DiscoverCheckMates Go: Cyber Security Podcast from Check Point
CheckMates Go: Cyber Security Podcast from Check Point
Claim Ownership

CheckMates Go: Cyber Security Podcast from Check Point

Author: Check Point CheckMates

Subscribed: 144Played: 1,671
Share

Description

Learn about Cyber Security topics through brief, informal conversations with experts from Check Point. Topics include: Incident Response, Customer Success Stories, Cyber Security Trends and Technologies.
88 Episodes
Reverse
A discussion between Check Point's Chief Strategy Officer Itai Greenberg and Idan Levin, Partner at Collider Ventures about the security trends related to blockchain security.
In this episode, PhoneBoy talks to Adam Gray, CTO of Novacoast to discuss some of what he's seen as part of their MSSP operations, including Living off the Land attacks, how AI is being actively used to exploit vulnerabilities, mobile security, CIS Controls, browser extensions, the data modern cars collect and share, password managers being a source of compromise, biometrics, why organizations use MSSPs like Pillr, automation and orchestration, vulnerability management, and Windows XP still being in use. 
In this episode, I talk about how over-provisioning identities in the cloud leads to "shadow access" by malicious actors...and what you can do about it.Eight Key Success Factors for Cloud-Native Application Protection (CNAPP)CloudGuard Cloud Native Application Protection Platform
S05E05: RogueGPT

S05E05: RogueGPT

2023-08-1708:51

In this episode, PhoneBoy talks about some of the more rogue uses of GPT-like tools.ChatGPT generates 'convincing' fake scientific article'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark WebThe WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated attacksLowering the Bar(d)? Check Point Research’s security analysis spurs concerns over Google Bard’s limitations
In this episode, PhoneBoy talks with Aaron Brongersma about the challenges of ensuring your code is secure, particularly when people who traditionally haven't written code are having to do so to leverage certain technologies like ChatGPT.VSCode Security: Malicious Extensions Detected- More Than 45,000 Downloads- PII Exposed, and Backdoors Enabled
S05E03: DNS Attacks

S05E03: DNS Attacks

2023-07-2843:59

Ralph Bonnell did a great session on DNS as a CheckMates TechTalk. You can access the materials (including some Q&A) here.
S05E02: CheckMates GPT

S05E02: CheckMates GPT

2023-07-1911:58

In this episode, PhoneBoy covers a few recent stories related to the legal and cybersecurity issues related to generative AIs such as ChatGPT.Highly effective responses to the alarming democratization of AIBreaking GPT-4 Bad: Check Point Research Exposes How Security Boundaries Can Be Breached as Machines Wrestle with Inner ConflictsAuthors Accuse OpenAI of Using Pirate Sites to Train ChatGPT
Cyber Security Evangelist Ashwin Ram talks about ChatGPT in the context of Artificial Intelligence and the Evolving Threat Landscape.Full TechTalk: https://community.checkpoint.com/t5/General-Topics/AI-and-the-Evolving-Threat-Landscape-TechTalk-Video-Slides-and-Q/m-p/181992/highlight/true#M30319 
Another series of headlines from our friends at CyberTalk.orgWhat is purple teaming and why is it useful?One easy way to secure your Android6 simple & straightforward Cyber Monday fraud prevention tipsCanada advances cyber security via Indo-Pacific Strategy
Second in a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We discuss some of his tips in this episode.The book I mentioned in this section: Building Internet Firewalls 2nd Edition. 
Some articles from our friends at CyberTalk.org about passwords, phishing, and passkeys.20 Password Management Best Practices10 Signs of Phishing for Anyone Who Champions Security5 Steps to Mitigate Credential Exposure RisksThis is How We Will Replace Passwords in the Near Future…
First of a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We begin the series by discussing what business data is, where it might reside, who might want it that shouldn't, and why.
Some recent headlines from our friends at CyberTalk.org:FOMO on the latest cyber security tech?8 mistakes CIOs make and how to avoid themAmerican Airlines learns breach caused by phishingAdware installed 13 million times + how to uninstall it
Part 2 of my conversation with Cyber Security Evangelist Eddie Doyle about how organizations can create a culture of cyber security that goes beyond just the technical people, and it's easier than you think!Miller's Law
From our friends at CyberTalk.org:How to prevent sneaky zero day attacks on fleets of smartphonesCISO’s Guide to Mobile SecurityHackers could crash power grids, but they’re mostly after…10 mind-boggling cyber security statistics (and they might scare you)7 actionable CISO strategies for effective executive-level communication
PhoneBoy talks with Cyber Security Evangelist Eddie Doyle about how organizations can create a culture of cyber security that goes beyond just the technical people, and it's easier than you think!
S04E04: CISO Headlines

S04E04: CISO Headlines

2022-09-0216:07

Some recent CISO-focused headlines from our friends at CyberTalk:5 key traits of highly effective CISOs6 different types of CISOs and the environments they thrive inZero Trust Segmentation: A primer for CISOs
Part 2 of 2 of our conversation with Check Point Evangelist Mark Ostrowski about how to protect yourself from the threats out there today.Full TechTalk here: https://community.checkpoint.com/t5/Threat-Prevention/Malware-2021-to-Present-Day-Building-a-Preventative-Cyber/m-p/152918#M4011 
We're going to try something a little different with PhoneBoy reading and commenting on a few articles from CyberTalk.org. If you like this format, let us know by commenting!Links:SmokeLoader distributes Amadey malware, what you need to knowXiaomi Phone Bug, Payment Forgery Researching Xiaomi's TEE to get Chinese Money Healthcare Payer CISO Shares Real World InsightsMailChimp Breach Exposes Email Addresses and Callback Phishing 10 Key Facts About Callback Phishing Attacks
S04E01: Malware Rising

S04E01: Malware Rising

2022-08-0125:29

Part 1 of 2 with Check Point Evangelist Mark Ostrowski on the state of malware over the last 18 months or so. Full TechTalk here: https://community.checkpoint.com/t5/Threat-Prevention/Malware-2021-to-Present-Day-Building-a-Preventative-Cyber/m-p/152918#M4011 
loading
Comments 
Download from Google Play
Download from App Store