Dark Mode

    Free Trial

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    11 min read

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    9 min read

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    9 min read

    Top 3 Everyday Mistakes Undermining Device Configuration Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    Top 3 Everyday Mistakes Undermining Device Configuration Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    14 min read

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    8 min read
    Image of Ilan Mintz
    • 14 min read

    Thinking Strategically: Cyber Process

    Albert Einstein once said, “If I were given one hour to save the planet, I would spend 59 minutes defining the problem and one minute resolving it.”

    Thinking Strategically: Cyber Process

    Albert Einstein once said, “If I were given one hour to save the planet, I would spend 59 minutes defining the problem and one minute resolving it.”

    14 min read

    Ilan Mintz

    A full-stack marketer with over 10 years of experience helping startups build brands for global success, Ilan's a firm believer in the transformative power of a well-crafted story. Ilan excels at generating human connection to and through technology and relishes opportunities for creative thinking and problem-solving. Ilan’s favorite things include his family, obscure facts, philosophy, gardening, and believing that this year will finally be different for the Minnesota Vikings.

    Blog Posts by “Ilan Mintz”

    Image of Ilan Mintz
    • 11 min read

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cann...

    11 min read
    Image of Ilan Mintz
    • 9 min read

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. ...

    9 min read
    Image of Ilan Mintz
    • 9 min read

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but i...

    9 min read
    Image of Ilan Mintz
    • 14 min read

    Top 3 Everyday Mistakes Undermining Device Configuration Security

    Device configurations are one of the most important elements of your organizational securi...

    14 min read
    Image of Ilan Mintz
    • 8 min read

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren'...

    8 min read
    Image of Ilan Mintz
    • 14 min read

    Thinking Strategically: Cyber Process

    Albert Einstein once said, “If I were given one hour to save the planet, I would spend 59 ...

    14 min read