Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Impact of Social Media on Cybersecurity

Businesses of all sizes have leveraged the power of social media to increase brand awareness and connect with consumers, both locally and globally. However, the rapid growth of social media use has left businesses unaware of the many cyber risks associated with social media. While some individuals or businesses may be familiar with common cyberspace security issues, businesses must understand social media’s impact on cybersecurity on both a personal and consumer level.

Cybersecurity Challenges and Solutions for the Retail Sector

The retail sector continues to grow rapidly, particularly following the COVID-19 pandemic, as more and more people shop online. The convenience and ease of use through a transition to online shopping are aimed at providing robust customer experiences and meeting customer demands. However, a complete digital transition also means that retail businesses are increasing their attack surfaces — the paths, methods, and vulnerabilities that cybercriminals can use for cyber attacks.

The Role of Cybersecurity in Blockchain Technology

Blockchain technology is often associated with cryptocurrency transactions because it is a more secure method of sending protected, secure transactions. However, what many don’t know is that blockchain can also be used for business purposes to send protected, more secure communications that are safer than traditional networks. So how does cybersecurity play a role in current blockchain technology?

The Role of Cybersecurity in Mergers and Acquisitions (M&A)

Mergers and acquisitions (M&A) are on the rise post-COVID-19, as ongoing digital transformation has more companies acquiring others to enhance existing capabilities, reach new markets, or reduce competition. While mergers and acquisitions already involve many factors contributing to their risks and impacting the decision-making process, the evolving cyber threat landscape makes this even more complex.

How to Identify Vulnerable Third-Party Software (Quickly)

Third-party software security risks are on the rise, and so are the significant cyberattacks they facilitate. According to a CrowdStrike report, 45% of surveyed organizations said they experienced at least one software supply chain attack in 2021. In 2023, the average number of SaaS apps used by each company is 130 - a 5x increase compared to 2021.

"Get ADUser Not Recognized" Error in PowerShell

The Get-ADUser PowerShell cmdlet is very helpful for Active Directory user management. But what if you try to use Get-ADUser and get the error below? The term ‘Get-ADUser’ is not recognized as the name of a cmdlet, function, script file or operable program. This error simply means that the Active Directory module for PowerShell is not available on your machine.

Get-ADGroupMember Cmdlet: Find Active Directory Group Members

Using Active Directory security groups is a best practice for quickly and accurately assigning permissions to users, computers, and groups. But how can you get a list of all the members of a security group? While you could use the PowerShell cmdlet Get-ADGroup, group members will be identified by their distinguished names, making the results difficult to read. A better option is to use the Get-ADGroupMember cmdlet. This article provides the syntax of this cmdlet and lots of useful examples.

Types of Active Directory Groups & Scopes

Active Directory groups are sets of Active Directory (AD) objects — such as users, computers, and even other groups. Using AD groups helps simplify IT administration and ensure accurate delegation of rights and dissemination of information. Active Directory has several built-in groups, and organizations create many additional groups.

Hypothesis-Driven Hunting with the PEAK Framework

Picture yourself as a cyber detective, ready to uncover the hidden threats lurking in the shadows of your organization's network. Sounds exciting, right? Well, hypothesis-driven hunting is all about channeling your inner Hercule Poirot to stay one step ahead of adversaries working against you. The PEAK threat hunting framework identifies three primary types of hunts: In this post, we’re going to look at hypothesis-driven hunting in detail.