Dark Mode

Free Trial

The GYTPOL Gazette

Image of Inbal Pearlson
  • 6 min read

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

6 min read
Image of Inbal Pearlson
  • 3 min read

The Cached Credentials Saga: How to Defend Against Pass-the-Hash Exploits

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

The Cached Credentials Saga: How to Defend Against Pass-the-Hash Exploits

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

3 min read

Inbal Pearlson

Driving growth through Success, Inbal guides Customer Journeys for GYTPOL. Combining technical expertise with a customer-centric approach, Inbal adds value across implementation, adoption, and expansion.

Blog Posts by “Inbal Pearlson”

Image of Inbal Pearlson
  • 6 min read

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s wh...

6 min read
Image of Inbal Pearlson
  • 3 min read

The Cached Credentials Saga: How to Defend Against Pass-the-Hash Exploits

When hackers are successful in accessing user credentials, they can access the resources o...

3 min read