Dark Mode

Free Trial

The GYTPOL Gazette

Image of Mor Bikovsky
  • 13 min read

When Security Assets Become Security Liabilities

In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

When Security Assets Become Security Liabilities

In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

13 min read

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

5 min read
Image of Mor Bikovsky
  • 10 min read

5 Blessings to Reflect on This Cyber Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

5 Blessings to Reflect on This Cyber Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

10 min read
Image of Mor Bikovsky
  • 3 min read

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

3 min read
Image of Mor Bikovsky
  • 3 min read

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments.

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments.

3 min read

Mor Bikovsky

Mor draws on more than a decade of cyber and business strategy experience to lead GYTPOL's Partner Strategy.

Blog Posts by “Mor Bikovsky”

Image of Mor Bikovsky
  • 13 min read

When Security Assets Become Security Liabilities

In the fight for sustained security, operators rely on a variety of tools and technologies...

13 min read
Image of Mor Bikovsky
  • 5 min read

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rar...

5 min read
Image of Mor Bikovsky
  • 10 min read

5 Blessings to Reflect on This Cyber Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebr...

10 min read
Image of Mor Bikovsky
  • 3 min read

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you shou...

3 min read
Image of Mor Bikovsky
  • 3 min read

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our ...

3 min read