Blog

Common ASV Vulnerability Scan Misconfigurations

I am concerned that many users are not configuring their approved scanning vendor (ASV) scans per requirement 11.2 correctly. Read more.

Blog

eDiscovery or Digital Forensics?

Here’s a brief explanation and comparison of both, as well as a few key reasons that it’s important to know the difference and choose the right experts carefully.

Blog

PODCAST: Targeted Attacks Compared to Opportunistic Attacks

In a recent article for techtalk titled, “Targeted Attacks or Untargeted Attacks—Which… Read more »

Blog

Digital Forensics for the Enterprise

LMBC Information Security’s Bill Dean shares the latest in digital forensics news, including articles of interest, podcasts, and eDiscovery Case Law links.

Blog

How to Maximize ROI with Endpoint Security Services

Getting the best ROI on endpoint security services means understanding your company’s needs and hiring a team that meets them.

Blog

What You Should Know About Purple-Teaming and Attack Simulations

Purple-teaming can help your network reach a new level of security. LBMC Information Security explains how.

Blog

GDPR and Member States: What You Should Know

The GDPR affords certain powers to Member States. Here are the most important ones you should know about.

Blog

How to Get Less Findings on Your Next Internal Penetration Test

LBMC Information Security’s Stewart Fey highlights a popular method that both pen testers and hackers alike use to gain a foothold on your internal network which typically leads to a full compromise/hack.

Blog

Six Considerations When Preparing for Data Subject Requests

The GDPR gives users 8 access rights for their personal data. Here are six considerations to help you prepare and respond to their requests.

Blog

How to Determine GDPR Applicability and Future Enforcement

The GDPR is coming. Here’s how to determine if it applies to your organization.