<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The anatomy of cloud attacks in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/The-anatomy-of-cloud-attacks/m-p/44217#M3891</link>
    <description>&lt;IFRAME class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FLqCsv9p41_4%3Ffeature%3Doembed&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLqCsv9p41_4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FLqCsv9p41_4%2Fhqdefault.jpg&amp;amp;key=3b4b3cb34e044cb590554f889078322d&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="854" height="480" scrolling="no" frameborder="0" allowfullscreen=""&gt;&lt;/IFRAME&gt;&lt;P&gt;Please don't miss this great video with real examples of customers asking Check Point for help after suffering different attacks in their cloud infrastructures. I hope the lessons are learned&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.youtube.com/watch?v=LqCsv9p41_4&amp;amp;feature=youtu.be" title="https://www.youtube.com/watch?v=LqCsv9p41_4&amp;amp;feature=youtu.be"&gt;Securing Your Cloud With Check Point vSEC - YouTube&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Nov 2017 17:31:03 GMT</pubDate>
    <dc:creator>Javier_Hijas</dc:creator>
    <dc:date>2017-11-23T17:31:03Z</dc:date>
    <item>
      <title>The anatomy of cloud attacks</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/The-anatomy-of-cloud-attacks/m-p/44217#M3891</link>
      <description>&lt;IFRAME class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FLqCsv9p41_4%3Ffeature%3Doembed&amp;amp;url=http%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DLqCsv9p41_4&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FLqCsv9p41_4%2Fhqdefault.jpg&amp;amp;key=3b4b3cb34e044cb590554f889078322d&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="854" height="480" scrolling="no" frameborder="0" allowfullscreen=""&gt;&lt;/IFRAME&gt;&lt;P&gt;Please don't miss this great video with real examples of customers asking Check Point for help after suffering different attacks in their cloud infrastructures. I hope the lessons are learned&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://www.youtube.com/watch?v=LqCsv9p41_4&amp;amp;feature=youtu.be" title="https://www.youtube.com/watch?v=LqCsv9p41_4&amp;amp;feature=youtu.be"&gt;Securing Your Cloud With Check Point vSEC - YouTube&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 17:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/The-anatomy-of-cloud-attacks/m-p/44217#M3891</guid>
      <dc:creator>Javier_Hijas</dc:creator>
      <dc:date>2017-11-23T17:31:03Z</dc:date>
    </item>
  </channel>
</rss>

