Dark Mode

    Free Trial

    Surprising Stats & Industry Insights for the Cybersecurity Strategist

    In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses f...

    Surprising Stats & Industry Insights for the Cybersecurity Strategist

    In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses f...

    7 min read
    Image of Evyatar Beni
    • 10 min read

    5 Cyber Blessings to Reflect on This Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    5 Cyber Blessings to Reflect on This Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    10 min read

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    11 min read
    Image of Eden Aizenkot
    • 11 min read

    Tales From the Encrypt: Horror Stories of Endpoint Insecurity

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    Tales From the Encrypt: Horror Stories of Endpoint Insecurity

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    11 min read

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    9 min read

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    9 min read

    Top 3 Everyday Mistakes Undermining Device Configuration Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    Top 3 Everyday Mistakes Undermining Device Configuration Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    14 min read

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    8 min read
    Image of Eden Aizenkot
    • 5 min read

    The Dark Knights of Digital Defense

    For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

    The Dark Knights of Digital Defense

    For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

    5 min read
    Image of Yakov Kogan
    • 23 min read

    Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    23 min read