Free Trial

GYTPOL's Blog

Image of Matt Rowe
  • 8 min read

Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

Configuration security is a foundational piece of the cybersecurity puzzle — yet one that too many organizations continue to overlook.

8 min read

A Profile of Black Basta & Ransomware Prevention Tips

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

A Profile of Black Basta & Ransomware Prevention Tips

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

16 min read
Image of Matt Rowe
  • 5 min read

Master Linux Security: Find and Fix Misconfigurations Before They Bite

It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

Master Linux Security: Find and Fix Misconfigurations Before They Bite

It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

5 min read
Image of Matt Rowe
  • 5 min read

Are Configuration Changes Costing You Too Much Time?

They say the only constant in life is change — but in IT, every change comes with a cost. Every patch, policy update, or quick fix introduces the risk of misconfiguration. What starts as a r...

Are Configuration Changes Costing You Too Much Time?

They say the only constant in life is change — but in IT, every change comes with a cost. Every patch, policy update, or quick fix introduces the risk of misconfiguration. What starts as a r...

5 min read

Matt Rowe

Remedio's CTO, Matt brings 20+ years of leadership in building secure tech platforms. He's passionate about scaling outcome-driven cybersecurity.

Blog Posts by “Matt Rowe”

Image of Matt Rowe
  • 8 min read

Just Because You're Ignoring Security Gaps Doesn't Mean Hackers Are

Configuration security is a foundational piece of the cybersecurity puzzle — yet one that ...

8 min read
Image of Matt Rowe
  • 16 min read

A Profile of Black Basta & Ransomware Prevention Tips

Within months of its first public appearance, Black Basta left a significant mark in the r...

16 min read
Image of Matt Rowe
  • 5 min read

Master Linux Security: Find and Fix Misconfigurations Before They Bite

It's often said that Linux is a more secure OS compared to other OSs in the market. While ...

5 min read
Image of Matt Rowe
  • 5 min read

Are Configuration Changes Costing You Too Much Time?

They say the only constant in life is change — but in IT, every change comes with a cost. ...

5 min read