Some recent (and not so) recent threads on CheckMates worth further discussion.Properly defining the Internet within a security policy, let's discuss!NAT TipAnyDesk - on DHS Compliant versionsk182752: Harmony Endpoint Client blocks AnyDeskvpnconfig alt...
An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access,...
PhoneBoy talks about a paper written by Antoinette Hodes called Pay Now or Pay Later, understanding the costly consequences of neglecting OT/ICS Cybersecurity.https://www.checkpoint.com/solutions/iot-security/https://www.industrialcybersecuritypulse.co...
PhoneBoy talks about the new features and functionality in the R82 release for Quantum Security Gateways and Management.Now that R82 is out, how about an AI generated podcast about it?R82 Quantum Security Management Administration Guide: Self Managed S...
An excerpt from a great TechTalk we did back in June on Threat Hunting with Memory Forensics given by Monnappa who also teaches Check Point's Threat Hunting Using Memory Forensics course.
NO SUITS, NO TIES aims to shed light on how Check Point MDR and Incident Response Analysts play a pivotal role in proactively identifying and responding to these threats when they are least expected.This is an an audio version of our first No Suits, No...
PhoneBoy talks about some recent topics on the CheckMates community:DNS forwarding for Internal DomainFun with Check Point Dynamic IP Gateways in R77.20 with GaiaHow to create object for private cloud Kubernetes on SmartConsoleHow to read packet-captur...