IT security: Keep calm and monitor PowerShell 

In our last release of the PowerShell security series, we talked about how PowerShell could be leveraged by malicious actors to gain unprecedented access to your organization’s critical assets. From enumerating sensitive domain information and carrying out credential-based attacks to running malicious executables in memory (file-less malware), we shined a light on the potential of PowerShell and…

Five worthy reads: XAI, a move from black to white

Five worthy reads is a regular column on five noteworthy items we’ve discovered while researching trending and timeless topics. This week, we explore the concept of XAI, Explainable AI. Illustration: Dorathe Victor Have you ever wondered about the intricate logic behind sponsored content and recommendation systems found across social media and online retailer pages? With the significant advances in artificial intelligence…

The US National Security Agency’s best practices for securing your cloud environment

Cloud technology has seen massive advances in recent years, and it’s only getting more complex. With such rapid growth, it can be challenging to keep up. As there’s no one-size-fits-all method to cloud adoption, and each unique cloud environment requires its own unique security measures, many organizations struggle to make well-grounded decisions related to cloud migration. As cloud technology becomes more mainstream, hackers are capitalizing on the lack of…