2020
2019
2017
2016
- Which Comes First, the Ports or the Application ID?
- Networks Without Borders
- Get Over Windows Defender Already, AV Vendors!
- A Word About Competition In The Information Security Industry
- Is Past (Security) Performance Indicative of Future Results?
- Do You Really Need Threat Intelligence?
- Resisting Comparison
- Good Password Hygiene Key To Protecting Social Media Accounts
- Infosec-Related Insights From Flash Foresight
- How To Separate Security Solutions from Snake Oil
- Old Password Breaches are New Again
- CPX 2016 Chicago Post-Mortem
- VirusTotal: Not a Replacement for Real Threat Prevention
- Prevention: The More Things Change, The More They Stay The Same
- The Great Cloud Migration: Existential Threat or Opportunity?
- Why Check Point Security Management Is Still The Gold Standard
- The Importance of Responsible Disclosure
- A Macro-Sized Problem In The Enterprise
- Who'll Stop The Evaders?
- Apple vs. The FBI Demonstrates Convenience Versus Security
- Apple, FBI, and The Case Against Mobile Device Management
- FireEye: Indemnification That's Basically Worthless
- My Podcasts on Apple and the FBI Backdoor Requests
- Can Apple Actually Comply With The FBI Request To Allow Bruteforcing Pin Codes?
- The FBI Wants Apple To Backdoor Their Products, They Said No.
- Why Can't I Choose What to SSL Inspect Based on Application?
- Why I'm in Information Security, Apple Epoch Reboot Loop Edition
- Security: At What Cost?
- FUD and Cybersecurity Marketing
- The Security Industry: Lead By Example
- Prevention vs. Detection: It's Not Either Or
- Third Party Validation Of Security Solutions Now More Important Than Ever
- Marketing, Information Security, and The Jobs To Be Done
- Turkish Clicker: Another Reason Even Offical App Stores Aren't Guaranteed Free Of Malware
- Not All Security Vulnerabilities Are Created Equal
2015
- Bridging The Information Security Gap
- Cybersecurity: Protection From an Existential Threat
- The Security Impediment
- Palo Alto Networks Is Evading The Truth
- The Start of my Information Security Career 20 Years Ago
- Now on Github Pages, New RSS Feed Location
- Shouldn't a Security Gateway Be Secure By Default?
- Marketing Hype and Security Technology That Actually Works
- Bringing Order To The Chaos Of Information Security
- Why SSL Decryption Is Important
- There's a Nintendo Wii-U Sized Hole In My Firewall
- All The Security Tools In The World Won't Help If You Don't Do This
- The Right Way To Inspect SSH Connections
- Lies, Damn Lies, and Inspecting SSH Traffic Securely
- Breaches Are Inevitable, Or Are They?
- PhoneBoy Speaks, The Information Security Edition
- How To Start Google Chrome In Incognito Mode On Windows
2014
- The Department of Yes
- What is Palo Alto Networks Afraid Of?
- "Hacking" iCloud for Deleted Celebrity Nudes
- Fun with Check Point Dynamic IP Gateways in R77.20 with Gaia
- A More Balanced View of Check Point ClusterXL Load Sharing
- URL Change for PhoneBoy's Security Theater
- Should You Fret About Mobile Security?
- If Only App Control Were Around When Pointcast Was A Thing
- No Good For Workloads? Depends on the Workload.
- Growing Up With Check Point
2013
- Blast from the CHKP Past: Can't Talk to Translated IP from Internal Net
- The TSA and A Lesson in Data Loss Prevention
- Sample Link Post
- FireWall-1 User Interface from 3.0
- Blast from the CHKP Past: Can't Get Putkeys to Work
- Moving The Security Theater Elsewhere
- Fun with Compliance
- Post with Large Feature Image and Text
- Check Point 600 Appliance: Big Security for Small Business
- Check Point 2013 Security Report
- How to Not Be Like Burger King. Or Jeep.
- Securing Data in the Cloud
- How to Catch People Outsourcing Their Own Jobs
- Zen and the Art of Malware Detection
- In Information Security, Trust Matters
- Unsafe At Any Version?
2012
2011
- Securing Mobile Devices May Be Impossible
- Check Point: R75.20, SecurityPower, and New Appliances
- Thinking About Mobile Security
- ZoneAlarm’s Newest Security Solution: SocialGuard
- Gil Shwed: "The [security] industry needs to change a little bit"
- CPshared and CPUG: A Couple of Observations
- Announcing CPshared: The Open Technical Forum for all things Check Point
- The Cisco Valet: Easy Setup, but is it Secure?
- Speaking IPv6
2010
- Check Point R75 Now Available
- Using Firesheep is Illegal. So What?
- Unencrypted Access Needs To Die
- Mobile Security Isn't The Same on All Platforms
- Gil Shwed says Check Point isn't for sale
- Schneier on Security: Stuxnet
- Apple Stopping Jailbreakers? Please.
- How to Protect Yourself From Facebook Places
- Friends Can Check You In Places on Facebook. Here's How to Fix That.
- Check Point and Crossbeam Expand Partnership
- Apple Can Kill Your Phone Remotely?
- The SysAdmin's Creed
- Check Point Abra: Your Office In Your Pocket
2009
- Airports: Neither Secure Nor Convenient
- Let it Ra1n, Let it Sn0w on my iPhone
- The Dangers of Social Networking
- PhoneBoy @ VMworld 2009, Security Gateway R70 Virtual Edition
- It's Midnight, Do You Know What Your Corporate Security Policy Is?
- Pics from RSA Conference 2009 at Moscone
- It’s Official: PhoneBoy Now Works For Check Point
- Dad, Please Unblock This Website!
- The Long Goodbye
- Where Does The IPS Go?
- Humbled
- Even PhoneBoy Can't Fix Hardware Problems
- Watching All The Cameras At The Inaguration
- Finding a Needle When You Can't Look in the Haystack
- Security Folks: Let's Not Forget The Dialup Users
- Watch for Domain Scammers like ZipDomains
- The Academy Home: Network Security for Normal Users
2008
- Coverage of Check Point Acquisition of Nokia's Security Appliance Business
- Verizon Wireless: No Excuse For Data Security Issue
- Nokia Firewall, VPN, and IPSO Configuration Guide Now Available
- The Academy Relaunches Website
- Nokia Spinning Off Security Appliance Division
- Bypassing the Internet Filters
- Product Leaks And What Can Be Done
- Linux On A Flash Drive
- SecurID Over SMS: Sign Me Up!
- Nokia IP1280: Dealing Deep Layer Enterprise Security Threats Another Blow
- iSkoot for S60 Upgraded: Obscured by SSL
- iSkoot Pulls S60 Build, Plans To Push Fix 30 April 2008
- iSkoot Will Fix The Encryption Issue On Nokia S60 Client
- Proof of iSkoot Passing Credentials In The Clear
- iSkoot Transmits Your Data In The Clear
- New Apps And The Joy Of Corporate Networks
- Nokia Announces IP2450 Intrusion Prevention With Sourcefire
- 11-Year Old Becomes Network Administrator For Private School
- The Academy: Video How-Tos On Network Security Products
- Why I Don't Leave My Bluetooth On
- How To Get Check Point Secure Client Working With Sprint EVDO
- Malware Hits (Older) Nokia Handsets Again
2007
- Fooling Fingerprint Scanners
- Federating Identity Tokens
- Is There Such A Thing As Effective Parental Controls?
- Quechup Spam
- PayPal Security Key
- Cross-Site Request Forgery And You
- Almost a CISSP!
- Officially Certifiable
- A .bank Domain To End Phishing? Get Real!
- I Took My CISSP Exam Today
- Pirate Bay Gets Pwned
- Quicktime-Java Attack Vector Reported
- The Mac Was Hacked? Really?
- Mired in CISSP and Remote Conferencing
- Fun with Check Point SecureClient and Windows Batch Files
- WiFi and Windows XP Tips
- My Response to the Whisher Folks
- ZTE BAVO™ Home Gateway Mobile Router (EVDO/HSDPA)
- Going for the CISSP