Dark Mode

    Free Trial
    Image of Yakov Kogan
    • 23 min read

    Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    23 min read

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

    9 min read
    Image of Tal Kollender
    • 6 min read

    Legacy Windows Settings: An OS Security Time Bomb

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    Legacy Windows Settings: An OS Security Time Bomb

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    6 min read
    Image of Jake Dillon
    • 8 min read

    Hardening NHS Security With Better Device Configuration

    In today’s digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguar...

    Hardening NHS Security With Better Device Configuration

    In today’s digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguar...

    8 min read

    Thriving Through the Cyber Assessment Framework

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    Thriving Through the Cyber Assessment Framework

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    7 min read

    Get Cyber Essentials Certification

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    Get Cyber Essentials Certification

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    5 min read
    Image of Ilan Mintz
    • 6 min read

    Safe Remediation

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. But it is one of the most critical to manage, as a...

    Safe Remediation

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. But it is one of the most critical to manage, as a...

    6 min read

    Fixating On Automated Fixes

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    Fixating On Automated Fixes

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    5 min read
    Image of Evyatar Beni
    • 2 min read

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    Lateral Movement is the Key Issue

    "We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

    2 min read
    Image of Limor Bakal
    • 4 min read

    Misconfigurations – The Real Vulnerability

    By definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

    Misconfigurations – The Real Vulnerability

    By definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

    4 min read