Dark Mode

Free Trial

The GYTPOL Gazette

Image of Evyatar Beni
  • 2 min read

Lateral Movement is the Key Issue

"We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

Lateral Movement is the Key Issue

"We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

2 min read

Are Configuration Changes Costing You Too Much Time?

A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a computer program that violates a configuration policy or that permits or causes unintended behavior tha...

Are Configuration Changes Costing You Too Much Time?

A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a computer program that violates a configuration policy or that permits or causes unintended behavior tha...

4 min read
Image of Evyatar Beni
  • 2 min read

Simple Steps To Stop Privilege Escalation from Moving Laterally

In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

Simple Steps To Stop Privilege Escalation from Moving Laterally

In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

2 min read
Image of Evyatar Beni
  • 3 min read

The Cached Credentials Saga: Alls Well That Ends Well

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts ...

The Cached Credentials Saga: Alls Well That Ends Well

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage. This normally happens unnoticed as the platform trusts ...

3 min read

Evyatar Beni

A proven leader, Evyatar brings over a decade of experience in Customer Success & Cyber Strategy.

Blog Posts by “Evyatar Beni”

Image of Evyatar Beni
  • 2 min read

Lateral Movement is the Key Issue

"We were forced to change and we did the best we could to keep the business alive during t...

2 min read
Image of Evyatar Beni
  • 4 min read

Are Configuration Changes Costing You Too Much Time?

A refresher: what is a misconfiguration? Well, NIST defines it as: “A setting within a com...

4 min read
Image of Evyatar Beni
  • 2 min read

Simple Steps To Stop Privilege Escalation from Moving Laterally

In my previous article I wrote about the importance of monitoring all endpoints in the org...

2 min read
Image of Evyatar Beni
  • 3 min read

The Cached Credentials Saga: Alls Well That Ends Well

When hackers are successful in accessing user credentials, they can access the resources o...

3 min read