Featured Blog
Quantum Computing and Cybersecurity: How to Secure the Quantum Future
Quantum computing and cybersecurity have become intertwined buzzwords, creating excitement and anxiety within the tech and cybersecurity communities. Recent breakthroughs, like the National Institute of Standards and Technology (NIST) finalizing post-quantum encryption standards, underscore the urgency of this evolving threat. Sherri Davidoff and Matt Durrin from LMG Security recently discussed the practical implications of quantum […]
Compliance, Health care
Understanding the Proposed HIPAA Security Rule Updates & Why You Should Take Action Now
Cybersecurity, Cybersecurity Planning
Cybersecurity Threats 2025: The Top Trends and How to Address Them
Cyberattacks, Cybersecurity, Cybersecurity leadership, Cybersecurity Planning
2025 Cybersecurity Priorities: Top 3 Focus Areas for Cybersecurity Leaders
API security, Pen Testing, Web application security
The Critical Role of API Penetration Testing in Your Web App Security Strategy
Authentication, Pen Testing
The Insider’s Guide to the Rise of Infostealer Malware, Password Spraying, Brute Force, and Credential Stuffing Attacks
Pen Testing, Web application security