Learn about Cyber Security topics through brief, informal conversations with experts from Check Point. Topics include: Incident Response, Customer Success Stories, Cyber Security Trends and Technologies.
Product Manager Bar Yassure discusses what we did to improve performance and stability in the E88.70 release of Harmony Endpoint.
A talk given by Morten Sørensen on Network Segmentation at CPX 2025 in Vienna.
An except from Tim Hall's Be Your Own TAC Part Deux session on User-Space Performance Pack (UPPAK) for Quantum Security Gateways.
An excerpt from a session with Danny Jung, Cyber Security Evangelist at SITS Group at CPX 2025 Vienna: Maestro for Everyone!
Some recent threads on CheckMates worth further discussion.
An excerpt of our No Suits No Ties session on recovering from a Ransomware outbreak.
An excerpt of our Infinity Identity TechTalk done back at the end of October.
An excerpt from our GenAI Security TechTalk from September.
An excerpt from our recent No Suit No Ties session from Incident Response called Vulnerabilities and Workarounds, where we explore a compelling case study in which attackers exploited vulnerabilities in an internet-facing device to gain initial access, escalate privileges, conduct reconnaissance, and infiltrate the internal network.
PhoneBoy talks about a paper written by Antoinette Hodes called Pay Now or Pay Later, understanding the costly consequences of neglecting OT/ICS Cybersecurity.
PhoneBoy talks about the new features and functionality in the R82 release for Quantum Security Gateways and Management.
An excerpt from a great TechTalk we did back in June on Threat Hunting with Memory Forensics given by Monnappa who also teaches Check Point's Threat Hunting Using Memory Forensics course.
NO SUITS, NO TIES aims to shed light on how Check Point MDR and Incident Response Analysts play a pivotal role in proactively identifying and responding to these threats when they are least expected.
This is an an audio version of our first No Suits, No Ties session entitled Going Equipped To Compromise where we discuss real-world examples from real cases where ‘utilities’ were and are being used in compromise incidents.
PhoneBoy talks about some recent topics on the CheckMates community:
In this episode, we'll discuss some new features in Harmony Endpoint as well as best practices for deployment. These are excerpts from recent TechTalks:
In this episode, we discuss a handful of recent threads on CheckMates including:
SKs mentioned:
In this episode, we talk about how Check Point has shifted the paradigm in Email Security. This is an except from our Paradigm Shift TechTalk back in May.
In this episode, we talk about how Check Point has shifted the paradigm in Cloud Security. This is an except from our Paradigm Shift TechTalk back in May.
PhoneBoy discuses some recent threads in the CheckMates Cyber Security Community:
Referenced SKs:
The latest news in 4 minutes updated every hour, every day.
An unlicensed lizard psychologist travels the universe talking to strangers about absolutely nothing. TO CALL THE GECKO: follow me on https://www.twitch.tv/lyleforever to get a notification for when I am taking calls. I am usually live Mondays, Wednesdays, and Fridays but lately a lot of other times too. I am a gecko.
The official podcast of comedian Joe Rogan.
The Clay Travis and Buck Sexton Show. Clay Travis and Buck Sexton tackle the biggest stories in news, politics and current events with intelligence and humor. From the border crisis, to the madness of cancel culture and far-left missteps, Clay and Buck guide listeners through the latest headlines and hot topics with fun and entertaining conversations and opinions.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations. Follow now to get the latest episodes of Dateline NBC completely free, or subscribe to Dateline Premium for ad-free listening and exclusive bonus content: DatelinePremium.com