Dark Mode

Free Trial

GYTPOL's Blog

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

10 min read

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

9 min read

Top 3 Everyday Configuration Mistakes Undermining Device Security

Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

Top 3 Everyday Configuration Mistakes Undermining Device Security

Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

15 min read

Are These Issues Hampering Your Hardening Efforts?

The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

Are These Issues Hampering Your Hardening Efforts?

The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

8 min read
Image of Eden Aizenkot
  • 5 min read

The Dark Knights of Digital Defense

For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

The Dark Knights of Digital Defense

For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

5 min read
Image of Yakov Kogan
  • 23 min read

Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

23 min read

Black Basta: Adversary Analysis

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

Black Basta: Adversary Analysis

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

15 min read
Image of Bar Shay
  • 6 min read

Defending Against RegreSSHion (CVE-2024-6387)

After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

Defending Against RegreSSHion (CVE-2024-6387)

After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

6 min read
Image of Inbal Pearlson
  • 6 min read

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

6 min read
Image of Nitsan Ben Nun
  • 7 min read

Streamlining the Configuration Security Lifecycle

In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

Streamlining the Configuration Security Lifecycle

In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

7 min read