LBMC Information Security shares tips for how retailers and banks can prepare for the surge in cyber attacks around the holidays.
Service: Technical Security
Penetration testing and incident response
Multi-Pronged Approach to Cybersecurity
While many companies are beginning to understand how real cybersecurity threats are, most are still ill-prepared to defend against them.
IDS vs. IPS: How Each System Works and Why You Need Them
While the lines between IDS/IPS have become blurred over time, LBMC highlights some unique differences essential to note.
Top 11 Windows Events to Monitor
Monitoring is an imperative part of a healthy information security program. Here are the Windows events you should be monitoring.
Network Compromise Analysis: Lessons Learned from Breaches
If you listen to country music on occasion, you might… Read more »
eDiscovery or Digital Forensics?
Here’s a brief explanation and comparison of both, as well as a few key reasons that it’s important to know the difference and choose the right experts carefully.
PODCAST: Targeted Attacks Compared to Opportunistic Attacks
In a recent article for techtalk titled, “Targeted Attacks or Untargeted Attacks—Which… Read more »
What You Should Know About Purple-Teaming and Attack Simulations
Purple-teaming can help your network reach a new level of security. LBMC Information Security explains how.
How to Get Less Findings on Your Next Internal Penetration Test
LBMC Information Security’s Stewart Fey highlights a popular method that both pen testers and hackers alike use to gain a foothold on your internal network which typically leads to a full compromise/hack.
A Guide to Application Security Assessments
LBMC’s Andrew Smith provides important questions and risks to consider when planning a web application security assessment.