Blogs

Lateral Movement is the Key Issue

Black Hat USA 2021 was pretty sparsely attended but to be honest we enjoyed the show! Having finally gotten home it took me a week or so to decompress from all the travel and the meetings but I ...

Misconfigurations – The Real ...

As a definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.  Hackers in most ...

AD Threats

Active Directory Threats Do threats against your infrastructure’s Active Directory security keep you up at night? Honestly, it should. Active Directory is critical as it controls access to ...

Cyber Workout

Cyber Workout I like to work out! I got the bug when I was serving in the armed forces and it has stuck with me ever since.  I enjoy different and difficult types of exercise that ...

Cyber Soap

Cyber Soap As a follow on to our last write up about an effective digital vaccine we thought it would be worth pointing out a few facts about a critical topic in the health arena. Soap. ...

Stopping cyber pandemics with a ...

Stopping cyber pandemics with a digital vaccine Let’s be honest, ransomware is a pandemic. A pandemic of epic proportions. Think about this WannaCry spread at a rate of roughly 140 ...

Customer Testimonial Check Point ...

  Customer Testimonial: Check Point Technologies Jony Fischbein, Global CISO at Check Point Technologies talks about how GYTPOL is helping his organization protect their endpoints ...

Customer Testimonial: New American ...

  Customer Testimonial: New American Funding Jeff Farinich, SVP Technology & CISO at New American Funding talks about how GYTPOL is helping his organization protect their ...

Scripts

 Scripts When you're missing a security check and decide to implement it yourself. Scripts The common method to gather some values when your current security products lacking. ...