Episodes
In this episode, PhoneBoy talks about fraud and how to be resilient against it.
6 types of fraud to remain aware of (and other trends)10 ways to reduce your risk of cyber fraudQuantum SASE
Published 12/01/23
In this episode, PhoneBoy covers three stories:
Kerberoasting attacks explained (and how to prevent them)7 actionable security automation best practices5 emerging malware threats, record-breaking malware activity
Published 11/16/23
In this episode, PhoneBoy talks about the challenges with ensuring security with open-source software, which is in many products and services you use today.
Published 11/04/23
In this episode, PhoneBoy talks with Aaron Brongersma about his exploration of AI tools, the issues with data residency and AI, the societal issues with AI, AI as a Service, and a few words about Quantum SASE.
Published 10/28/23
Some questions and answers around Blockchain Security from our TechTalk on Blockchain Security.
Published 10/13/23
PhoneBoy talks to Adam Gray, CTO of Novacoast about how ChatGPT is used by threat actors to compromise systems, the GPT-4 System Card, where ChatGPT seems to be useful in general with respect to cyber security, ChatGPT writing legal briefs, what early search engines and ChatGPT have in common, and how the more some things change, the more they stay the same.
Published 10/07/23
A discussion between Check Point's Chief Strategy Officer Itai Greenberg and Idan Levin, Partner at Collider Ventures about the security trends related to blockchain security.
Published 09/22/23
In this episode, PhoneBoy talks to Adam Gray, CTO of Novacoast to discuss some of what he's seen as part of their MSSP operations, including Living off the Land attacks, how AI is being actively used to exploit vulnerabilities, mobile security, CIS Controls, browser extensions, the data modern cars collect and share, password managers being a source of compromise, biometrics, why organizations use MSSPs like Pillr, automation and orchestration, vulnerability management, and Windows XP still...
Published 09/16/23
In this episode, I talk about how over-provisioning identities in the cloud leads to "shadow access" by malicious actors...and what you can do about it.
Eight Key Success Factors for Cloud-Native Application Protection (CNAPP)CloudGuard Cloud Native Application Protection Platform
Published 08/31/23
In this episode, PhoneBoy talks about some of the more rogue uses of GPT-like tools.
ChatGPT generates 'convincing' fake scientific article'DarkBERT' GPT-Based Malware Trains Up on the Entire Dark WebThe WormGPT case: How Generative artificial intelligence (AI) can improve the capabilities of cybercriminals and allows them to launch sophisticated attacksLowering the Bar(d)? Check Point Research’s security analysis spurs concerns over Google Bard’s limitations
Published 08/17/23
In this episode, PhoneBoy talks with Aaron Brongersma about the challenges of ensuring your code is secure, particularly when people who traditionally haven't written code are having to do so to leverage certain technologies like ChatGPT.
VSCode Security: Malicious Extensions Detected- More Than 45,000 Downloads- PII Exposed, and Backdoors Enabled
Published 08/04/23
Ralph Bonnell did a great session on DNS as a CheckMates TechTalk. You can access the materials (including some Q&A) here.
Published 07/28/23
In this episode, PhoneBoy covers a few recent stories related to the legal and cybersecurity issues related to generative AIs such as ChatGPT.
Highly effective responses to the alarming democratization of AIBreaking GPT-4 Bad: Check Point Research Exposes How Security Boundaries Can Be Breached as Machines Wrestle with Inner ConflictsAuthors Accuse OpenAI of Using Pirate Sites to Train ChatGPT
Published 07/19/23
Cyber Security Evangelist Ashwin Ram talks about ChatGPT in the context of Artificial Intelligence and the Evolving Threat Landscape.
Full TechTalk: https://community.checkpoint.com/t5/General-Topics/AI-and-the-Evolving-Threat-Landscape-TechTalk-Video-Slides-and-Q/m-p/181992/highlight/true#M30319
Published 06/01/23
Another series of headlines from our friends at CyberTalk.org
What is purple teaming and why is it useful?One easy way to secure your Android6 simple & straightforward Cyber Monday fraud prevention tipsCanada advances cyber security via Indo-Pacific Strategy
Published 12/01/22
Second in a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We discuss some of his tips in this episode.
The book I mentioned in this section: Building Internet Firewalls 2nd Edition.
Published 10/31/22
Some articles from our friends at CyberTalk.org about passwords, phishing, and passkeys.
20 Password Management Best Practices10 Signs of Phishing for Anyone Who Champions Security5 Steps to Mitigate Credential Exposure RisksThis is How We Will Replace Passwords in the Near Future…
Published 10/24/22
First of a series on business data and how organizations can protect it. Mazhar Hamayun is a Security Engineer with Check Point and a member of the Office of the CTO who covered this topic on CyberTalk.org. We begin the series by discussing what business data is, where it might reside, who might want it that shouldn't, and why.
Published 10/21/22
Some recent headlines from our friends at CyberTalk.org:
FOMO on the latest cyber security tech?8 mistakes CIOs make and how to avoid themAmerican Airlines learns breach caused by phishingAdware installed 13 million times + how to uninstall it
Published 10/03/22
Part 2 of my conversation with Cyber Security Evangelist Eddie Doyle about how organizations can create a culture of cyber security that goes beyond just the technical people, and it's easier than you think!
Miller's Law
Published 09/26/22
From our friends at CyberTalk.org:
How to prevent sneaky zero day attacks on fleets of smartphonesCISO’s Guide to Mobile SecurityHackers could crash power grids, but they’re mostly after…10 mind-boggling cyber security statistics (and they might scare you)7 actionable CISO strategies for effective executive-level communication
Published 09/19/22
PhoneBoy talks with Cyber Security Evangelist Eddie Doyle about how organizations can create a culture of cyber security that goes beyond just the technical people, and it's easier than you think!
Published 09/12/22
Some recent CISO-focused headlines from our friends at CyberTalk:
5 key traits of highly effective CISOs6 different types of CISOs and the environments they thrive inZero Trust Segmentation: A primer for CISOs
Published 09/02/22
Part 2 of 2 of our conversation with Check Point Evangelist Mark Ostrowski about how to protect yourself from the threats out there today.
Full TechTalk here: https://community.checkpoint.com/t5/Threat-Prevention/Malware-2021-to-Present-Day-Building-a-Preventative-Cyber/m-p/152918#M4011
Published 08/22/22
We're going to try something a little different with PhoneBoy reading and commenting on a few articles from CyberTalk.org. If you like this format, let us know by commenting!
Links:
SmokeLoader distributes Amadey malware, what you need to knowXiaomi Phone Bug, Payment Forgery Researching Xiaomi's TEE to get Chinese Money Healthcare Payer CISO Shares Real World InsightsMailChimp Breach Exposes Email Addresses and Callback Phishing 10 Key Facts About Callback Phishing Attacks
Published 08/18/22