Dark Mode

    Free Trial
    Image of Evyatar Beni
    • 10 min read

    5 Cyber Blessings to Reflect on This Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    5 Cyber Blessings to Reflect on This Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    10 min read
    Image of Evyatar Beni
    • 2 min read

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    2 min read

    Are Configuration Changes Costing You Too Much Time?

    A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a computer program that violates a configuration policy or that permits or causes unintended behavior tha...

    Are Configuration Changes Costing You Too Much Time?

    A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a computer program that violates a configuration policy or that permits or causes unintended behavior tha...

    4 min read
    Image of Evyatar Beni
    • 2 min read

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

    2 min read
    Image of Evyatar Beni
    • 3 min read

    The Cached Credentials Saga: Alls Well That Ends Well

    When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts ...

    The Cached Credentials Saga: Alls Well That Ends Well

    When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts ...

    3 min read

    Evyatar Beni

    A proven leader, Evyatar brings over a decade of experience in Customer Success & Cyber Strategy. Previously, Evyatar led Technical Account Managers at Claroty; before which he filled several distinguished tech roles in the Intelligence Services.

    Blog Posts by “Evyatar Beni”

    Image of Evyatar Beni
    • 10 min read

    5 Cyber Blessings to Reflect on This Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebr...

    10 min read
    Image of Evyatar Beni
    • 2 min read

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during t...

    2 min read
    Image of Evyatar Beni
    • 4 min read

    Are Configuration Changes Costing You Too Much Time?

    A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a com...

    4 min read
    Image of Evyatar Beni
    • 2 min read

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    In my previous article I wrote about the importance of monitoring all endpoints in the org...

    2 min read
    Image of Evyatar Beni
    • 3 min read

    The Cached Credentials Saga: Alls Well That Ends Well

    When hackers are successful in accessing user credentials, they can access the resources o...

    3 min read