Dark Mode

Free Trial

The GYTPOL Gazette

Who Owns Configuration Security?

Configuration security is not sexy. WIsh that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

Who Owns Configuration Security?

Configuration security is not sexy. WIsh that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

5 min read
Image of Mor Bikovsky
  • 10 min read

5 Cyber Blessings to Reflect on This Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

5 Cyber Blessings to Reflect on This Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

10 min read
Image of Mor Bikovsky
  • 3 min read

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

3 min read
Image of Mor Bikovsky
  • 3 min read

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments.

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments.

3 min read

Mor Bikovsky

Mor draws on more than a decade of cyber and business strategy experience to lead GYTPOL's Partner Strategy.

Blog Posts by “Mor Bikovsky”

Image of Mor Bikovsky
  • 5 min read

Who Owns Configuration Security?

Configuration security is not sexy. WIsh that it were, but it just isn’t. As it is, it rar...

5 min read
Image of Mor Bikovsky
  • 10 min read

5 Cyber Blessings to Reflect on This Thanksgiving

As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebr...

10 min read
Image of Mor Bikovsky
  • 3 min read

Moving to the Cloud? Leave NTLM Behind

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you shou...

3 min read
Image of Mor Bikovsky
  • 3 min read

What Is Endpoint Configuration Security

Configuration. It seems obvious. We all have to do it when setting up and maintaining our ...

3 min read