Dark Mode

Free Trial

The GYTPOL Gazette

Are You Cyber Smart? Take Our Pop Quiz

We've created a short 6-question quiz overviewing the current state of affairs with respect to enterprise cybersecurity. The quiz is designed to offer a quick, dare we say fun, reprieve from...

Are You Cyber Smart? Take Our Pop Quiz

We've created a short 6-question quiz overviewing the current state of affairs with respect to enterprise cybersecurity. The quiz is designed to offer a quick, dare we say fun, reprieve from...

1 min read
Image of Mor Bikovsky
  • 13 min read

When Security Assets Become Security Liabilities

In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

When Security Assets Become Security Liabilities

In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

13 min read
Image of Eden Aizenkot
  • 11 min read

Tales From the Encrypt: Horror Stories of Endpoint Insecurity

Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

Tales From the Encrypt: Horror Stories of Endpoint Insecurity

Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

11 min read

Black Basta: Adversary Analysis

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

Black Basta: Adversary Analysis

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

15 min read
Image of Inbal Pearlson
  • 6 min read

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

Lateral Movement is the Key Issue

In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

6 min read

Are You Forgetting Operating Systems In Your Patching Cycle?

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

Are You Forgetting Operating Systems In Your Patching Cycle?

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

4 min read