Dark Mode

Free Trial

GYTPOL's Blog

Why RDP Threats Never Die: A New Twist on an Old Risk

It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

Why RDP Threats Never Die: A New Twist on an Old Risk

It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

6 min read

Why Most SMBv1 Fixes Fail — And What to Do Instead

Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

Why Most SMBv1 Fixes Fail — And What to Do Instead

Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

5 min read

Why Business-Aligned Cybersecurity Starts With Smart Configurations

Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

Why Business-Aligned Cybersecurity Starts With Smart Configurations

Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

13 min read
Image of Linda Ivri
  • 7 min read

From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

7 min read

10 Cybersecurity Myths That Could Cost You Everything

Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

10 Cybersecurity Myths That Could Cost You Everything

Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

19 min read

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

9 min read

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

18 min read

GYTPOL: Deployed on AWS

We’re excited to share that GYTPOL can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor st...

GYTPOL: Deployed on AWS

We’re excited to share that GYTPOL can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor st...

3 min read

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

8 min read

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

10 min read