Already have an account? Sign in

Sign in

Attacks
READING TIME: 4 MINS
The Instructure data breach gives adversaries access to sensitive K-12 data. Discover how the breach happened and important steps educational institutions should take to defend themselves.
Trends
READING TIME: 6 MINS
Empower your school's cyber stack by securing 1:1 Chromebooks. Learn how network detection provides the visibility needed to stop threats early.
Trends
READING TIME: 7 MINS
Network perimeters are no longer static. They grow and shift with third parties, whose credential leaks are now your biggest supply chain vulnerability
Attacks
READING TIME: 7 MINS
How does the 2026 Remcos RAT bypass your security to stream live surveillance? Understand the latest campaign and how to protect your enterprise.
Trends
READING TIME: 3 MINS
As RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the industry’s shift toward the Agentic Revolution and the move from chatbot interactions to autonomous security that operates at machine speed.
Trends
READING TIME: 4 MINS
Manual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.