News

Our Phishing Threat Trends Reports bring you the latest insights into the hottest topics in the phishing attack landscape. In 2025, it’s been in with the old and in with the new, as cybercriminals use ...
This whitepaper discusses ways bad actors are using AI for their own devices and what a robust security awareness training (SAT) and simulated phishing program with AI at its core can bring to a ...
Human Risk Management (HRM) is more than just the next step in security awareness training (SAT)—it’s a fundamental shift in how organizations approach human security risks.
Attackers are bypassing traditional defenses using stolen passwords, infostealer malware, and MFA fatigue tactics. This guide shows how to shift to identity-first protection with real-time credential ...
PowerShell How-To How To Use PowerShell Transcripts Here's how to easily record every move made in PowerShell. By Adam Bertram 11/18/2015 ...
If you want to group parts of your code for debugging purposes or simple readability, the PowerShell ISE has the answer.
Whether it is monitoring for files and folders being updated in a specific location or you want to set up a sort of Dropbox to dump files in, the options for doing any sort of monitoring against a ...
Working with Windows shares, you can easily create a location for others to use to store data using a simple share name that could map several folders down in a server (or client). This allows for ...
Continuing on from my previous article that showed you how to find certificates on local and remote systems, I am going to show you how to export certificates from a local or remote certificate store ...
Windows Advisor File Permissions Thru Group Policy Reader wants to make it easy to set file permissions on a folder. By Zubair Alexander 10/13/2008 Q: How can I set file permissions for a user on a ...
Using Windows Management Instrumentation makes it easy to pull information about the drives on your system or remote systems. Here's how.