Dark Mode

    Free Trial

    GYTPOL's Blog

    Why RDP Threats Never Die: A New Twist on an Old Risk

    It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

    Why RDP Threats Never Die: A New Twist on an Old Risk

    It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

    6 min read

    Why Most SMBv1 Fixes Fail — And What to Do Instead

    Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

    Why Most SMBv1 Fixes Fail — And What to Do Instead

    Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

    6 min read

    Why Business-Aligned Cybersecurity Starts With Smart Configurations

    Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

    Why Business-Aligned Cybersecurity Starts With Smart Configurations

    Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

    13 min read
    Image of Linda Ivri
    • 8 min read

    Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

    Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

    Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

    Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

    8 min read
    Image of Jamie Byers
    • 7 min read

    Configuration Drift: The Hidden Threat Eroding Your Security

    Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

    Configuration Drift: The Hidden Threat Eroding Your Security

    Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

    7 min read
    Image of Linda Ivri
    • 7 min read

    From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

    Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

    From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

    Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

    7 min read

    10 Cybersecurity Myths That Could Cost You Everything

    Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

    10 Cybersecurity Myths That Could Cost You Everything

    Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

    19 min read

    What Is CTEM and How Does It Deliver End-to-End Protection?

    Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

    What Is CTEM and How Does It Deliver End-to-End Protection?

    Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

    15 min read
    Image of Linda Ivri
    • 6 min read

    No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

    Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

    No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

    Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

    6 min read

    Insights From Japan: Embracing Proactive Cybersecurity Strategies

    After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

    Insights From Japan: Embracing Proactive Cybersecurity Strategies

    After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

    12 min read