Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

PowerShell Foreach Loop Explained: Syntax, Examples and Best Practices

The foreach loop in PowerShell enables you to iterate through all the items in a collection and execute a block of code for each element. For example, you can use a foreach loop to create a list of all files in a directory for an audit, display all the processes running on the system, or move old files to an archive. This article details the syntax of the PowerShell foreach loop and explores common use cases, complete with example scripts.

The Quiet Data Leak from GenAI

Like me, I’m sure you’re keeping an open mind about how Generative AI (GenAI) is transforming companies. It’s not only revolutionizing the way industries operate, GenAI is also training on every byte and bit of information available to build itself into the critical components of business operations. However, this change comes with an often-overlooked risk: the quiet leak of organizational data into AI models.

Top 7 Enterprise Fraud Management (EFM) Solutions

Today, fraud schemes don’t follow predictable patterns. Enterprises are up against AI-generated deepfake attacks, multi-stage social engineering, and impersonation scams that exploit gaps in traditional fraud prevention strategies. And they know it. According to PwC, 59% of enterprises completed a fraud risk assessment in the 12 months prior to June 2024, showing they take fraud protection seriously. But beyond knowing your risks, there’s a need for better ways to tackle and mitigate them.

PoC Exploit Available for Critical Information Disclosure Vulnerabilities in Ivanti EPM

On February 19, 2025, Horizon3.ai published proof-of-concept (PoC) exploit code and technical details for critical Ivanti Endpoint Manager (EPM) vulnerabilities disclosed in January. The vulnerabilities are tracked as CVE-2024-10811, CVE-2024-13161, CVE-2024-13160, and CVE-2024-13159, allowing a remote unauthenticated attacker to leak sensitive information via a path traversal. They share the same underlying issue, which results from an unauthenticated endpoint failing to validate input.

The evolution of quality at Vanta

Vanta’s story began like many other startups—moving fast to discover product-market fit and lay the groundwork for a sustainable business. Speed was key as we focused on delivering value to customers and rapidly iterating to meet market needs. This approach propelled us into a phase of healthy growth, marked by milestones we proudly celebrate (read more about our recent achievements here).

Cybersecurity for Electricity Distribution [2025 Update]

Electricity transmission and distribution are popular topics at the moment, especially as they pertain to utilities infrastructure security. These essential pillars of modern society are undergoing rapid digital transformation, with increased connectivity and technological sophistication harboring large-scale cybersecurity challenges.

WatchGuard Recognized in CRN's Prestigious 2025 Security 100 List

Once again, WatchGuard has been named to CRN’s 2025 Security 100 list in the Network Security category. This prestigious recognition honors the top security vendors in the IT channel. The 2025 CRN Security 100 highlights channel-friendly cybersecurity vendors across a number of market segments, ranging from the largest and best-known players to some of the small-but-promising startups.

Achieving PCI DSS 4.0.1 Compliance for Companies (SAQ A-EP): A Comprehensive Guide for Feroot PCI PaymentGuard AI

Payment security for SAQ A-EP merchants has never been more critical. As e-commerce continues to evolve, merchants who control elements of their payment pages face increasing security challenges and compliance requirements.

3 Examples of Tokenization Initiatives Reshaping Financial Markets

Tokenization, or the process by which assets are converted into tokens that can be moved, stored, or recorded on a blockchain, enables a transparent, well-governed financial system. It empowers interested participants to utilize financial services and access capital markets with ease and efficiency. We’re currently seeing active examples of tokenization projects across multiple asset classes, such as commodities, debt securities, equity securities, and real estate.