Overview
Explore
Labs
Services
Events
Partners
Select a tab
52 results found
Check Point and the Post-Quantum Transition
Quantum computing's rise threatens classical cryptography, prompting urgent shifts to post-quantum cryptography (PQC). Check Point leads this transition with quantum-ready solutions, ensuring secure communications through hybrid key exchanges and cryptographic agility. As PQC standards evolve, Check Point's architecture promises seamless adaptation, safeguarding digital infrastructures against future quantum threats.
Blog
•Oct 29, 2025
Complete guide to Check Point Network Address Translation
A comprehensive guide to Check Point Network Address Translation (NAT), covering concepts, configuration, automatic and manual NAT, static and hide NAT, ARP, NAT tables, and best practices. Designed as a definitive learning resource with practical examples, troubleshooting tips, and advanced scenarios for real-world deployments.
Blog
•Oct 9, 2025
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
MITRE ATT&CK vs. Cybersecurity Kill Chain: A Simple Breakdown
In the third installment of the "Grizzled CyberVet: Practical Cybersecurity" collection, we compare and contrast the Cybersecurity Kill Chain and MITRE ATT&CK Framework.
Blog
•Nov 13, 2024
Secure Cloud: Complete - Uncover Risks in the Cloud
Secure Cloud: Complete offers a 21-day analysis of your cloud environment, enhancing visibility and security through integrated tools like Wiz, Cyera and Illumio. This unified accelerator identifies risks, maps data and visualizes traffic, empowering organizations to refine cloud strategies and accelerate digital initiatives without disrupting existing operations.
Blog
•Aug 21, 2025
Enhancing K-12 Network Security Through Segmentation and Modern Infrastructure
K-12 and library network and wireless systems need enhanced segmentation through modern infrastructure today more than ever! In my post, I provide some clear reasons and guidance on enhancing these critical infrastructure components. I explain why it is important to implement new modern infrastructure underlay and overlay systems and what they can do to help enhance the security of staff, students and xIOT components on the supported network systems.
Blog
•Sep 1, 2025
Part 1- Bridging Kubernetes, Cilium, & eBPF to Networking Concepts for Network Engineers
As cloud-native technologies continue to converge with traditional networking in the data center and enterprise, understanding how Kubernetes, Cilium and eBPF work is crucial for network engineers. Hybrid mesh firewalls are the latest trend, and distributed firewalls (like Cisco's Hypershield) are emerging in the market.
Blog
•Mar 6, 2025
How Secure Is Voice Traffic in Your Contact Center?
Contact centers and voice calling have expanded the attack surface. While CISOs and cyber security leaders are doing their best to defend against bad actors, voice calling is a vulnerability that is often overlooked.
Blog
•Jan 3, 2024
Understanding Cisco ISE 3.x and the Benefits of Migrating from ISE 2.x to 3.x
Cisco Identity Services Engine (ISE) 3.x represents a significant upgrade over its predecessor, Cisco ISE 2.x, offering a host of new features, improved performance and enhanced security capabilities. This blog post delves into the key features of Cisco ISE 3.x and highlights the benefits of migrating from earlier versions, providing a thorough understanding of why this upgrade is essential for modern network environments.
Blog
•May 6, 2025
The MITRE ATT&CK Framework: A Beginner's Guide
As part of the "Grizzled CyberVet: Practical Cybersecurity" collection, we examine the MITRE ATT&CK framework. We simplify and explain this framework used by attackers to compromise your digital ecosystem.
Blog
•Nov 11, 2024
Cisco Firewalls are Hot Right Now and Here's Why!
With a lot of good news around Cisco Secure Firewalls recently, we decided to put them to the test, ATC style!
Blog
•Dec 20, 2024
Part 2- Bridging Kubernetes, Cilium & eBPF to Networking Concepts for Network Engineers
As cloud-native technologies continue to converge with traditional networking in the data center and enterprise, understanding how Kubernetes, Cilium and eBPF works is crucial for network engineers. With hybrid mesh firewalls being the latest trend, and distributed firewalls (like Cisco's Hypershield) emerging in the market. Understanding how Kubernetes transforms traditional IP networking concepts into a dynamic, software-defined environment is crucial. This article demystifies Kubernetes security, making it accessible for network engineers familiar with ACLs and VLANs. You may think this doesn't apply to you, but if you're planning a firewall refresh anytime soon, then these concepts will need to be part of your vernacular going forward.
Blog
•Mar 13, 2025