Featured Blog
Penetration Tester Secrets: How Hackers Really Get In
Think your network is secure? Think again. Even organizations with mature cybersecurity programs are falling victim to the same simple misconfigurations that allow penetration testers—and potentially real attackers—to gain full domain admin access. At LMG Security, our penetration testing team gains full control in over 90% of internal tests. If that surprises you, it shouldn’t. […]
Microsoft Office 365
M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation
News, Social Engineering
2023 MGM Breach: A Wake-Up Call for Better Social Engineering Training for Employees
Compliance, Cybersecurity Planning, NIST CSF
Governance, Supply Chain, & Risk Management, Oh My! Understanding the New NIST CSF 2.0 Draft Guideline Changes
Email authentication
Understanding Email Authentication Protocols: A Technical Overview of SPF, DKIM and DMARC With Configuration Tips
Cybersecurity, Cybersecurity Planning
What’s Hot in Cybersecurity? Recapping the Top 2023 Cybersecurity Trends from Black Hat, DEFCON, and BSides
Cyberattacks, Cybersecurity
2023 Cyberattack Trends: Zero-Day Attacks, Virtualization Vulnerabilities & More
Attack Surface Monitoring, Cybersecurity, Security Controls Reports