Dark Mode

Free Trial
Image of Eden Aizenkot
  • 9 min read

How Misconfigured Security Can End up Costing You

From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

How Misconfigured Security Can End up Costing You

From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

9 min read

Best Practices for a Bullet-Proof Endpoint Configuration Audit

In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

Best Practices for a Bullet-Proof Endpoint Configuration Audit

In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

11 min read
Image of Eden Aizenkot
  • 11 min read

Tales From the Encrypt: Horror Stories of Endpoint Insecurity

Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

Tales From the Encrypt: Horror Stories of Endpoint Insecurity

Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

11 min read

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

9 min read

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

9 min read
Image of Eden Aizenkot
  • 5 min read

The Dark Knights of Digital Defense

For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

The Dark Knights of Digital Defense

For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

5 min read
Image of Yakov Kogan
  • 23 min read

Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

Automatically Fixing CrowdStrike BSOD Issue on vSphere VMs

On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

23 min read
Image of Evyatar Beni
  • 2 min read

Lateral Movement is the Key Issue

"We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

Lateral Movement is the Key Issue

"We were forced to change and we did the best we could to keep the business alive during that massive change, but we know things were missed. It would be impossible not to have had something...

2 min read

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

9 min read
Image of Tal Kollender
  • 6 min read

Legacy Windows Settings: An OS Security Time Bomb

In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

Legacy Windows Settings: An OS Security Time Bomb

In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

6 min read