Featured Blog
I Have the Power: IoT Security Challenges Hidden in Smart Bulbs and Outlets
“You think it’s just a light bulb—but it’s not off. It’s watching, listening… maybe even hacking.” That quote from LMG Security’s Penetration Testing Team Manager Tom Pohl drew laughter and wide-eyed stares at BSides Des Moines 2025, but the implications were anything but funny. His talk tackled a growing and often overlooked issue: IoT security […]
Attack Surface Monitoring, Vulnerabilities, Vulnerability Scanning
Why Continuous Vulnerability Management Is the Top Cybersecurity Control for Q2 2025
Cryptography, Quantum Computing and Cybersecurity
Quantum Computing and Cybersecurity: How to Secure the Quantum Future
Web application security
Are Your AI-Backed Web Apps Secure? Why Prompt Injection Testing Belongs in Every Web App Pen Test
cybersecurity training, Incident Response
Critical Incident Response Training: Your Top Questions Answered
Data encryption, Email Encryption
Securing the Email Flow: Implementing Encrypted Email in Microsoft 365, Exchange, and Onward
Ransomware, Tabletop Exercises