Dark Mode

Free Trial

The GYTPOL Gazette

Hardening Without Headache: Practical Lessons from Gartner® Research

When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

Hardening Without Headache: Practical Lessons from Gartner® Research

When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

5 min read

GYTPOL: Deployed on AWS

We’re excited to share that GYTPOL can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor st...

GYTPOL: Deployed on AWS

We’re excited to share that GYTPOL can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor st...

3 min read

Calling for SaaS Security Reform

When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

Calling for SaaS Security Reform

When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

8 min read

Overlook Enterprise Browser Security At Your Own Peril

Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

Overlook Enterprise Browser Security At Your Own Peril

Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

15 min read
Image of Ilan Mintz
  • 8 min read

Using CIS As A Rosetta Stone for Configuration Compliance

Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

Using CIS As A Rosetta Stone for Configuration Compliance

Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

8 min read

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

8 min read

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

10 min read

It's Time To Automate PCI DSS Compliance

According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

It's Time To Automate PCI DSS Compliance

According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

7 min read

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

6 min read

Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

9 min read