Blog

Enterprise Cybersecurity Solutions Knowledge Base

Properly Securing Secure Socket Shell (SSH)

Secure Socket Shell (SSH), or Secure Shell, or as most people call it, is a network protocol that..

Phillip Tarrant
Phillip Tarrant
March 23, 2021

How to Make a Check Point Firewall Cluster Give You The Cluster Status in The Expert Prompt

Have you ever logged into a Palo Alto firewall cluster, noticed that it tells you the HA status in..

David Barker
David Barker
March 17, 2021

What We Know: SolarWinds Attack (+Lessons To Be Learned) I Compuquip

As the story continues to unfold and we come to understand more about what really occurred at..

Phillip Tarrant
Phillip Tarrant
February 18, 2021

Docker Forensics: Don't Overlook Misconfigurations.

D ocker is already popular, and with the explosive growth of Kubernetes, it's not going anywhere..

Phillip Tarrant
Phillip Tarrant
February 10, 2021

Tuning and Optimizing Check Point Firewall's Ring Buffer | Compuquip

Is your firewall dropping allowed traffic unexpectedly, without logging? Does it seem like your..

David Barker
David Barker
January 25, 2021

Using the Check Point Remote Installation Daemon for Firewall System Administration

Long a feature of multitasking operating systems, a daemon is a computer program that runs in the..

David Barker
David Barker
October 26, 2020

Why Your Business Needs Cloud Security Posture Management

As a cybersecurity community, we cannot forget about the human aspect of this profession. Even the..

Jose Bormey
Jose Bormey
October 22, 2020

Pros + Cons to Consider Before Migrating to The Cloud

For years now, the thought of migrating to “The Cloud” is one that many organizations shared..

Jose Bormey
Jose Bormey
September 23, 2020

Clearing RAM Cache, Buffer & Swap Space on a Check Point Firewall | CQ

Does your firewall seem like it is always low on memory? Does it get sluggish at times and seem..

David Barker
David Barker
September 21, 2020

Phishing: The Common Culprit

This blog post will describe the concept of Phishing and how attackers configure deceiving sites to..

Abrael Delgado
Abrael Delgado
August 12, 2020

Securing Machine Learning Systems to Avoid Security Risks

If you are an organization that uses machine learning (ML), plans to use ML, or works with vendors..

Lenny Simon
Lenny Simon
August 4, 2020

4 Biggest Worries for Remote Workers and How to Address Them

The COVID-19 pandemic has led to a massive and sudden transition from office-based work to remote..

Eric Dosal
Eric Dosal
July 21, 2020

contact us

Protect your business with our cybersecurity solutions

Elevate your cybersecurity efforts now to prevent costly breaches. Let’s discuss next steps. Complete this form so our IT security professionals can get in touch with you.

Compuquip uses the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at anytime. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, check out our Privacy Policy.

What are you looking for?