Dark Mode

Free Trial

GYTPOL's Blog

Image of Jamie Byers
  • 7 min read

Configuration Drift: The Hidden Threat Eroding Your Security

Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

Configuration Drift: The Hidden Threat Eroding Your Security

Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

7 min read
Image of Linda Ivri
  • 7 min read

From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

7 min read

10 Cybersecurity Myths That Could Cost You Everything

Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

10 Cybersecurity Myths That Could Cost You Everything

Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

16 min read

What Is CTEM and How Does It Deliver End-to-End Protection?

Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

What Is CTEM and How Does It Deliver End-to-End Protection?

Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

15 min read
Image of Linda Ivri
  • 6 min read

No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

6 min read

Insights From Japan: Embracing Proactive Cybersecurity Strategies

After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

Insights From Japan: Embracing Proactive Cybersecurity Strategies

After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

12 min read

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

9 min read

Lessons in Lexicon: A Dictionary of Key Cybersecurity Terms

If you’re a decision-maker, security partner, or even just curious about the world of cyber, our dictionary of cybersecurity terms will help you speak the language, ask sharper questions, an...

Lessons in Lexicon: A Dictionary of Key Cybersecurity Terms

If you’re a decision-maker, security partner, or even just curious about the world of cyber, our dictionary of cybersecurity terms will help you speak the language, ask sharper questions, an...

74 min read

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

18 min read

What Is Cyber Hygiene and Why Does It Matter?

Cyber hygiene refers to the regular, ongoing practices and foundational safeguards that implemented to proactively maintain the health and security of an organization's digital environments ...

What Is Cyber Hygiene and Why Does It Matter?

Cyber hygiene refers to the regular, ongoing practices and foundational safeguards that implemented to proactively maintain the health and security of an organization's digital environments ...

9 min read