LMG Resources

BLOG

M365 Security: Leveraging CIS Standards for Optimal Security and Advanced Threat Mitigation

BLOG

AWS Security Best Practices Checklist

BLOG

2023 MGM Breach: A Wake-Up Call for Better Social Engineering Training for Employees

BLOG

How to Reduce Web App and Cloud Application Security Risks

BLOG

Governance, Supply Chain, & Risk Management, Oh My! Understanding the New NIST CSF 2.0 Draft Guideline Changes

BLOG

Understanding Email Authentication Protocols: A Technical Overview of SPF, DKIM and DMARC With Configuration Tips

BLOG

Planning Your Annual Pentest: A Checklist of Penetration Testing Best Practices

BLOG

What’s Hot in Cybersecurity? Recapping the Top 2023 Cybersecurity Trends from Black Hat, DEFCON, and BSides

BLOG

Practical Tips for Prioritizing Your 2024 Cybersecurity Improvements


CONTACT US