:27)The “human factor” of cybersecurity (37:00)Mentions:HIMSS Cybersecurity in HealthcareNassim Nicholas Taleb, author of AntifragileCISSP certificationCybertalkIT Visionaries is brought to you by Salesforce. With Salesforce's low-code app dev tools, you can be more efficient, more productive and save money by reducing development time by up to 90%. Get Salesforce's Low-Code Playbook and increase time to value for your team and your customers. Download the free playbook today.Mission.org is a media studio producing content for world-class clients. Learn more at mission.org.

Audio News
4 PERSPECTIVAS DE LOS CISOs EN CIBERSEGURIDAD PARA 2023

Audio News

Play Episode Listen Later Jan 10, 2023 5:13


Jonathan Fischbein, Director Global de Seguridad de la Información de Check Point Software Technologies; Deryck Mitchelson, Cindi Carter y Pete Nicoletti, CISOs de las regiones de EMEA y América de la compañía, juntaron su experiencia para comprender mejor el escenario futuro en ciberseguridad como profesionales expertos que comparten una sola visión, crear una seguridad de extremo a extremo para proteger la cadena de valor de las empresas.

CXOInsights by CXOCIETY
PodChats for FutureIoT: Understanding the fundamentals of secure IoT

CXOInsights by CXOCIETY

Play Episode Listen Later Nov 17, 2022 9:25


Insider Intelligence posits that there will likely be 64 billion deployed IoT devices worldwide within the next five years. However, expectations are that beyond smartphones and computers, many other IoT devices will not carry the same level of security precautions – at least not in the near term.It is further expected that IoT devices and sensors will form part of the digital ecosystem. This suggests that an organization's attack surface will grow as more devices are connected to the internet. How then should enterprises improve their security posture even as they deploy more IoT solutions into the organisation? In this PodChats for FutureIoT, we are joined by Dr Doris Dor, chief product officer for Check Point Software Technologies, to share with us her perspective on how to secure an IoT-enabled enterprise. 1. What are the IoT cyber security threats faced by enterprises? 2. How common are these threats? 3. What are common misconceptions and challenges encountered today when enterprises try to secure IoT devices?4. Can advanced technology such as AI, machine learning and deep learning solve these problems? 5. What are the roles of AI, machine learning and deep learning in IoT security?6. What are the latest innovations in these areas?

Inside Ideas with Marc Buckley
Responsibility, Resilience, Regeneration, with Louise Kjellerup Roper

Inside Ideas with Marc Buckley

Play Episode Listen Later Oct 4, 2022 100:55


Louise Kjellerup Roper is my guest on Episode 168 of Inside Ideas with Marc Buckley. As CEO of Volans Louise leads the team and is responsible for Volans mission, programmes and strategy, and ensuring Volans has the biggest possible positive impact, through what we do and who we work with. After leaving her native Denmark to study PPE at the University of Oxford, Louise started her career with ‘bleeding-edge' software companies such as Cisco and Check Point Software Technologies, before focusing on the role of business for good, launching Cradle to Cradle and B Lab pioneering companies like method and gDiapers into Europe and bringing circular economy business models and scale to ambitious small businesses. Louise is a guest lecturer at both Cranfield University and the University of Exeter and part of the Ellen MacArthur Foundation's CE100 network. She also mentors young change-makers via the Aspire Foundation and the Aspire Trailblazing Women network. https://volans.com/

20 Minute Leaders
Ep915: Erez Berkner | CEO and Co-Founder, Lumigo

20 Minute Leaders

Play Episode Listen Later Sep 14, 2022 21:18


Erez Berkner, a developer by heart, is the CEO & co-founder of Lumigo, a modern observability platform for the modern cloud. He attended the Open University of Israel obtaining a degree in computer science and mathematics with honors. He worked at Check Point Software Technologies for more than a decade and was the director of cloud-based security products before starting Lumigo.

Audio News
CHECK POINT HARMONY, LA PRIMERA SOLUCIÓN DE SEGURIDAD UNIFICADA PARA USUARIOS, DISPOSITIVOS Y ACCESO

Audio News

Play Episode Listen Later Aug 24, 2022 6:09


Check Point Software Technologies, con el objetivo de conectar en persona con sus clientes nuevamente después de la pandemia y junto a su partner 4 Estrellas PROCOM y su distribuidor mayorista para la Región Licencias OnLine, organizó una deliciosa cena en HARD ROCK CAFE para mostrar su nueva y completa suite de soluciones de seguridad “Check Point Harmony” la cual consolida seis productos para ofrecer una seguridad sin compromisos y simplicidad para todos.

Chicago's Afternoon News with Steve Bertrand
Cyberattacks on the rise in schools across America

Chicago's Afternoon News with Steve Bertrand

Play Episode Listen Later Aug 15, 2022


Pete Nicoletti, Field Chief Information Security Officer with Check Point Software Technologies, joins Lisa Dent on Chicago’s Afternoon News to explain why schools and universities are the perfect targets for cyber criminals, and what you should do to protect yourself. Follow Your Favorite Chicago’s Afternoon News Personalities on Twitter:Follow @LisaDentSpeaksFollow @SteveBertrand Follow @kpowell720 Follow @maryvandeveldeFollow […]

Infosys Knowledge Institute Podcasts
Ahead in the Cloud: Cybersecurity in the Cloud-First Computing Era with Ofir Israel

Infosys Knowledge Institute Podcasts

Play Episode Listen Later Aug 8, 2022 19:03


Ofir Israel, VP of Threat Prevention products at Check Point Software Technologies discusses cloud and security. The discussion covers data processing in the cloud and prevention and detection of cyberthreats. Hosted by Chad Watt, researcher and writer with the Infosys Knowledge Institute.

Passionate Pioneers with Mike Biselli
Powering Patient Similarity Networks with Amnon Bar-Lev

Passionate Pioneers with Mike Biselli

Play Episode Listen Later Jul 18, 2022 31:42


This episode's Community Champion Sponsor is Catalyst. To virtually tour Catalyst and claim your space on campus, or host an upcoming event: https://www.catalysthealthtech.com/ (CLICK HERE) --- With the digital revolution accelerating in the healthcare industry, our next guest is leveraging the power of health data and social networks for patients and consumers to develop meaningful relationships with others who share the same, often life-changing, journey. Amnon Bar-Lev, CEO of Alike, joins us to discuss how he and his team are unlocking the power of patient similarity networks. Through proprietary AI technology, crowdsourcing, and big data, Alike is transforming medical records to empowering insights and connecting patients to a supportive community of individuals who share the same journey - all without sacrificing user privacy. Join us for this important conversation as we learn how Amnon and the Alike team are building a new world for patients wanting to actively engage in their healthcare journey. Let's go! Episode Highlights: Amnon's transition to the life science industry and why he created Alike. Alike's aim to be the world's largest patient similarity network. What the current end-user feedback has been for the Alike team. Amnon's view of the future of health data and its importance to all of us.    About Our Guest:  Amnon Bar-Lev, co-founder and CEO of Alike Health was the former President at Check Point Software Technologies. Prior to joining Check Point, Amnon was the founder and CEO of Xpert Integrated System Ltd. Amnon began his career in the Israeli Air Force and holds a Bachelor of Arts degree in Computer Science and Management from Tel-Aviv University and has continued his studies at the faculty of medicine, school of graduate studies. Links Supporting This Episode: Alike website: https://www.alike.health/ (CLICK HERE) Amnon Bar-Lev LinkedIn page: https://www.linkedin.com/in/amnonbarlev/?originalSubdomain=il (CLICK HERE) Alike Twitter page: https://twitter.com/AlikeHealth (CLICK HERE) Clubhouse handle: @mikebiselli Mike Biselli LinkedIn page: https://www.linkedin.com/in/mikebiselli (CLICK HERE) Mike Biselli Twitter page: https://twitter.com/mikebiselli (CLICK HERE) Visit our website: https://www.passionatepioneers.com/ (CLICK HERE) Subscribe to newsletter: https://forms.gle/PLdcj7ujAGEtunsj6 (CLICK HERE) Guest nomination form: https://docs.google.com/forms/d/e/1FAIpQLScqk_H_a79gCRsBLynkGp7JbdtFRWynTvPVV9ntOdEpExjQIQ/viewform (CLICK HERE)

Easy Prey
Attack Techniques Scammers Are Using with Joel Hollenbeck

Easy Prey

Play Episode Listen Later Jul 6, 2022 37:35


Reusing passwords makes it easier for threat actors to gain access to your accounts. They may not actually be using it to take money. They may be impersonating you to scam others in your network. Today's guest is Joel Hollenbeck. Joel is a cyber security executive with over 25 years experience in multiple disciplines. He is the CTO at Check Point Software Technologies and leads a global team of cyber security experts dedicated to understanding the challenges that customers face and helping them stay ahead of the ever-evolving threat curve. Show Notes: [1:01] - Joel shares his background and his current role. [2:38] - Joel has teenagers at home and describes the challenges of communicating threats including one that wound up being an attack. [5:06] - His credit card company alerted him of fraud and he looked further into it. [6:29] - Threat actors have to constantly change up their tactics. [7:53] - The latest report shows that the number one brand that scammers are using is LinkedIn. They are trying to harvest accounts to get in under the radar. [9:06] - Brands themselves need to also be aware to keep their customers safe. [10:36] - Every major holiday, shopping event, or global event creates new opportunities for phishing attempts. [12:09] - Joel shares some of the information threat actors gather. [14:33] - A great many people don't trust SMS messages. [16:30] - The reuse of passwords has been proven to be a huge mistake. [18:37] - Chris shares an experience with a password reset issue. [20:28] - Social media companies do not have a public facing customer service line. [22:46] - On the other end of the spectrum, there is the issue of being overwhelmed by multi-factor authentication. [24:18] - Product links on social media are also something to be wary of. [25:37] - Think of it as a risk assessment and know that sometimes it will feel very cynical. [26:59] - You don't know if the person on the other end of a message is from the person you actually trust. [28:48] - Threat actors strive to gain access to high value accounts. [30:42] - Some LinkedIn or other social media account hacks, they will be used for simple phishing attacks. But some will be used for something very sophisticated. [33:06] - Awareness of these issues is critically important to try to stay ahead of scammers. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Joel Hollenbeck on LinkedIn Check Point Security Website

El Taco Financiero podcast
Entrevista con Miguel Angulo, ingeniero en Ciberseguridad en Check Point Software Technologies

El Taco Financiero podcast

Play Episode Listen Later May 16, 2022 43:26


Esta semana te traemos entrevista!Platicamos con Miguel Angulo, experto en ciberseguridad, quien desde Nueva Jersey tiene la misión de educar a la comunidad hispana sobre cómo protegernos ante posibles ataques y fraudes cibernéticos, y promover una mayor representación de los latinos en la industria.Miguel es un ingeniero en ciberseguridad y evangelista para la oficina del CTO en Check Point Software Technologies. A través de la adopción de tecnologías emergentes, Miguel asesora a socios nacionales para crear soluciones y servicios de seguridad.Además, Miguel lidera junto con su esposa Adriana el Hub de Nueva Jersey de Hispanic Star, trabajando con instituciones de educación superior para crear curriculums en ciberseguridad para que los estudiantes aprendan habilidades técnicas y de solución de problemas que les permitan ingresar de manera más exitosa al mercado laboral.Miguel nos platicó su historia viniendo desde Colombia en la década de los 90, nos contó su trayectoria para llegar a trabajar en la industria de la ciberseguridad, nos dio varios consejos para proteger nuestra información y hasta nos dio recomendaciones para hacer un asado en casa!Si quieres contactar a Miguel, puedes conectar con el via LinkedInNo olvides seguirnos en redes sociales y ponernos 5 estrellas! Nos ayudas mucho a crecer esta comunidad y llegar a más paisanos.Estamos en Instagram, Facebook y Twitter!Support the showSupport the show

Screaming in the Cloud
Leading the Cloud Security Pack with Yoav Alon

Screaming in the Cloud

Play Episode Listen Later May 3, 2022 34:13


About YoavYoav is a security veteran recognized on Microsoft Security Response Center's Most Valuable Research List (BlackHat 2019). Prior to joining Orca Security, he was a Unit 8200 researcher and team leader, a chief architect at Hyperwise Security, and a security architect at Check Point Software Technologies. Yoav enjoys hunting for Linux and Windows vulnerabilities in his spare time.Links Referenced: Orca Security: https://orca.security Twitter: https://twitter.com/yoavalon TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Chief Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: This episode is sponsored in part by our friends at Vultr. Optimized cloud compute plans have landed at Vultr to deliver lightning fast processing power, courtesy of third gen AMD EPYC processors without the IO, or hardware limitations, of a traditional multi-tenant cloud server. Starting at just 28 bucks a month, users can deploy general purpose, CPU, memory, or storage optimized cloud instances in more than 20 locations across five continents. Without looking, I know that once again, Antarctica has gotten the short end of the stick. Launch your Vultr optimized compute instance in 60 seconds or less on your choice of included operating systems, or bring your own. It's time to ditch convoluted and unpredictable giant tech company billing practices, and say goodbye to noisy neighbors and egregious egress forever. Vultr delivers the power of the cloud with none of the bloat. "Screaming in the Cloud" listeners can try Vultr for free today with a $150 in credit when they visit getvultr.com/screaming. That's G E T V U L T R.com/screaming. My thanks to them for sponsoring this ridiculous podcast.Corey: Finding skilled DevOps engineers is a pain in the neck! And if you need to deploy a secure and compliant application to AWS, forgettaboutit! But that's where DuploCloud can help. Their comprehensive no-code/low-code software platform guarantees a secure and compliant infrastructure in as little as two weeks, while automating the full DevSecOps lifestyle. Get started with DevOps-as-a-Service from DuploCloud so that your cloud configurations are done right the first time. Tell them I sent you and your first two months are free. To learn more visit: snark.cloud/duplocloud. Thats's snark.cloud/D-U-P-L-O-C-L-O-U-D. Corey: Welcome to Screaming in the Cloud. I'm Corey Quinn. Periodically, I would say that I enjoy dealing with cloud platform security issues, except I really don't. It's sort of forced upon me to deal with much like a dead dog is cast into their neighbor's yard for someone else to have to worry about. Well, invariably, it seems like it's my yard.And I'm only on the periphery of these things. Someone who's much more in the trenches in the wide world of cloud security is joining me today. Yoav Alon is the CTO at Orca Security. Yoav, thank you for taking the time to join me today and suffer the slings and arrows I'll no doubt be hurling your way.Yoav: Thank you, Corey, for having me. I've been a longtime listener, and it's an honor to be here.Corey: I still am periodically surprised that anyone listens to these things. Because it's unlike a newsletter where everyone will hit reply and give me a piece of their mind. People generally don't wind up sending me letters about things that they hear on the podcast, so whenever I talk to somebody listens to it as, “Oh. Oh, right, I did turn the microphone on. Awesome.” So, it's always just a little on the surreal side.But we're not here to talk necessarily about podcasting, or the modern version of an AM radio show. Let's start at the very beginning. What is Orca Security, and why would folks potentially care about what it is you do?Yoav: So, Orca Security is a cloud security company, and our vision is very simple. Given a customer's cloud environment, we want to detect all the risks in it and implement mechanisms to prevent it from occurring. And while it sounds trivial, before Orca, it wasn't really possible. You will have to install multiple tools and aggregate them and do a lot of manual work, and it was messy. And we wanted to change that, so we had, like, three guiding principles.We call it seamless, so I want to detect all the risks in your environment without friction, which is our speak for fighting with your peers. We also want to detect everything so you don't have to install, like, a tool for each issue: A tool for vulnerabilities, a tool for misconfigurations, and for sensitive data, IAM roles, and such. And we put a very high priority on context, which means telling you what's important, what's not. So, for example, S3 bucket open to the internet is important if it has sensitive data, not if it's a, I don't know, static website.Corey: Exactly. I have a few that I'd like to get screamed at in my AWS account, like, “This is an open S3 bucket and it's terrible.” I look at it the name is assets.lastweekinaws.com. Gee, I wonder if that's something that's designed to be a static hosted website.Increasingly, I've been slapping CloudFront in front of those things just to make the broken warning light go away. I feel like it's an underhanded way of driving CloudFront adoption some days, but not may not be the most charitable interpretation thereof. Orca has been top-of-mind for a lot of folks in the security community lately because let's be clear here, dealing with security problems in cloud providers from a vendor perspective is an increasingly crowded—and clouded—space. Just because there's so much—there's investment pouring into it, everyone has a slightly different take on the problem, and it becomes somewhat challenging to stand out from the pack. You didn't really stand out from the pack so much as leaped to the front of it and more or less have become the de facto name in a very short period of time, specifically—at least from my world—when you wound up having some very interesting announcements about vulnerabilities within AWS itself. You will almost certainly do a better job of relating the story, so please, what did you folks find?Yoav: So, back in September of 2021, two of my researchers, Yanir Tsarimi and Tzah Pahima, each one of them within a relatively short span of time from each other, found a vulnerability in AWS. Tzah found a vulnerability in CloudFormation which we named BreakingFormation and Yanir found a vulnerability in AWS Glue, which we named SuperGlue. We're not the best copywriters, but anyway—Corey: No naming things is hard. Ask any Amazonian.Yoav: Yes. [laugh]. So, I'll start with BreakingFormation which caught the eyes of many. It was an XXE SSRF, which is jargon to say that we were able to read files and execute HTTP requests and read potentially sensitive data from CloudFormation servers. This one was mitigated within 26 hours by AWS, so—Corey: That was mitigated globally.Yoav: Yes, globally, which I've never seen such quick turnaround anywhere. It was an amazing security feat to see.Corey: Particularly in light of the fact that AWS does a lot of things very right when it comes to, you know, designing cloud infrastructure. Imagine that, they've had 15 years of experience and basically built the idea of cloud, in some respects, at the scale that hyperscalers operate at. And one of their core tenets has always been that there's a hard separation between regions. There are remarkably few global services, and those are treated with the utmost of care and delicacy. To the point where when something like that breaks as an issue that spans more than one region, it is headline-making news in many cases.So it's, they almost never wind up deploying things to all regions at the same time. That can be irksome when we're talking about things like I want a feature that solves a problem that I have, and I have to wait months for it to hit a region that I have resources living within, but for security, stuff like this, I am surprised that going from, “This is the problem,” to, “It has been mitigated,” took place within 26 hours. I know it sounds like a long time to folks who are not deep in the space, but that is superhero speed.Yoav: A small correction, it's 26 hours for, like, the main regions. And it took three to four days to propagate to all regions. But still, it's speed of lighting in for security space.Corey: When this came out, I was speaking to a number of journalists on background about trying to wrap their head around this, and they said that, “Oh yeah, and security is always, like, the top priority for AWS, second only to uptime and reliability.” And… and I understand the perception, but I disagree with it in the sense of the nightmare scenario—that every time I mention to a security person watching the blood drain from their face is awesome—but the idea that take IAM, which as Werner said in his keynote, processes—was it 500 million or was it 500 billion requests a second, some ludicrous number—imagine fails open where everything suddenly becomes permitted. I have to imagine in that scenario, they would physically rip the power cables out of the data centers in order to stop things from going out. And that is the right move. Fortunately, I am extremely optimistic that will remain a hypothetical because that is nightmare fuel right there.But Amazon says that security is job zero. And my cynical interpretation is that well, it wasn't, but they forgot security, decided to bolt it on to the end, like everyone else does, and they just didn't want to renumber all their slides, so instead of making it point one, they just put another slide in front of it and called the job zero. I'm sure that isn't how it worked, but for those of us who procrastinate and building slide decks for talks, it has a certain resonance to it. That was one issue. The other seemed a little bit more pernicious focusing on Glue, which is their ETL-as-a-Service… service. One of them I suppose. Tell me more about it.Yoav: So, one of the things that we found when we found the BreakingFormation when we reported the vulnerability, it led us to do a quick Google search, which led us back to the Glue service. It had references to Glue, and we started looking around it. And what we were able to do with the vulnerability is given a specific feature in Glue, which we don't disclose at the moment, we were able to effectively take control over the account which hosts the Glue service in us-east-1. And having this control allowed us to essentially be able to impersonate the Glue service. So, every role in AWS that has a trust to the Glue service, we were able to effectively assume a role into it in any account in AWS. So, this was more critical a vulnerability in its effect.Corey: I think on some level, the game of security has changed because for a lot of us who basically don't have much in the way of sensitive data living in AWS—and let's be clear, I take confidentiality extremely seriously. Our clients on the consulting side view their AWS bills themselves as extremely confidential information that Amazon stuffs into a PDF and emails every month. But still. If there's going to be a leak, we absolutely do not want it to come from us, and that is something that we take extraordinarily seriously. But compared to other jobs I've had in the past, no one will die if that information gets out.It is not the sort of thing that is going to ruin people's lives, which is very often something that can happen in some data breaches. But in my world, one of the bad cases of a breach of someone getting access to my account is they could spin up a bunch of containers on the 17 different services that AWS offers that can run containers and mine cryptocurrency with it. And the damage to me then becomes a surprise bill. Okay, great. I can live with that.Something that's a lot scarier to a lot of companies with, you know, serious problems is, yep, fine, cost us money, whatever, but our access to our data is the one thing that is going to absolutely be the thing that cannot happen. So, from that perspective alone, something like Glue being able to do that is a lot more terrifying than subverting CloudFormation and being able to spin up additional resources or potentially take resources down. Is that how you folks see it too, or is—I'm sure there's nuance I'm missing.Yoav: So yeah, the access to data is top-of-mind for everyone. It's a bit scary to think about it. I have to mention, again, the quick turnaround time for AWS, which almost immediately issued a patch. It was a very fast one and they mitigated, again, the issue completely within days. About your comment about data.Data is king these days, there is nothing like data, and it has all the properties of everything that we care about. It's expensive to store, it's expensive to move, and it's very expensive if it leaks. So, I think a lot of people were more alarmed about the Glue vulnerability than the CloudFormation vulnerability. And they're right in doing so.Corey: I do want to call out that AWS did a lot of things right in this area. Their security posture is very clearly built around defense-in-depth. The fact that they were able to disclose—after some prodding—that they checked the CloudTrail logs for the service itself, dating back to the time the service launched, and verified that there had never been an exploit of this, that is phenomenal, as opposed to the usual milquetoast statements that companies have. We have no evidence of it, which can mean that we did the same thing and we looked through all the logs in it's great, but it can also mean that, “Oh, yeah, we probably should have logs, shouldn't we? But let's take a backlog item for that.” And that's just terrifying on some level.It becomes a clear example—a shining beacon for some of us in some cases—of doing things right from that perspective. There are other sides to it, though. As a customer, it was frustrating in the extreme to—and I mean, no offense by this—to learn about this from you rather than from the provider themselves. They wound up putting up a security notification many hours after your blog post went up, which I would also just like to point out—and we spoke about it at the time and it was a pure coincidence—but there was something that was just chef's-kiss perfect about you announcing this on Andy Jassy's birthday. That was just very well done.Yoav: So, we didn't know about Andy's birthday. And it was—Corey: Well, I see only one of us has a company calendar with notable executive birthdays splattered all over it.Yoav: Yes. And it was also published around the time that AWS CISO was announced, which was also a coincidence because the date was chosen a lot of time in advance. So, we genuinely didn't know.Corey: Communicating around these things is always challenging because on the one hand, I can absolutely understand the cloud providers' position on this. We had a vulnerability disclosed to us. We did our diligence and our research because we do an awful lot of things correctly and everyone is going to have vulnerabilities, let's be serious here. I'm not sitting here shaking my fist, angry at AWS's security model. It works, and I am very much a fan of what they do.And I can definitely understand then, going through all of that there was no customer impact, they've proven it. What value is there to them telling anyone about it, I get that. Conversely, you're a security company attempting to stand out in a very crowded market, and it is very clear that announcing things like this demonstrates a familiarity with cloud that goes beyond the common. I radically changed my position on how I thought about Orca based upon these discoveries. It went from, “Orca who,” other than the fact that you folks have sponsored various publications in the past—thanks for that—but okay, a security company. Great to, “Oh, that's Orca. We should absolutely talk to them about a thing that we're seeing.” It has been transformative for what I perceive to be your public reputation in the cloud security space.So, those two things are at odds: The cloud provider doesn't want to talk about anything and the security company absolutely wants to demonstrate a conversational fluency with what is going on in the world of cloud. And that feels like it's got to be a very delicate balancing act to wind up coming up with answers that satisfy all parties.Yoav: So, I just want to underline something. We don't do what we do in order to make a marketing stand. It's a byproduct of our work, but it's not the goal. For the Orca Security Research Pod, which it's the team at Orca which does this kind of research, our mission statement is to make cloud security better for everyone. Not just Orca customers; for everyone.And you get to hear about the more shiny things like big headline vulnerabilities, but we also have very sensible blog posts explaining how to do things, how to configure things and give you more in-depth understanding into security features that the cloud providers themselves provide, which are great, and advance the state of the cloud security. I would say that having a cloud vulnerability is sort of one of those things, which makes me happy to be a cloud customer. On the one side, we had a very big vulnerability with very big impact, and the ability to access a lot of customers' data is conceptually terrifying. The flip side is that everything was mitigated by the cloud providers in warp speed compared to everything else we've seen in all other elements of security. And you get to sleep better knowing that it happened—so no platform is infallible—but still the cloud provider do work for you, and you'll get a lot of added value from that.Corey: You've made a few points when this first came out, and I want to address them. The first is, when I reached out to you with a, “Wow, great work.” You effectively instantly came back with, “Oh, it wasn't me. It was members of my team.” So, let's start there. Who was it that found these things? I'm a huge believer giving people credit for the things that they do.The joy of being in a leadership position is if the company screws up, yeah, you take responsibility for that, whether the company does something great, yeah, you want to pass praise onto the people who actually—please don't take this the wrong way—did the work. And not that leadership is not work, it absolutely is, but it's a different kind of work.Yoav: So, I am a security researcher, and I am very mindful for the effort and skill it requires to find vulnerabilities and actually do a full circle on them. And the first thing I'll mention is Tzah Pahima, which found the BreakingFormation vulnerability and the vulnerability in CloudFormation, and Yanir Tsarimi, which found the AutoWarp vulnerability, which is the Azure vulnerability that we have not mentioned, and the Glue vulnerability, dubbed SuperGlue. Both of them are phenomenal researcher, world-class, and I'm very honored to work with them every day. It's one of my joys.Corey: Couchbase Capella Database-as-a-Service is flexible, full-featured and fully managed with built in access via key-value, SQL, and full-text search. Flexible JSON documents aligned to your applications and workloads. Build faster with blazing fast in-memory performance and automated replication and scaling while reducing cost. Capella has the best price performance of any fully managed document database. Visit couchbase.com/screaminginthecloud to try Capella today for free and be up and running in three minutes with no credit card required. Couchbase Capella: make your data sing.Corey: It's very clear that you have built an extraordinary team for people who are able to focus on vulnerability research. Which, on some level, is very interesting because you are not branded as it were as a vulnerability research company. This is not something that is your core competency; it's not a thing that you wind up selling directly that I'm aware of. You are selling a security platform offering. So, on the one hand, it makes perfect sense that you would have a division internally that works on this, but it's also very noteworthy, I think, that is not the core description of what it is that you do.It is a means by which you get to the outcome you deliver for customers, not the thing that you are selling directly to them. I just find that an interesting nuance.Yoav: Yes, it is. And I would elaborate and say that research informs the product, and the product informs research. And we get to have this fun dance where we learn new things by doing research. We [unintelligible 00:18:08] the product, and we use the customers to teach us things that we didn't know. So, it's one of those happy synergies.Corey: I want to also highlight a second thing that you have mentioned and been very, I guess, on message about since news of this stuff first broke. And because it's easy to look at this and sensationalize aspects of it, where, “See? The cloud providers security model is terrible. You shouldn't use them. Back to data centers we go.” Is basically the line taken by an awful lot of folks trying to sell data center things.That is not particularly helpful for the way that the world is going. And you've said, “Yeah, you should absolutely continue to be in cloud. Do not disrupt your cloud plan as a result.” And let's be clear, none of the rest of us are going to find and mitigate these things with anything near the rigor or rapidity that the cloud providers can and do demonstrate.Yoav: I totally agree. And I would say that the AWS security folks are doing a phenomenal job. I can name a few, but they're all great. And I think that the cloud is by far a much safer alternative than on-prem. I've never seen issues in my on-prem environment which were critical and fixed in such a high velocity and such a massive scale.And you always get the incremental improvements of someone really thinking about all the ins and outs of how to do security, how to do security in the cloud, how to make it faster, more reliable, without a business interruptions. It's just phenomenal to see and phenomenal to witness how far we've come in such a relatively short time as an industry.Corey: AWS in particular, has a reputation for being very good at security. I would argue that, from my perspective, Google is almost certainly slightly better at their security approach than AWS is, but to be clear, both of them are significantly further along the path than I am going to be. So great, fantastic. You also have found something interesting over in the world of Azure, and that honestly feels like a different class of vulnerability. To my understanding, the Azure vulnerability that you recently found was you could get credential material for other customers simply by asking for it on a random high port. Which is one of those—I'm almost positive I'm misunderstanding something here. I hope. Please?Yoav: I'm not sure you're misunderstanding. So, I would just emphasize that the vulnerability again, was found by Yanir Tsarimi. And what he found was, he used a service called Azure Automation which enables you essentially to run a Python script on various events and schedules. And he opened the python script and he tried different ports. And one of the high ports he found, essentially gave him his credentials. And he said, “Oh, wait. That's a really odd port for an HTTP server. Let's try, I don't know, a few ports on either way.” And he started getting credentials from other customers. Which was very surprising to us.Corey: That is understating it by a couple orders of magnitude. Yes, like, “Huh. That seems sub-optimal,” is sort of like the corporate messaging approved thing. At the time you discover that—I'm certain it was a three-minute-long blistering string of profanity in no fewer than four languages.Yoav: I said to him that this is, like, a dishonorable bug because he worked very little to find it. So it was, from start to finish, the entire research took less than two hours, which, in my mind, is not enough for this kind of vulnerability. You have to work a lot harder to get it. So.Corey: Yeah, exactly. My perception is that when there are security issues that I have stumbled over—for example, I gave a talk at re:Invent about it in the before times, one of them was an overly broad permission in a managed IAM policy for SageMaker. Okay, great. That was something that obviously was not good, but it also was more of a privilege escalation style of approach. It wasn't, “Oh, by the way, here's the keys to everything.”That is the type of vulnerability I have come to expect, by and large, from cloud providers. We're just going to give you access credentials for other customers is one of those areas that… it bugs me on a visceral level, not because I'm necessarily exposed personally, but because it more or less shores up so many of the arguments that I have spent the last eight years having with folks are like, “Oh, you can't go to cloud. Your data should live on your own stuff. It's more secure that way.” And we were finally it feels like starting to turn a cultural corner on these things.And then something like that happens, and it—almost have those naysayers become vindicated for it. And it's… it almost feels, on some level, and I don't mean to be overly unkind on this, but it's like, you are absolutely going to be in a better security position with the cloud providers. Except to Azure. And perhaps that is unfair, but it seems like Azure's level of security rigor is nowhere near that of the other two. Is that generally how you're seeing things?Yoav: I would say that they have seen more security issues than most other cloud providers. And they also have a very strong culture of report things to us, and we're very streamlined into patching those and giving credit where credit's due. And they give out bounties, which is an incentives for more research to happen on those platforms. So, I wouldn't say this categorically, but I would say that the optics are not very good. Generally, the cloud providers are much safer than on-prem because you only hear very seldom on security issues in the cloud.You hear literally every other day on issues happening to on-prem environments all over the place. And people just say they expect it to be this way. Most of the time, it's not even a headline. Like, “Company X affected with cryptocurrency or whatever.” It happens every single day, and multiple times a day, breaches which are massively bigger. And people who don't want to be in the cloud will find every reason not to be the cloud. Let us have fun.Corey: One of the interesting parts about this is that so many breaches that are on-prem are just never discovered because no one knows what the heck's running in an environment. And the breaches that we hear about are just the ones that someone had at least enough wherewithal to find out that, “Huh. That shouldn't be the way that it is. Let's dig deeper.” And that's a bad day for everyone. I mean, no one enjoys those conversations and those moments.And let's be clear, I am surprisingly optimistic about the future of Azure Security. It's like, “All right, you have a magic wand. What would you do to fix it?” It's, “Well, I'd probably, you know, hire Charlie Bell and get out of his way,” is not a bad answer as far as how these things go. But it takes time to reform a culture, to wind up building in security as a foundational principle. It's not something you can slap on after the fact.And perhaps this is unfair. But Microsoft has 30 years of history now of getting the world accustomed to oh, yeah, just periodically, terrible vulnerabilities are going to be discovered in your desktop software. And every once a month on Tuesdays, we're going to roll out a whole bunch of patches, and here you go. Make sure you turn on security updates, yadda, yadda, yadda. That doesn't fly in the cloud. It's like, “Oh, yeah, here's this month's list of security problems on your cloud provider.” That's one of those things that, like, the record-scratch, freeze-frame moment of wait, what are we doing here, exactly?Yoav: So, I would say that they also have a very long history of making those turnarounds. Bill Gates famously did his speech where security comes first, and they have done a very, very long journey and turn around the company from doing things a lot quicker and a lot safer. It doesn't mean they're perfect; everyone will have bugs, and Azure will have more people finding bugs into it in the near future, but security is a journey, and they've not started from zero. They're doing a lot of work. I would say it's going to take time.Corey: The last topic I want to explore a little bit is—and again, please don't take this as anyway being insulting or disparaging to your company, but I am actively annoyed that you exist. By which I mean that if I go into my AWS account, and I want to configure it to be secure. Great. It's not a matter of turning on the security service, it's turning on the dozen or so security services that then round up to something like GuardDuty that then, in turn, rounds up to something like Security Hub. And you look at not only the sheer number of these services and the level of complexity inherent to them, but then the bill comes in and you do some quick math and realize that getting breached would have been less expensive than what you're spending on all of these things.And somehow—the fact that it's complex, I understand; computers are like that. The fact that there is—[audio break 00:27:03] a great messaging story that's cohesive around this, I come to accept that because it's AWS; talking is not their strong suit. Basically declining to comment is. But the thing that galls me is that they are selling these services and not inexpensively either, so it almost feels, on some level like, shouldn't this on some of the built into the offerings that you folks are giving us?And don't get me wrong, I'm glad that you exist because bringing order to a lot of that chaos is incredibly important. But I can't shake the feeling that this should be a foundational part of any cloud offering. I'm guessing you might have a slightly different opinion than mine. I don't think you show up at the office every morning, “I hate that we exist.”Yoav: No. And I'll add a bit of context and nuance. So, for every other company than cloud providers, we expect them to be very good at most things, but not exceptional at everything. I'll give the Redshift example. Redshift is a pretty good offering, but Snowflake is a much better offering for a much wider range of—Corey: And there's a reason we're about to become Snowflake customers ourselves.Yoav: So, yeah. And there are a few other examples of that. A security company, a company that is focused solely on your security will be much better suited to help you, in a lot of cases more than the platform. And we work actively with AWS, Azure, and GCP requesting new features, helping us find places where we can shed more light and be more proactive. And we help to advance the conversation and make it a lot more actionable and improve from year to year. It's one of those collaborations. I think the cloud providers can do anything, but they can't do everything. And they do a very good job at security; it doesn't mean they're perfect.Corey: As you folks are doing an excellent job of demonstrating. Again, I'm glad you folks exist; I'm very glad that you are publishing the research that you are. It's doing a lot to bring a lot I guess a lot of the undue credit that I was giving AWS for years of, “No, no, it's not that they don't have vulnerabilities like everyone else does. It just that they don't ever talk about them.” And they're operationalizing of security response is phenomenal to watch.It's one of those things where I think you've succeeded and what you said earlier that you were looking to achieve, which is elevating the state of cloud security for everyone, not just Orca customers.Yoav: Thank you.Corey: Thank you. I really appreciate your taking the time out of your day to speak with me. If people want to learn more, where's the best place they can go to do that?Yoav: So, we have our website at orca.security. And you can reach me out on Twitter. My handle is at @yoavalon, which is @-Y-O-A-V-A-L-O-N.Corey: And we will of course put links to that in the [show notes 00:29:44]. Thanks so much for your time. I appreciate it.Yoav: Thank you, Corey.Corey: Yoav Alon, Chief Technology Officer at Orca Security. I'm Cloud Economist Corey Quinn, and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast platform of choice, or of course on YouTube, smash the like and subscribe buttons because that's what they do on that platform. Whereas if you've hated this podcast, please do the exact same thing, five-star review, smash the like and subscribe buttons on YouTube, but also leave an angry comment that includes a link that is both suspicious and frightening, and when we click on it, suddenly our phones will all begin mining cryptocurrency.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.Announcer: This has been a HumblePod production. Stay humble.

Forbes Česko
Forbes Trojka s Petrem Šimůnkem #052 - Český průmysl, kybernetická bezpečnost a akciové trhy

Forbes Česko

Play Episode Listen Later Apr 15, 2022 42:44


Ahoj, nazdar, dobrý den! Život je bohatý, i když svět kolem nás není momentálně zrovna růžové místo. Český byznys čelí ohromným výzvám: od cen energií přes rozpad dodavatelsých řetězců po kybernetické války. A k tomu všemu se ještě snaží pochopit, co se děje na turbulentích akciových trzích. O zapeklitosti situace si popovídáme s majitelem a členem představensta Brano Group Pavlem Juříčkem, jehož výrobky najdeme jak ve Škodovce, tak ve Volvu či Jaguáru. Válka nejsou jen tanky a raketové střely. Jsou to i hackeři, kteří se přidávají na obě strany konfliktu na Ukrajině a škodí protivníkovi, jak je to jen možné. O záludnostech kyberprostoru jsme si popovídali s Danielem Šafářem z Check Point Software Technologies. Inflace boří rekordy, válka pokračuje a v Číne kvůli covidu zavírají města. Co to dělá s vaším portfoliem? Máte zainvestováno na těch správných místech? To probereme s generálním ředitelem Raiffeisen investiční společnosti Jaromírem Sladkovským.

20 Minute Leaders
Ep762: Amnon Bar-Lev | Co-Founder & CEO, Alike.Health

20 Minute Leaders

Play Episode Listen Later Mar 11, 2022 22:19


Amnon Bar-Lev, co-founder and CEO of Alike Health was the former President at Check Point Software Technologies. Prior to joining Check Point, Amnon was the founder and CEO of Xpert Integrated System Ltd. Amnon began his career in the Israeli Air Force and holds a Bachelor of Arts degree in Computer Science and Management from Tel-Aviv University and has continued his studies at the faculty of medicine, school of graduate studies.

Law, disrupted
Ransomware

Law, disrupted

Play Episode Listen Later Mar 6, 2022 31:47


In this episode of “Law, disrupted”, host John B. Quinn joins David Hobbs, Security Engineering Manager at Check Point Software Technologies. David has over two decades of experience in the security field, working with law enforcement agencies and training intelligence organizations in cyberwar and cyber defense technologies.The discussion begins by explaining what ransomware is and how the software spreads “like a virus” to corrupt systems and encrypt sensitive data. David outlines an increasing threat to public and private companies, drawing attention to a 68% share of US organizations who paid a ransom after experiencing an attack. (Statista 2020)The conversation moves on to dig deeper into who the hackers are, and to understand why a company may get targeted. They highlight noteworthy cyber incidents, and reflect on the 2017 WannaCry ransomware attack, which saw more than 200,000 computers become infected within three days. Together, David and John acknowledge an escalation in Russia-Ukraine cyber activity, and talk through the important steps that can be taken upon noticing—as well as preventing—future ransomware attacks.Created & produced by Podcast Partners: www.podcastpartners.comSign up to receive updates by email when a new episode drops at: www.law-disrupted.fm Music by Alexander Rossi www.alexanderrossi.meProducer www.alexishyde.com

The Route to Networking
E44- Peter McGinnis at Check Point Software Technologies

The Route to Networking

Play Episode Listen Later Feb 8, 2022 58:27


On the 44th episode of the Route to Networking podcast, Zack Mount, the Head of Enterprise Networking Security EMEA at Hamilton Barnes, invited Peter McGinnis on to the show.Peter is the Public Sector Security Engineering Manager at Check Point Software Technologies, Ltd. During this episode, Peter shares his thoughts surrounding the threats that are open to businesses through companies not valuing the importance of Cyber Security. Peter helps us understand the current threats to the industry, due to a lack of skills and people within the industry. He debunks common misconceptions and says that you don't need to be overly technical and have coding ability to enter a position such as his. He advises what type of talent also suits positions within this space.Hear more from Peter via the links below. Twitter handle: @BryantMcGinnisLinkedin URL: https://www.linkedin.com/in/peterbryantmcginnis/

Changing Channels with Larry Walsh
Best of Changing Channels 2021

Changing Channels with Larry Walsh

Play Episode Listen Later Dec 22, 2021 31:52


Changing Channels host Larry Walsh recounts the highlights of 2021's 26 episodes with some of our top guests and industry luminaries. Many people in the world would say that 2021 is not a year they'd want to repeat, given the ongoing pandemic, inflation, and supply-chain disruptions. Suffice it to say that the world is hardly back to normal. But the channel perseveres. In 2021, Changing Channels invited some of the top channel executives and thought leaders to share their experiences and insights on a variety of strategic and operational topics. Over the course of 26 episodes, our guests spoke about enabling fluid workforces, pricing strategies and methodologies, cloud adoption trends, partner enablement, management strategies, international expansion, and much more. Picking our favorite moments from more than 14 hours of conversations wasn't easy, but we did manage to select some memorable highlights, including these: Lori Cornmesser, vice president of worldwide channel sales at CyCognito, on becoming a channel chief again (time mark: 2:06) Christian Alvarez, senior vice president of worldwide channel sales at Nutanix, on building respected key performance indicators (time mark: 5:40) Frank Rauch, head of worldwide channel sales at Check Point Software Technologies, on gaining executive support for channel programs (time mark: 8:20) Joe Sykora, senior vice president of worldwide channel and partner sales at Proofpoint, on the changing dynamics of partner incentives (time mark: 11:34) Alyssa Fitzpatrick, general manager of worldwide partner sales at Microsoft, on the vendor's co-selling strategies (time mark: 13:45) Renee Bergeron, senior vice president and general manager at AppSmart, on enabling partners to sell through marketplaces (time mark: 16:37) Bill Cate, vice president of marketing and channels at Zebra Technologies, on leveraging the influence of non-transacting partners (time mark: 19:04) Mary Beth Walker, head of global channel strategy at HP, on incorporating sustainability as a value proposition in go-to-market strategies and channel programs (time mark: 20:42) Denzil Samuels, vice president of the global CX Partner Practice at Cisco, on making customer experience a core outcome of channel-delivered services (time mark: 24:25) Follow us, Like us, and Subscribe! Channelnomics: https://channelnomics.com/  LinkedIn: https://bit.ly/2NC6Vli  Twitter: https://twitter.com/Channelnomics    Changing Channels Is a Channelnomics Production Follow @Channelnomics to stay current on the latest #research, #bestpractices, and #resources. At @Channelnomics – the voice of thought leadership – we define #channel trends, chart new #GTM strategies, and #partner with industry leaders to champion #diversity in the channel.     Episode Resources Host, Larry Walsh: https://bit.ly/3beZfOa   Guests Lori Cornmesser: https://www.linkedin.com/in/loricornmesser/ Christian Alvarez: https://www.linkedin.com/in/christianaalvarez/ Frank Rauch: https://www.linkedin.com/in/frankrauch/ Joe Sykora: https://www.linkedin.com/in/joesykora/ Alyssa Fitzpatrick: https://www.linkedin.com/in/alysfitz/ Renee Bergeron: https://www.linkedin.com/in/reneebergeron/ Bill Cate: https://www.linkedin.com/in/billcate/ Mary Beth Walker: https://www.linkedin.com/in/mary-beth-walker-a276b2184/ Denzil Samuels: https://www.linkedin.com/in/denzilsamuels/   Credits Production: Changing Channels is produced by Modern Podcasting. For virtual content capture and video-first podcasts, check out http://www.modpodstudio.com. Host Larry Walsh: https://bit.ly/3beZfOa Voice-Over: Denise Quan

CISO's Secrets
Ep.S3E4 - Cindi Carter, Field CISO at Check Point Software Technologies

CISO's Secrets

Play Episode Listen Later Dec 8, 2021 39:07


In this week's episode of CISO's Secret, Cyber Security Evangelist Grant Asplund hosts Cindi Carter, Field CISO at Check Point Software Technologies 

SALT Talks
David Blumberg: Venture Capital Trends | SALT Talks #260

SALT Talks

Play Episode Listen Later Oct 13, 2021 44:44


David Blumberg is the founder and managing partner of Blumberg Capital. David is an authority on early-stage investing with decades of experience. He founded Blumberg Capital in the early 1990s and launched its first venture-backed fund in 2001.Prior to Blumberg Capital, David managed international investments with the Bronfman Family Office, Adler & Co, APAX Partners and at T. Rowe Price. He also launched business development for Check Point Software Technologies as one of its top four executives.——————————————————————Watch this video on YouTube: https://www.youtube.com/c/SALTTube/videosFor podcast transcripts and show notes, visit https://www.salt.org/Moderated by Anthony Scaramucci. Developed, created and produced by SALT Venture Group, LLC.