Featured Blog
Our Top 3 Evergreen Incident Response Tabletop Exercise Scenarios & Why These Should Be Part of Your Cybersecurity Plan
As a consultant, one of my favorite assignments is leading incident response tabletop exercise scenarios that help organizations discover their strengths and weaknesses. If you are not familiar with the term, the purpose of a tabletop exercise is to gather the incident response team including IT, management, public relations, legal counsel, etc. around a table […]
Breaches, Cyberattacks, Cybersecurity, Malware, Ransomware
PetrWrap: New Strain of Petya Ransomware Infects Systems Worldwide
Black Hat, Breaches, Cybersecurity, DEF CON, Devices, Events, Government, IoT, Vulnerabilities
Watch LMG Experts Recap Black Hat/Defcon 2017!
Black Hat, Breaches, Compliance, Cyberattacks, Cybersecurity, Network Forensics, Phishing, Privacy, Vulnerabilities
Want Good Results On Your Next Pentest? Focus on your Commendable Practices
Black Hat, Cyberattacks, Cybersecurity, Malware, Network Forensics, Vulnerabilities
Antivirus Evasion
Breaches, Cyberattacks, Cybersecurity, IT, Malware, Network Forensics
LMG wants to help you Achieve NOTHING!
Cyberattacks, Cybersecurity, Malware, Uncategorized