Free Trial

GYTPOL's Blog

Understanding Device Posture Management: The Key to Modern Security

Device posture refers to the security health and configuration state of an endpoint at any given moment. Think of device posture as a comprehensive snapshot of an endpoint's security state.

Understanding Device Posture Management: The Key to Modern Security

Device posture refers to the security health and configuration state of an endpoint at any given moment. Think of device posture as a comprehensive snapshot of an endpoint's security state.

9 min read

From Detection to Correction: The Missing Layer in Enterprise Security

Every CISO knows the feeling. Your security tools complete their latest round of scans. The dashboards light up. Hundreds - sometimes thousands - of vulnerabilities, misconfigurations, and c...

From Detection to Correction: The Missing Layer in Enterprise Security

Every CISO knows the feeling. Your security tools complete their latest round of scans. The dashboards light up. Hundreds - sometimes thousands - of vulnerabilities, misconfigurations, and c...

9 min read

Sustaining Excellence Across the Modern Endpoint Fleet

Operational excellence is not a one-time achievement. It's sustained discipline.That discipline is tested daily across a growing and increasingly complex endpoint fleet.

Sustaining Excellence Across the Modern Endpoint Fleet

Operational excellence is not a one-time achievement. It's sustained discipline.That discipline is tested daily across a growing and increasingly complex endpoint fleet.

8 min read

A Cyber Collision of Speed, Conflict & Complexity

Cybersecurity is undergoing a fundamental shift. What was once primarily about preventing corporate espionage, hooliganism, and opportunistic criminals has now taken on geopolitical stakes. ...

A Cyber Collision of Speed, Conflict & Complexity

Cybersecurity is undergoing a fundamental shift. What was once primarily about preventing corporate espionage, hooliganism, and opportunistic criminals has now taken on geopolitical stakes. ...

10 min read

Master & Commander of Autonomous Endpoint Management (AEM)

In 1865, Walt Whitman used a storm-tossed ship as a metaphor for a nation under strain. For today’s security and IT leaders, managing thousands of endpoints can feel strikingly similar.

Master & Commander of Autonomous Endpoint Management (AEM)

In 1865, Walt Whitman used a storm-tossed ship as a metaphor for a nation under strain. For today’s security and IT leaders, managing thousands of endpoints can feel strikingly similar.

7 min read

AI Governance for this Agentic Bonanza

Today, AI is everywhere. It is embedded in coding environments, operating systems, browsers, collaboration platforms, and desktop assistants. But it's not only baked into tools and technolog...

AI Governance for this Agentic Bonanza

Today, AI is everywhere. It is embedded in coding environments, operating systems, browsers, collaboration platforms, and desktop assistants. But it's not only baked into tools and technolog...

14 min read

The Best of CPS Security: Gartner® Cool Vendors™

We may have known it for a while, but now we are officially cool! Remedio was just named a Gartner Cool Vendor in Cyber-Physical Systems Security.

The Best of CPS Security: Gartner® Cool Vendors™

We may have known it for a while, but now we are officially cool! Remedio was just named a Gartner Cool Vendor in Cyber-Physical Systems Security.

5 min read

Remedio Raises $65M to Usher in a New Era of Device Posture Management

Six years ago, we set out with a simple but ambitious mission: to make enterprise devices safer — not just monitored. We built carefully, profitably, and independently, guided by the belief ...

Remedio Raises $65M to Usher in a New Era of Device Posture Management

Six years ago, we set out with a simple but ambitious mission: to make enterprise devices safer — not just monitored. We built carefully, profitably, and independently, guided by the belief ...

5 min read

Outcome-Driven Metrics: Making Cybersecurity Make Cents

If a threat falls in the SOC and no one ties it to revenue, does it really make a sound? That’s the challenge security leaders face every day: finding an impactful way to translate cyber ris...

Outcome-Driven Metrics: Making Cybersecurity Make Cents

If a threat falls in the SOC and no one ties it to revenue, does it really make a sound? That’s the challenge security leaders face every day: finding an impactful way to translate cyber ris...

10 min read

Active Directory: Security Gaps and the Silent Risks You Can't Ignore

Active Directory (AD) is the powerhouse of the enterprise — the central hub where identity, access, and control converge. Yet despite its critical role, AD generally flies under the radar un...

Active Directory: Security Gaps and the Silent Risks You Can't Ignore

Active Directory (AD) is the powerhouse of the enterprise — the central hub where identity, access, and control converge. Yet despite its critical role, AD generally flies under the radar un...

10 min read

Back to School, Back to Basics: Cyber Hygiene 101

As backpacks get packed and classrooms fill up, it’s the perfect time for businesses to go back to school, too. Not for algebra—but for cybersecurity. While today’s digital threats are evolv...

Back to School, Back to Basics: Cyber Hygiene 101

As backpacks get packed and classrooms fill up, it’s the perfect time for businesses to go back to school, too. Not for algebra—but for cybersecurity. While today’s digital threats are evolv...

2 min read

Strong Foundations: Why Builders Must Embrace Device Hardening

In the world of construction, complexity is the norm. From project sites scattered across geographies to legacy OT systems integrated with modern cloud environments, these sectors rely on a ...

Strong Foundations: Why Builders Must Embrace Device Hardening

In the world of construction, complexity is the norm. From project sites scattered across geographies to legacy OT systems integrated with modern cloud environments, these sectors rely on a ...

8 min read

From Burgers to Breaches: What McDonald’s Data Leak Can Teach Us

Security teams are constantly walking a tightrope — enabling growth while minimizing risk. Most eyes are on the usual suspects: ransomware gangs, zero-day exploits, phishing campaigns. But t...

From Burgers to Breaches: What McDonald’s Data Leak Can Teach Us

Security teams are constantly walking a tightrope — enabling growth while minimizing risk. Most eyes are on the usual suspects: ransomware gangs, zero-day exploits, phishing campaigns. But t...

7 min read

Pinning Down An Evolving Role: The Definitive CISO Job Description

When it comes to IT security, risk mitigation, incident response, and cyber crisis management, the buck stops with the Chief Information Security Officer (CISO). As the enterprise’s top cybe...

Pinning Down An Evolving Role: The Definitive CISO Job Description

When it comes to IT security, risk mitigation, incident response, and cyber crisis management, the buck stops with the Chief Information Security Officer (CISO). As the enterprise’s top cybe...

17 min read

Why RDP Threats Never Die: A New Twist on an Old Risk

It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

Why RDP Threats Never Die: A New Twist on an Old Risk

It seems like every time we think we've closed the door on Remote Desktop Protocol (RDP) threats, another window opens — sometimes quite literally.

6 min read

Why Business-Aligned Cybersecurity Starts With Smart Configurations

Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

Why Business-Aligned Cybersecurity Starts With Smart Configurations

Is good security good business? When something goes wrong, it’s easy to draw the connection: bad security leads to breaches, downtime, and damage. But what if catastrophe isn’t looming?

13 min read

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

Last Mile Cybersecurity

In the world of logistics, last-mile delivery refers to the final phase of a product’s journey — the crucial step where an item moves from a warehouse shelf, onto a delivery truck, and final...

9 min read

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

Checking All the Boxes: How to Evaluate Endpoint Security Vendors

In today’s threatscape, attacks are all but inevitable. With companies on the back foot, it's only natural to question if their existing defenses are up for the challenge. In many case, they...

18 min read

Hardening Without Headache: Practical Lessons from Gartner® Research

When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

Hardening Without Headache: Practical Lessons from Gartner® Research

When it comes to reducing enterprise threat exposure, configuration hardening isn’t a new idea — but it’s finally getting the focused attention it deserves.

5 min read

Remedio: Deployed on AWS

We’re excited to share that Remedio can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor s...

Remedio: Deployed on AWS

We’re excited to share that Remedio can be purchased and deployed fully through AWS. That fact is not trivial as it entitles us to a “Deployed on AWS” badge, which conveys preferred vendor s...

4 min read

Calling for SaaS Security Reform

When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

Calling for SaaS Security Reform

When JPMorgan Chase sounds the alarm, we should all pay attention. In a powerful open letter, the firm argues that the SaaS delivery model, while transformative, is eroding fundamental secur...

8 min read

Overlook Enterprise Web Security At Your Own Peril

Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

Overlook Enterprise Web Security At Your Own Peril

Browsers today are an essential component of any enterprise work environment — where employees log in, collaborate, and interact with sensitive data across countless applications. And while ...

15 min read
Image of Ilan Mintz
  • 8 min read

Using CIS As A Rosetta Stone for Configuration Compliance

Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

Using CIS As A Rosetta Stone for Configuration Compliance

Maintaining secure and compliant device configurations is a top priority for enterprise businesses. With increasing cloud adoption however, it's something that is increasingly complicated an...

8 min read

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

Conflict to Clarity: How PDS Health Harmonizes Security & Operations

It’s a familiar dilemma: weighing the need for security against the need to "keep things running." At PDS Health, it's a tension that runs equally through strategy and day-to-day operations.

8 min read

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

How HIT Leaders Balance Cyber & Business Continuity Risks

Healthcare organizations must minimize the cyber risks to the organization, working to secure critical assets and sensitive data. At the same time, they must work diligently to ensure nothin...

10 min read

It's Time To Automate PCI DSS Compliance

According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

It's Time To Automate PCI DSS Compliance

According to a Verizon Data Breach Investigations Report, 86% of data breaches are financially motivated. Being the source of the so much fast-moving capital, this naturally positions the pa...

7 min read

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

Who Owns Configuration Security?

Configuration security is not sexy. Wish that it were, but it just isn’t. As it is, it rarely gets the attention it deserves, but businesses overlook this vital aspect of their security post...

6 min read

Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

Striving for Cyber Excellence: 2024 Milestones & Vision for 2025

Throughout 2024, cybersecurity continued to be a thorn in the side of global industry as sophisticated cyberattacks cost organizations trillions. Yes, that’s trillions with a T.

9 min read
Image of Eden Aizenkot
  • 10 min read

Calculating the Business Costs: Security Misconfiguration Impact

From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

Calculating the Business Costs: Security Misconfiguration Impact

From compromised endpoints to disrupted workflows, misconfigurations are one of the leading causes of disruptions in complex IT environments.

10 min read

Best Practices for a Bullet-Proof Endpoint Configuration Audit

In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

Best Practices for a Bullet-Proof Endpoint Configuration Audit

In today’s complex digital landscape, the importance of configuration security audits cannot be overstated.

11 min read

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

Configuration Security Audits Stink. But Don't You Dare Skip Them!

In evaluating endpoint posture and network integrity, configuration audits are essential. At the same time, conducting an effective audit is easier said than done.

10 min read

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

Are There Glaring Gaps in Your Security Posture?

Endpoint configurations are essential to good security. That’s always been the case, but it rings even truer with each passing year. In some ways, endpoint configurations are your first line...

10 min read

Top 3 Everyday Configuration Mistakes Undermining Device Security

Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

Top 3 Everyday Configuration Mistakes Undermining Device Security

Device configurations are one of the most important elements of your organizational security today. Why? For starters, security misconfigurations are one of the most critical threats you’ll ...

15 min read

Are These Issues Hampering Your Hardening Efforts?

The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

Are These Issues Hampering Your Hardening Efforts?

The world of cybersecurity is complex and ever-changing. But that doesn't mean there aren't any recurring themes or repeating patterns.

8 min read

A Profile of Black Basta & Ransomware Prevention Tips

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

A Profile of Black Basta & Ransomware Prevention Tips

Within months of its first public appearance, Black Basta left a significant mark in the realm of ransomware – tallying up 19 high-profile enterprise victims in the course of 100+ confirmed ...

16 min read
Image of Bar Shay
  • 7 min read

Defending Against RegreSSHion (CVE-2024-6387)

After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

Defending Against RegreSSHion (CVE-2024-6387)

After a CVE is published, the race is on. Often a good amount of time passes before any patches are issued. Of course, sometimes the patch never comes. Best case scenario, patches are releas...

7 min read
Image of Nitsan Ben Nun
  • 8 min read

Streamline & Automate: Configuration Assessment for Device Lifecycles

In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

Streamline & Automate: Configuration Assessment for Device Lifecycles

In today’s digital landscape, organizations face relentless cyber threats, with ransomware incidents posing a significant risk.

8 min read

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

Building a Fortress: Best Practices in Device Hardening

At a time when cyber threats are increasingly sophisticated, understanding and implementing device hardening is more crucial than ever. Device hardening is an extensive and crucial process i...

9 min read
Image of Yakov Kogan
  • 5 min read

LockBit 2.0 Ransomware: Insights & Counter-Measures

The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

LockBit 2.0 Ransomware: Insights & Counter-Measures

The cyber threat landscape has been significantly heightened by the emergence of LockBit 2.0, an advanced and pernicious form of ransomware.

5 min read

Best Practices in Cybersecurity: Mergers and Acquisitions

In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

Best Practices in Cybersecurity: Mergers and Acquisitions

In the complex world of mergers and acquisitions (M&A), where cybersecurity and compliance are essential, the security of endpoints and the rapid resolution of security gaps are critical...

5 min read

Optimize Operational Efficiency with Secure Configuration Automation

Our dependence on IT platforms and the need to secure them creates a non-stop challenge. This challenge compounds as organizations encounter the complexities of hybrid work, cloud migrations...

Optimize Operational Efficiency with Secure Configuration Automation

Our dependence on IT platforms and the need to secure them creates a non-stop challenge. This challenge compounds as organizations encounter the complexities of hybrid work, cloud migrations...

10 min read

Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

Thriving Through the NCSC CAF: Ensuring Secure Configurations at Scale

Threat actors are taking advantage of misconfigurations on various devices, such as PCs, laptops, and servers. So much so that according to Microsoft, 80% of successful ransomware attacks ar...

11 min read

Your Complete Guide to Cyber Essentials Compliance

Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

Your Complete Guide to Cyber Essentials Compliance

Cyber Essentials is a cyber security certification that has been designed by the government to make it simple for organizations to protect themselves against common cyber threats.

5 min read
Image of Matt Rowe
  • 5 min read

Master Linux Security: Find and Fix Misconfigurations Before They Bite

It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

Master Linux Security: Find and Fix Misconfigurations Before They Bite

It's often said that Linux is a more secure OS compared to other OSs in the market. While that's not incorrect, one shouldn't be tempted to think that it Linux is bulletproof.

5 min read

The Truth About IPv6 Security: Separating Fact from Fiction

Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

The Truth About IPv6 Security: Separating Fact from Fiction

Myth: “IPv6 Security enhancements (such as IPsec) makes it safer than IPv4” Truth: IPsec is an end-to-end security mechanism, providing authentication and encryption on the network layer.

4 min read

Log4J / Log4Shell: How to Find It & Fix It

It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

Log4J / Log4Shell: How to Find It & Fix It

It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

3 min read
Image of Tal Kollender
  • 5 min read

Are You Effectively Managing the Top Active Directory Threats?

Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

Are You Effectively Managing the Top Active Directory Threats?

Do threats against your Active Directory keep you up at night? Honestly, they should. Active Directory is critical as it controls access to your systems and data.

5 min read
Image of Paul Goldweitz
  • 6 min read

How Remedio Helps Organizations Improve their Cyber Posture

Odds are you have heard the wisdom that a defense is only as good as its weakest point. Which makes sense. After all, any strong defensive posture can only hold up if there are no fail point...

How Remedio Helps Organizations Improve their Cyber Posture

Odds are you have heard the wisdom that a defense is only as good as its weakest point. Which makes sense. After all, any strong defensive posture can only hold up if there are no fail point...

6 min read
Image of Mor Bikovsky
  • 3 min read

NTLM Security in a Cloud-First World: Why It’s Time to Let Go

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

NTLM Security in a Cloud-First World: Why It’s Time to Let Go

In the modern Microsoft environment, NTLM (“NT Lan Manager”) is a security threat you should keep an eye on. Especially when it’s about the cloud environment, Microsoft warns you to deny it ...

3 min read

Are You Forgetting Operating Systems In Your Patching Cycle?

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

Are You Forgetting Operating Systems In Your Patching Cycle?

Attacks are becoming more sophisticated, hackers are becoming smarter, and so should be the defenders. The attacker eyeing your organization is looking for the misconfiguration that will let...

4 min read
Image of Inbal Pearlson
  • 3 min read

Simple Steps To Stop Privilege Escalation from Moving Laterally

In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

Simple Steps To Stop Privilege Escalation from Moving Laterally

In my previous article I wrote about the importance of monitoring all endpoints in the organization for the existence of cached credentials. In this post, I'm going to explain what you can d...

3 min read
Image of Inbal Pearlson
  • 3 min read

The Cached Credentials Saga: Defending Against Pass-the-Hash Exploits

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

The Cached Credentials Saga: Defending Against Pass-the-Hash Exploits

When hackers are successful in accessing user credentials, they can access the resources of an organization and cause a lot of damage as they move laterally. This normally goes unnoticed as ...

3 min read
Image of Mor Bikovsky
  • 4 min read

The Importance of Secure Configuration Assurance

Configuration is a routine part of setting up and maintaining IT environments, serving as the fundamental building block that ensures systems run smoothly and align with organizational needs...

The Importance of Secure Configuration Assurance

Configuration is a routine part of setting up and maintaining IT environments, serving as the fundamental building block that ensures systems run smoothly and align with organizational needs...

4 min read