Learn about Cyber Security topics through brief, informal conversations with experts from Check Point. Topics include: Incident Response, Customer Success Stories, Cyber Security Trends and Technologies.
A discussion between Check Point's Chief Strategy Officer Itai Greenberg and Idan Levin, Partner at Collider Ventures about the security trends related to blockchain security.
In this episode, PhoneBoy talks to Adam Gray, CTO of Novacoast to discuss some of what he's seen as part of their MSSP operations, including Living off the Land attacks, how AI is being actively used to exploit vulnerabilities, mobile security, CIS Controls, browser extensions, the data modern cars collect and share, password managers being a source of compromise, biometrics, why organizations use MSSPs like Pillr, automation ...
In this episode, I talk about how over-provisioning identities in the cloud leads to "shadow access" by malicious actors...and what you can do about it.
In this episode, PhoneBoy talks about some of the more rogue uses of GPT-like tools.
In this episode, PhoneBoy talks with Aaron Brongersma about the challenges of ensuring your code is secure, particularly when people who traditionally haven't written code are having to do so to leverage certain technologies like ChatGPT.
In this episode, PhoneBoy covers a few recent stories related to the legal and cybersecurity issues related to generative AIs such as ChatGPT.
Cyber Security Evangelist Ashwin Ram talks about ChatGPT in the context of Artificial Intelligence and the Evolving Threat Landscape.
Full TechTalk: https://community.checkpoint.com/t5/General-Topics/AI-and-the-Evolving-Threat-Landscape-TechTalk-Video-Slides-and-Q/m-p/181992/highlight/true#M30319
Second in a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We discuss some of his tips in this episode.
The book I mentioned in this section: Building Internet Firewalls 2nd Edition.
Some articles from our friends at CyberTalk.org about passwords, phishing, and passkeys.
First of a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We begin the series by discussing what business data is, where it might reside, who might want it that shouldn't, and why.
From our friends at CyberTalk.org:
Part 2 of 2 of our conversation with Check Point Evangelist Mark Ostrowski about how to protect yourself from the threats out there today.
Full TechTalk here: https://community.checkpoint.com/t5/Threat-Prevention/Malware-2021-to-Present-Day-Building-a-Preventative-Cyber/m-p/152918#M4011
We're going to try something a little different with PhoneBoy reading and commenting on a few articles from CyberTalk.org. If you like this format, let us know by commenting!
Part 1 of 2 with Check Point Evangelist Mark Ostrowski on the state of malware over the last 18 months or so.
Current and classic episodes, featuring compelling true-crime mysteries, powerful documentaries and in-depth investigations.
If you can never get enough true crime... Congratulations, you’ve found your people.
NFL.com's "Around the NFL" crew (Gregg Rosenthal, Dan Hanzus and Marc Sessler) break down the latest football news, with a dash of mirth.
If you've ever wanted to know about champagne, satanism, the Stonewall Uprising, chaos theory, LSD, El Nino, true crime and Rosa Parks, then look no further. Josh and Chuck have you covered.
Listen to 'The Bobby Bones Show' by downloading the daily full replay.