Dark Mode

Free Trial

The GYTPOL Gazette

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

9 min read
Image of Tal Kollender
  • 6 min read

Legacy Windows Settings: An OS Security Time Bomb

In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

Legacy Windows Settings: An OS Security Time Bomb

In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

6 min read

Is IPv6 Really More Secure Than IPv4?

Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

Is IPv6 Really More Secure Than IPv4?

Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

4 min read
Image of Tal Kollender
  • 2 min read

Taking Follina From Headache to Handled

Earlier this week, a new zero day arrived, it is called Follina (MS Office CVE-2022-30190) and impacts any organization using Microsoft Office.

Taking Follina From Headache to Handled

Earlier this week, a new zero day arrived, it is called Follina (MS Office CVE-2022-30190) and impacts any organization using Microsoft Office.

2 min read
Image of Tal Kollender
  • 4 min read

Managing Active Directory Threats

Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

Managing Active Directory Threats

Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

4 min read

Missing OS Patches? You Leave the Door Wide Open to Hackers

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

Missing OS Patches? You Leave the Door Wide Open to Hackers

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

4 min read

Tal Kollender

GYTPOL's co-Founder & CEO, Tal previously worked as a hacker and held senior cyber positions in the IDF and Dell EMC

Blog Posts by “Tal Kollender”

Image of Tal Kollender
  • 9 min read

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementin...

9 min read
Image of Tal Kollender
  • 6 min read

Legacy Windows Settings: An OS Security Time Bomb

In the fast-paced world of technology, where innovation is a constant, it’s crucial to ens...

6 min read
Image of Tal Kollender
  • 4 min read

Is IPv6 Really More Secure Than IPv4?

Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec i...

4 min read
Image of Tal Kollender
  • 2 min read

Taking Follina From Headache to Handled

Earlier this week, a new zero day arrived, it is called Follina (MS Office CVE-2022-30190)...

2 min read
Image of Tal Kollender
  • 4 min read

Managing Active Directory Threats

Do threats against your Active Directory keep you up at night? Honestly, they should. Acti...

4 min read
Image of Tal Kollender
  • 4 min read

Missing OS Patches? You Leave the Door Wide Open to Hackers

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be th...

4 min read