TheMosheMan Profile Banner
Moshe Man Profile
Moshe Man

@TheMosheMan

Followers
4K
Following
135
Media
3K
Statuses
7K

Passionate about #B2BMarketing, #CorporateEfficiency, #CleanTech, and #DataOperationalization

Joined July 2015
Don't wanna be here? Send us removal request.
@TheMosheMan
Moshe Man
6 days
SMBv1 is the weakest link in too many enterprise networks. It’s often still enabled. Still hidden. Still dangerous. Use this checklist to plan your exit and keep your security posture clean. 👇. #ransomware #cybersecurity #dataprotection.
go.gytpol.com
Learn how to safely and systematically disable SMBv1 across your network. Download the SMBv1 remediation checklist, brought to you by GYTPOL and AWS...
0
0
0
@TheMosheMan
Moshe Man
16 days
SMBv1 is the weak link in too many enterprise networks. Even after operators believe they've dealt with it, it tends to pop back up in unexpected place. Use this checklist to stay clean and clear. Link in comments 👇.#ransomware #cybersecurity #dataprotection
Tweet media one
1
0
0
@TheMosheMan
Moshe Man
24 days
The internet is held together by legacy protocols, default settings & vibes. And now we’re finally talking about it. CTEM is the rare framework that gets where real exposure lives: not in unpatched CVEs, but in things no one bothered to lock down. 🔗
Tweet card summary image
gytpol.com
What is CTEM? It’s goes beyond just patching. See how Continuous Threat Exposure Management uncovers hidden risks & builds proactive resilience.
0
0
0
@TheMosheMan
Moshe Man
26 days
Hackers are hiding in networks for 11 days on average — stealth mode: activated. But most entry points? Plain old stolen passwords and cloud setups. The tech world is so hyped on shiny trinkets, we forget to lock our front doors 👉 #security.
Tweet card summary image
sharecta.com
0
0
0
@TheMosheMan
Moshe Man
27 days
Endpoint security vendors talk a big game, but most of it can be ignored. If you want to make security decisions that actually fit your reality, check this out.
Tweet card summary image
gytpol.com
Not all endpoint security vendors are equal. Use our guide to learn how to assess and select the best fit for your organization.
0
0
0
@TheMosheMan
Moshe Man
29 days
AI is writing phishing emails. Your network’s full of shadow IT. And the device configs you think are secure? LOL. 🤭. We’re losing because of the last mile. GYTPOL’s onto something. 👇. #cybersecurity #securityawareness #cyberattack.
Tweet card summary image
gytpol.com
Are you undermining your tech & tooling? Master last mile cybersecurity with smart configuration hardening and end-to-end risk management that never fails
0
0
0
@TheMosheMan
Moshe Man
1 month
Japan now has a license to hack — formally, politely, and with parliamentary oversight. Honestly? Not sure what I feel or think, but this write-up was on the mark.👇. #cyberattack #cyberthreat #security.
gytpol.com
Discover how Japan’s shift to proactive cybersecurity strategies signals a new era of preemptive defense — and why enterprises must follow suit.
0
0
0
@TheMosheMan
Moshe Man
1 month
Cyber hygiene is the flossing of enterprise IT. Everyone knows it’s important. Few do it. Cyber fatigue is real and it's easy to put off cyber hygiene for just another night. But don't do it.
gytpol.com
Cyber hygiene: what is it and why's it important? Here we explain the challenge and how leading organizations are cracking the code with the help of GYTPOL
0
0
0
@TheMosheMan
Moshe Man
1 month
DES was the go-to encryption standard back in the olden days: simple & effective for its time. Fast forward to 2025, and it’s officially obsolete. Microsoft’s pulling support Sept 9. If you're still clinging to DES, you’re stuck in the past and open to serious risk.
0
0
0
@TheMosheMan
Moshe Man
1 month
networks sound like sci-fi — but the tech is already here, quietly saving your day while you’re busy scrolling memes. #cybersecurity #security #technology.
Tweet card summary image
sharecta.com
0
0
0
@TheMosheMan
Moshe Man
2 months
March: Microsoft patched CVE-2025-24054. Today: people continue to get hacked by just previewing files. That's kind of surprising. It's 2025, and we're still falling for digital banana peels. Maybe it's time to rethink our digital habits. #cybersecurityawareness.
0
0
0
@TheMosheMan
Moshe Man
2 months
Why is modern #security like the Fyre Festival of IT?. It's all hype, but nothing to show. Billion-dollar stacks can’t save you from a default password, baby. GYTPOL breaks it down 👉
Tweet card summary image
gytpol.com
Drawing on Gartner insights, this article explains how security controls can failure as a result of misconfiguration rather than any inherent deficiencies.
0
0
0
@TheMosheMan
Moshe Man
2 months
Microsoft’s RDP flaw isn’t new, it’s just finally getting attention. Cached credentials let attackers in post password change. The fact that this functionality is “by design” should worry us all. #cybersecurity #technology.
0
0
0
@TheMosheMan
Moshe Man
2 months
SaaS security is just vibes-based at this point. But the good times, they are not a-rolling. 😢. Thankfully, JPMorgan Chase just put out a “stop the madness” memo. Here's one post I recommend reading about defining what true security means:
Tweet card summary image
gytpol.com
JPMorgan calls for SaaS security reform, highlighting the need for secure-by-default designs to mitigate increasing configuration risks. Read about it here
0
0
0
@TheMosheMan
Moshe Man
2 years
Exploring the limitations of standalone strategies and the importance of combining ASO and paid acquisition:
1
0
0
@TheMosheMan
Moshe Man
2 years
Tip and tricks for ASO and paid acquisition excellence »
Tweet media one
0
0
0
@TheMosheMan
Moshe Man
2 years
While incredibly cool, #LargeLanguageModels risk undermining long-term AI advancement and adoption. Here’s why »
Tweet media one
0
0
1
@TheMosheMan
Moshe Man
2 years
To influence #dataoutcomes, you first need to be able to precisely predict their trajectories. Here’s how one AI innovator built a business on that premise »
Tweet media one
0
0
0