Blogs

A Tangible Return – Remediating ...

A Tangible Return – Remediating Misconfigurations   A refresher: what is a misconfiguration ? Well, NIST defines it as: “A setting within a computer program that violates a ...

Are IPv6 Security enhancements ...

Myth: "IPv6 Security enhancements (such as IPsec) makes it safer than IPv4" Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network ...

#StartupsOnAzure – Azure Tools ...

Read Microsoft for Startups Founders Hub talk about how Gytpol are using our credits to access a wide array of Azure services to help level up their ...

A Microsoft for Start Up’s ...

Start locally, expand globally – Tal Kollender, CEO and co-founder of Gytpol talks to Microsoft for Start Ups , about what drove her to start her own Company - ...

Cybernews – features GYTPOL ...

We created Gytpol for those in need of next-generation protection from cyberattacks by using hacker logic to stop cyber security breaches. Our company specializes in the development of a ...

Follina detection and remediation ...

See how Gytpol detects and remediates Follina with zero impact   Once again, Gytpol is the only solution in the market to provide a full remediation to this unresolved zero ...

Cybernews Interview with Tal Kollender

Cybernews interviews our very own Tal Kollender about GYTPOL on how hackers exploit OS security gaps due to misconfigurations. Read the article here https://cybernews.com/

Log4J / Log4Shell – GYTPOL ...

Log4Shell . The latest vulnerability is causing a cybersecurity meltdown in the security community. It’s been 12 months to the day since FireEye announced that they were victim of the now ...

Safe Remediation

Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with.  But it is one of the most critical to manage, as a ...