Latest Blog Post

read more

Upcoming Events

September 16, 2015 - LMG will teach "Digital First Responder Training" at our World Headquarters in Missoula, MT. Sign up now!

September 22, 2015 - LMG will teach "Digital First Responder Training" in Billings, MT. Sign up now!


Congratulations to all the teams that participated in the Network Forensics Puzzle Contest at DEF CON 23! View contest results, hints, and passwords here.

We're pleased to announced that Network Forensics Puzzle DVDs from 2011, 2012, and 2014 are all available on BytePuzzles!

LinkedIn Reddit Delicious Technorati Twitter Digg Stumbleupon

Join our Email Newsletter

Send your cybersecurity questions to for the chance to have them answered in our newsletter!

Class and Book

Want "Network Forensics" (the class) taught privately at your facilities? Request an Onsite

Order Network Forensics: Tracking Hackers Through Cyberspace!

Need Expert Consulting?

Request a Quote

Email Us an RFP


As authors, instructors, and researchers, we enjoy writing and speaking. Here you will find a collection of whitepapers and presentation slides. We will be adding more during the next few months; check back often for updates.

Title Description
Security Questions & Answers for Law Firms

Eleven questions asked and answered in this white paper:

  1. Our staff would like to exchange files with outside parties using a web service. Is this safe?
  2. How can we send and receive encrypted emails?
  3. Our staff has mobile devices such as laptops, Blackberries, and iPads. How we keep confidential information on these devices secure?
  4. We have a document repository on our company network. How can we make this secure so that we are in compliance with regulations such as HIPAA?
  5. How can our staff remotely access the applications and data on our internal network?
  6. How can we dispose of hard drives and other electronic storage safely?
  7. What is a penetration test?
  8. What is a vulnerability assessment?
  9. What is the difference between a penetration test and a vulnerability assessment?
  10. What is an architecture review?
  11. What is a policy/procedure gap analysis?