Dark Mode

    Free Trial
    Image of Mor Bikovsky
    • 3 min read

    Moving to the Cloud? Leave NTLM Behind

    In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

    Moving to the Cloud? Leave NTLM Behind

    In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

    3 min read
    Image of Mor Bikovsky
    • 3 min read

    What Is Endpoint Configuration Security

    Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments. In fact, some would say it is the most fundamental and the basic building blocks requi...

    What Is Endpoint Configuration Security

    Configuration. It seems obvious. We all have to do it when setting up and maintaining our environments. In fact, some would say it is the most fundamental and the basic building blocks requi...

    3 min read

    Mor Bikovsky

    Mor draws on more than a decade of cyber and business strategy experience to lead GYTPOL's Partner Strategy. Before joining GYTPOL, Mor led Global BD efforts for Claroty and filled a variety of key technology roles for Israel's intelligence services.

    Blog Posts by “Mor Bikovsky”

    Image of Mor Bikovsky
    • 3 min read

    Moving to the Cloud? Leave NTLM Behind

    In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you shou...

    3 min read
    Image of Mor Bikovsky
    • 3 min read

    What Is Endpoint Configuration Security

    Configuration. It seems obvious. We all have to do it when setting up and maintaining our ...

    3 min read