Dark Mode

    Free Trial

    GYTPOL's Blog

    Remedio Named Among Gartner® Cool Vendors™ In Cyber-Physical Systems Security 2025 Report

    We may have known it for a while, but now we are officially cool! Remedio was just named a Gartner Cool Vendor in Cyber-Physical Systems Security.

    Remedio Named Among Gartner® Cool Vendors™ In Cyber-Physical Systems Security 2025 Report

    We may have known it for a while, but now we are officially cool! Remedio was just named a Gartner Cool Vendor in Cyber-Physical Systems Security.

    5 min read

    Remedio Raises $65M to Usher in a New Era of Device Posture Management

    Six years ago, we set out with a simple but ambitious mission: to make enterprise devices safer — not just monitored. We built carefully, profitably, and independently, guided by the belief ...

    Remedio Raises $65M to Usher in a New Era of Device Posture Management

    Six years ago, we set out with a simple but ambitious mission: to make enterprise devices safer — not just monitored. We built carefully, profitably, and independently, guided by the belief ...

    5 min read
    Image of Linda Ivri
    • 15 min read

    How Misconfiguration Attacks Are Breaking Enterprises

    Security leaders invest heavily in the front door: phishing defenses, malware detection, patch management, the works. And then they think they’re safe. But it’s the misconfigurations quietly...

    How Misconfiguration Attacks Are Breaking Enterprises

    Security leaders invest heavily in the front door: phishing defenses, malware detection, patch management, the works. And then they think they’re safe. But it’s the misconfigurations quietly...

    15 min read

    Outcome-Driven Metrics: Making Cybersecurity Make Cents

    If a threat falls in the SOC and no one ties it to revenue, does it really make a sound? That’s the challenge security leaders face every day: finding an impactful way to translate cyber ris...

    Outcome-Driven Metrics: Making Cybersecurity Make Cents

    If a threat falls in the SOC and no one ties it to revenue, does it really make a sound? That’s the challenge security leaders face every day: finding an impactful way to translate cyber ris...

    10 min read
    Image of Linda Ivri
    • 9 min read

    Why Smart Configurations Are Key to Implementing Least Privilege

    Picture the legendary Metropolitan Opera House on opening night. The air hums with anticipation as elegantly dressed guests take their seats, each ticket granting access to one specific spot...

    Why Smart Configurations Are Key to Implementing Least Privilege

    Picture the legendary Metropolitan Opera House on opening night. The air hums with anticipation as elegantly dressed guests take their seats, each ticket granting access to one specific spot...

    9 min read

    When Plaintext Passwords Cost Millions: Misconfig & Supply Chain Risks

    In cybersecurity, the smallest missteps can lead to the biggest breaches. Take British Airways: a global airline worth over $17 billion, with robust systems and sophisticated infrastructure ...

    When Plaintext Passwords Cost Millions: Misconfig & Supply Chain Risks

    In cybersecurity, the smallest missteps can lead to the biggest breaches. Take British Airways: a global airline worth over $17 billion, with robust systems and sophisticated infrastructure ...

    5 min read

    Active Directory: Security Gaps and the Silent Risks You Can't Ignore

    Active Directory (AD) is the powerhouse of the enterprise — the central hub where identity, access, and control converge. Yet despite its critical role, AD generally flies under the radar un...

    Active Directory: Security Gaps and the Silent Risks You Can't Ignore

    Active Directory (AD) is the powerhouse of the enterprise — the central hub where identity, access, and control converge. Yet despite its critical role, AD generally flies under the radar un...

    10 min read

    Back to School, Back to Basics: Cyber Hygiene 101

    As backpacks get packed and classrooms fill up, it’s the perfect time for businesses to go back to school, too. Not for algebra—but for cybersecurity. While today’s digital threats are evolv...

    Back to School, Back to Basics: Cyber Hygiene 101

    As backpacks get packed and classrooms fill up, it’s the perfect time for businesses to go back to school, too. Not for algebra—but for cybersecurity. While today’s digital threats are evolv...

    2 min read

    Strong Foundations: Why Builders Must Embrace Device Hardening

    In the world of construction, complexity is the norm. From project sites scattered across geographies to legacy OT systems integrated with modern cloud environments, these sectors rely on a ...

    Strong Foundations: Why Builders Must Embrace Device Hardening

    In the world of construction, complexity is the norm. From project sites scattered across geographies to legacy OT systems integrated with modern cloud environments, these sectors rely on a ...

    8 min read

    From Burgers to Breaches: What McDonald’s Data Leak Can Teach Us

    Security teams are constantly walking a tightrope — enabling growth while minimizing risk. Most eyes are on the usual suspects: ransomware gangs, zero-day exploits, phishing campaigns. But t...

    From Burgers to Breaches: What McDonald’s Data Leak Can Teach Us

    Security teams are constantly walking a tightrope — enabling growth while minimizing risk. Most eyes are on the usual suspects: ransomware gangs, zero-day exploits, phishing campaigns. But t...

    7 min read

    Pinning Down An Evolving Role: The Definitive CISO Job Description

    When it comes to IT security, risk mitigation, incident response, and cyber crisis management, the buck stops with the Chief Information Security Officer (CISO). As the enterprise’s top cybe...

    Pinning Down An Evolving Role: The Definitive CISO Job Description

    When it comes to IT security, risk mitigation, incident response, and cyber crisis management, the buck stops with the Chief Information Security Officer (CISO). As the enterprise’s top cybe...

    17 min read
    Image of Linda Ivri
    • 12 min read

    A Compliance Calendar to Navigate Deadlines with Confidence & Clarity

    Compliance is a moving target shaped by global regulations, evolving threats, and constantly constrained internal resources. But when compliance deadlines slip through the cracks, the conseq...

    A Compliance Calendar to Navigate Deadlines with Confidence & Clarity

    Compliance is a moving target shaped by global regulations, evolving threats, and constantly constrained internal resources. But when compliance deadlines slip through the cracks, the conseq...

    12 min read

    Why RDP Threats Never Die: A New Twist on an Old Risk

    It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

    Why RDP Threats Never Die: A New Twist on an Old Risk

    It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

    6 min read

    Why Most SMBv1 Fixes Fail — And What to Do Instead

    Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

    Why Most SMBv1 Fixes Fail — And What to Do Instead

    Every organization has its unfinished business. For too many, it's SMBv1. Even years after Microsoft deprecated it, SMBv1 still lingers in enterprise networks — often out of sight, but not o...

    6 min read

    Why Business-Aligned Cybersecurity Starts With Smart Configurations

    Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

    Why Business-Aligned Cybersecurity Starts With Smart Configurations

    Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

    13 min read
    Image of Matt Rowe
    • 8 min read

    Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

    Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

    Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

    Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

    8 min read
    Image of Jamie Byers
    • 7 min read

    Configuration Drift: The Hidden Threat Eroding Your Security

    Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

    Configuration Drift: The Hidden Threat Eroding Your Security

    Things just don't seem to stay how they're meant to. It's a problems familiar to most people in the world of enterprise IT and Security. And in 2005 it was a problem for the Burnet Institute...

    7 min read
    Image of Linda Ivri
    • 7 min read

    From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

    Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

    From Hacker to CEO: Tal Kollender's Mission to Secure Configurations

    Most cybersecurity startups don’t go from napkin sketch to profitable business without a single dollar of outside funding. But then again, most startups aren’t led by Tal Kollender.

    7 min read

    10 Cybersecurity Myths That Could Cost You Everything

    Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

    10 Cybersecurity Myths That Could Cost You Everything

    Myths and misconceptions can be dangerous, especially in the world of cybersecurity. From treating group policies like gym memberships to the conviction that it just won't happen to you, the...

    19 min read

    What Is CTEM and How Does It Deliver End-to-End Protection?

    Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

    What Is CTEM and How Does It Deliver End-to-End Protection?

    Not every risk has a CVE, and not all weaknesses can be patched. Misconfigurations, overly permissive access settings, unsafe protocols, and unenforced policies often fall outside traditiona...

    15 min read
    Image of Linda Ivri
    • 6 min read

    No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

    Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

    No More Mr. Nice Corp: Coca-Cola's Refusal to Pay Ransomware Bullies

    Five days to decide. That’s all the Everest ransomware gang gave Coca-Cola. A countdown, a threat, and a promise: Pay up, or we expose everything. Visa scans. Passport copies. Salary details...

    6 min read

    Insights From Japan: Embracing Proactive Cybersecurity Strategies

    After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

    Insights From Japan: Embracing Proactive Cybersecurity Strategies

    After decades taking the same (largely reactive) tack as the rest of the world, Japan is now flipping the script and perhaps setting a new cyber standard for others to emulate, passing a law...

    12 min read

    Last Mile Cybersecurity

    In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

    Last Mile Cybersecurity

    In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

    9 min read

    Lessons in Lexicon: A Dictionary of Key Cybersecurity Terms

    If you’re a decision-maker, security partner, or even just curious about the world of cyber, our dictionary of cybersecurity terms will help you speak the language, ask sharper questions, an...

    Lessons in Lexicon: A Dictionary of Key Cybersecurity Terms

    If you’re a decision-maker, security partner, or even just curious about the world of cyber, our dictionary of cybersecurity terms will help you speak the language, ask sharper questions, an...

    76 min read

    Checking All the Boxes: How to Evaluate Endpoint Security Vendors

    In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

    Checking All the Boxes: How to Evaluate Endpoint Security Vendors

    In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

    18 min read

    What Is Cyber Hygiene and Why Does It Matter?

    Cyber hygiene refers to the regular, ongoing practices and foundational safeguards that implemented to proactively maintain the health and security of an organization's digital environments ...

    What Is Cyber Hygiene and Why Does It Matter?

    Cyber hygiene refers to the regular, ongoing practices and foundational safeguards that implemented to proactively maintain the health and security of an organization's digital environments ...

    9 min read

    Hardening Without Headache: Practical Lessons from Gartner® Research

    When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

    Hardening Without Headache: Practical Lessons from Gartner® Research

    When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

    5 min read

    Remedio: Deployed on AWS

    We’re excited to share that Remedio can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor s...

    Remedio: Deployed on AWS

    We’re excited to share that Remedio can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor s...

    4 min read

    Security Controls Aren’t Failing — They’re Just Misconfigured

    The sheer volume of security tools in today’s enterprise IT environments disguise a critical truth: more tools don’t equal better protection. This was among the key takeaways from Gartner®'s...

    Security Controls Aren’t Failing — They’re Just Misconfigured

    The sheer volume of security tools in today’s enterprise IT environments disguise a critical truth: more tools don’t equal better protection. This was among the key takeaways from Gartner®'s...

    10 min read

    Calling for SaaS Security Reform

    When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

    Calling for SaaS Security Reform

    When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

    8 min read

    Overlook Enterprise Web Security At Your Own Peril

    Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

    Overlook Enterprise Web Security At Your Own Peril

    Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

    15 min read
    Image of Ilan Mintz
    • 8 min read

    Using CIS As A Rosetta Stone for Configuration Compliance

    Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

    Using CIS As A Rosetta Stone for Configuration Compliance

    Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

    8 min read
    Image of Mor Bikovsky
    • 12 min read

    Building Resilience in Vulnerability Management: Lessons Beyond CVEs

    On April 16, 2025, the global cybersecurity community came alarmingly close to losing a foundational pillar of its vulnerability management infrastructure: the MITRE CVE program. With fundin...

    Building Resilience in Vulnerability Management: Lessons Beyond CVEs

    On April 16, 2025, the global cybersecurity community came alarmingly close to losing a foundational pillar of its vulnerability management infrastructure: the MITRE CVE program. With fundin...

    12 min read

    Conflict to Clarity: How PDS Health Harmonizes Security & Operations

    It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

    Conflict to Clarity: How PDS Health Harmonizes Security & Operations

    It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

    8 min read

    How HIT Leaders Balance Cyber & Business Continuity Risks

    Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

    How HIT Leaders Balance Cyber & Business Continuity Risks

    Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

    10 min read
    Image of Linda Ivri
    • 30 min read

    Top Cybersecurity Conferences to Attend in H2 2025

    As we move further into 2025, H2 planning is in full swing. If industry conferences aren't already part of that plan, now's the time to reconsider.

    Top Cybersecurity Conferences to Attend in H2 2025

    As we move further into 2025, H2 planning is in full swing. If industry conferences aren't already part of that plan, now's the time to reconsider.

    30 min read

    Are You Cyber Smart? Take Our Pop Quiz

    We've created a short 6-question quiz overviewing the current state of affairs with respect to enterprise cybersecurity. The quiz is designed to offer a quick, dare we say fun, reprieve from...

    Are You Cyber Smart? Take Our Pop Quiz

    We've created a short 6-question quiz overviewing the current state of affairs with respect to enterprise cybersecurity. The quiz is designed to offer a quick, dare we say fun, reprieve from...

    1 min read
    Image of Linda Ivri
    • 15 min read

    The Power of Women in Security: Redefining Cyber Leadership

    Women’s History Month is a time to celebrate the fairer sex's contributions to the workforce and advocate for greater representation.

    The Power of Women in Security: Redefining Cyber Leadership

    Women’s History Month is a time to celebrate the fairer sex's contributions to the workforce and advocate for greater representation.

    15 min read

    It's Time To Automate PCI DSS Compliance

    According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

    It's Time To Automate PCI DSS Compliance

    According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

    7 min read
    Image of Mor Bikovsky
    • 13 min read

    When Security Assets Become Security Liabilities

    In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

    When Security Assets Become Security Liabilities

    In the fight for sustained security, operators rely on a variety of tools and technologies to help get the job done — but without strategic alignment, consistent oversight, and proper integr...

    13 min read

    Who Owns Configuration Security?

    Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

    Who Owns Configuration Security?

    Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

    6 min read

    Windows 10 EoSL Is Coming: Now What?

    For those operating Windows 10 based machines, the clock's running out. With Windows 10 EoSL (End of Service Life) set for October 14, 2025, technical support — including critical security p...

    Windows 10 EoSL Is Coming: Now What?

    For those operating Windows 10 based machines, the clock's running out. With Windows 10 EoSL (End of Service Life) set for October 14, 2025, technical support — including critical security p...

    10 min read

    Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

    Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

    Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

    Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

    9 min read
    Image of Eden Aizenkot
    • 10 min read

    Calculating the Business Costs: Security Misconfiguration Impact

    From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

    Calculating the Business Costs: Security Misconfiguration Impact

    From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

    10 min read

    Surprising Stats & Industry Insights for the Cybersecurity Strategist

    In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses f...

    Surprising Stats & Industry Insights for the Cybersecurity Strategist

    In today’s digital battlefield, knowledge is power. As threats evolve rapidly and the costs of security failures continue to rise, businesses must stay informed. The Big CISO Factbook uses f...

    7 min read
    Image of Mor Bikovsky
    • 11 min read

    5 Blessings to Reflect on This Cyber Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    5 Blessings to Reflect on This Cyber Thanksgiving

    As Thanksgiving approaches, it’s a fitting time to pause and reflect on our seldom- celebrated cyber victories. In an industry where success often goes unnoticed because it looks like “nothi...

    11 min read

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    Best Practices for a Bullet-Proof Endpoint Configuration Audit

    In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

    11 min read
    Image of Eden Aizenkot
    • 11 min read

    Tales From the Encrypt: 5 Cyber Security Horror Stories

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    Tales From the Encrypt: 5 Cyber Security Horror Stories

    Please join us as we take you on a journey through the looking glass and into the realm of haunted hacks. Here, misconfigured endpoints lay in wait, threatening to jump out from behind every...

    11 min read

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    Configuration Security Audits Stink. But Don't You Dare Skip Them!

    In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

    10 min read

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    Are There Glaring Gaps in Your Security Posture?

    Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

    10 min read

    Top 3 Everyday Configuration Mistakes Undermining Device Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    Top 3 Everyday Configuration Mistakes Undermining Device Security

    Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

    15 min read

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    Are These Issues Hampering Your Hardening Efforts?

    The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

    8 min read
    Image of Eden Aizenkot
    • 6 min read

    Digital Defense’s Dark Knights — The Unsung Cyber Heroes

    For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

    Digital Defense’s Dark Knights — The Unsung Cyber Heroes

    For most businesses, IT and security teams go about their work mostly unnoticed. Some would say that’s by design. Like the stage hands that help make a good show possible and keep everything...

    6 min read
    Image of Yakov Kogan
    • 24 min read

    Automated CrowdStrike Blue Screen Fix for vSphere Virtual Machines

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    Automated CrowdStrike Blue Screen Fix for vSphere Virtual Machines

    On July 19th 2024, CrowdStrike pushed an update to its Microsoft Windows agent. (Linux and macOS computers were not affected.) Considered something of an industry standard, the agent is wide...

    24 min read

    A Profile of Black Basta & Ransomware Prevention Tips

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    A Profile of Black Basta & Ransomware Prevention Tips

    Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

    16 min read
    Image of Bar Shay
    • 7 min read

    Defending Against RegreSSHion (CVE-2024-6387)

    After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

    Defending Against RegreSSHion (CVE-2024-6387)

    After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

    7 min read
    Image of Inbal Pearlson
    • 7 min read

    Lateral Movement is the Key Issue

    In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

    Lateral Movement is the Key Issue

    In cybersecurity, it’s not always the initial breach that causes the most damage — it’s what happens next. Attackers today rarely stop at a single point of entry.

    7 min read
    Image of Nitsan Ben Nun
    • 8 min read

    Streamline & Automate: Configuration Assessment for Device Lifecycles

    In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

    Streamline & Automate: Configuration Assessment for Device Lifecycles

    In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

    8 min read

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

    Building a Fortress: Best Practices in Device Hardening

    At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

    9 min read
    Image of Yakov Kogan
    • 5 min read

    LockBit 2.0 Ransomware: Insights & Counter-Measures

    The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

    LockBit 2.0 Ransomware: Insights & Counter-Measures

    The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

    5 min read
    Image of Tal Kollender
    • 7 min read

    Legacy Windows Settings: An OS Security Time Bomb

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    Legacy Windows Settings: An OS Security Time Bomb

    In the fast-paced world of technology, where innovation is a constant, it’s crucial to ensure that our operating systems remain secure.

    7 min read
    Image of Jake Dillon
    • 9 min read

    Hardening NHS Security With Better Device Configuration

    In the digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguarding...

    Hardening NHS Security With Better Device Configuration

    In the digital age, data protection and security are paramount, especially within the healthcare sector. The National Health Service (NHS) in the UK recognizes the importance of safeguarding...

    9 min read

    Best Practices in Cybersecurity: Mergers and Acquisitions

    In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

    Best Practices in Cybersecurity: Mergers and Acquisitions

    In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

    5 min read

    Optimize Operational Efficiency with Secure Configuration Automation

    Our dependence on IT platforms and the need to secure them creates a non-stop challenge. This challenge compounds as organizations encounter the complexities of hybrid work, cloud migrations...

    Optimize Operational Efficiency with Secure Configuration Automation

    Our dependence on IT platforms and the need to secure them creates a non-stop challenge. This challenge compounds as organizations encounter the complexities of hybrid work, cloud migrations...

    10 min read

    Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

    Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

    11 min read
    Image of Yaron Bialik
    • 22 min read

    Automating the Mac Software Package on a Linux Based OS

    Distributing a macOS software is not an easy task. It requires taking the binary, signing it, packaging it, signing the package and notarizing it.

    Automating the Mac Software Package on a Linux Based OS

    Distributing a macOS software is not an easy task. It requires taking the binary, signing it, packaging it, signing the package and notarizing it.

    22 min read

    Your Complete Guide to Cyber Essentials Compliance

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    Your Complete Guide to Cyber Essentials Compliance

    Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

    5 min read
    Image of Matt Rowe
    • 5 min read

    Master Linux Security: Find and Fix Misconfigurations Before They Bite

    It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

    Master Linux Security: Find and Fix Misconfigurations Before They Bite

    It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

    5 min read
    Image of Matt Rowe
    • 5 min read

    Are Configuration Changes Costing You Too Much Time?

    They say the only constant in life is change — but in IT, every change comes with a cost. Every patch, policy update, or quick fix introduces the risk of misconfiguration. What starts as a r...

    Are Configuration Changes Costing You Too Much Time?

    They say the only constant in life is change — but in IT, every change comes with a cost. Every patch, policy update, or quick fix introduces the risk of misconfiguration. What starts as a r...

    5 min read

    The Truth About IPv6 Security: Separating Fact from Fiction

    Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

    The Truth About IPv6 Security: Separating Fact from Fiction

    Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

    4 min read
    Image of Tal Kollender
    • 2 min read

    Taking Follina From Headache to Handled

    Earlier this week, a new zero day arrived, it is called Follina (MS Office CVE-2022-30190) and impacts any organization using Microsoft Office.

    Taking Follina From Headache to Handled

    Earlier this week, a new zero day arrived, it is called Follina (MS Office CVE-2022-30190) and impacts any organization using Microsoft Office.

    2 min read

    Log4J / Log4Shell: How to Find It & Fix It

    It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

    Log4J / Log4Shell: How to Find It & Fix It

    It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

    3 min read

    Balancing Security & Stability: Eliminating Remediation Risk With Ease

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. Yet it is also among the most critical, as systems...

    Balancing Security & Stability: Eliminating Remediation Risk With Ease

    Managing configurations, patching, and updating system controls is one of the most notably difficult things that any CISO has to deal with. Yet it is also among the most critical, as systems...

    7 min read

    Automated Security Remediation: Fix Faster, Safer, and Smarter

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    Automated Security Remediation: Fix Faster, Safer, and Smarter

    Most often I have found that the issue of addressing the problem is more pressing than simply identifying the threat. We have a massive, multi billion dollar, industry dedicated solely to “s...

    6 min read
    Image of Limor Bakal
    • 14 min read

    Misconfigurations - The Overlooked Risk Fueling 1 in 3 Breaches

    It starts with good intentions — a temporary TLS downgrade for a legacy app, a local admin account to solve a quick issue, or a service account exempted from MFA to speed up automation. Seem...

    Misconfigurations - The Overlooked Risk Fueling 1 in 3 Breaches

    It starts with good intentions — a temporary TLS downgrade for a legacy app, a local admin account to solve a quick issue, or a service account exempted from MFA to speed up automation. Seem...

    14 min read
    Image of Tal Kollender
    • 5 min read

    Are You Effectively Managing the Top Active Directory Threats?

    Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

    Are You Effectively Managing the Top Active Directory Threats?

    Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

    5 min read
    Image of Ilan Mintz
    • 14 min read

    A Strategic Approach to Cyber Prioritization

    Albert Einstein once said, “If I were given one hour to save the planet, I would spend 59 minutes defining the problem and one minute resolving it.”

    A Strategic Approach to Cyber Prioritization

    Albert Einstein once said, “If I were given one hour to save the planet, I would spend 59 minutes defining the problem and one minute resolving it.”

    14 min read
    Image of Paul Goldweitz
    • 6 min read

    How Remedio Helps Organizations Improve their Cyber Posture

    Odds are you have heard the wisdom that a defense is only as good as its weakest point. Which makes sense. After all, any strong defensive posture can only hold up if there are no fail point...

    How Remedio Helps Organizations Improve their Cyber Posture

    Odds are you have heard the wisdom that a defense is only as good as its weakest point. Which makes sense. After all, any strong defensive posture can only hold up if there are no fail point...

    6 min read
    Image of Mor Bikovsky
    • 3 min read

    NTLM Security in a Cloud-First World: Why It’s Time to Let Go

    In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

    NTLM Security in a Cloud-First World: Why It’s Time to Let Go

    In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

    3 min read

    Are You Forgetting Operating Systems In Your Patching Cycle?

    Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

    Are You Forgetting Operating Systems In Your Patching Cycle?

    Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

    4 min read
    Image of Inbal Pearlson
    • 3 min read

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

    Simple Steps To Stop Privilege Escalation from Moving Laterally

    In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

    3 min read
    Image of Inbal Pearlson
    • 3 min read

    The Cached Credentials Saga: Defending Against Pass-the-Hash Exploits

    When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

    The Cached Credentials Saga: Defending Against Pass-the-Hash Exploits

    When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

    3 min read
    Image of Mor Bikovsky
    • 4 min read

    The Importance of Secure Configuration Assurance

    Configuration is a routine part of setting up and maintaining IT environments, serving as the fundamental building block that ensures systems run smoothly and align with organizational needs...

    The Importance of Secure Configuration Assurance

    Configuration is a routine part of setting up and maintaining IT environments, serving as the fundamental building block that ensures systems run smoothly and align with organizational needs...

    4 min read