Already have an account? Sign in

Sign in

Blog
READING TIME: 4 MINS
Detecting and stopping attacks using anonymization techniques can give your team the upper hand against cyber criminals — but how do attackers use anonymization and how can we defend against it?
Blog
READING TIME: 4 MINS
The December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?
Blog
READING TIME: 4 MINS
Lumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.
Blog
READING TIME: 5 MINS
Lumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.
Attacks
READING TIME: 7 MINS
This is the story of a serious DNS tunneling attack on a multinational insurance provider — discover the importance of DNS tunneling detection, what we found when we investigated the attack, and how we contained it.
Events
READING TIME: 4 MINS
Discover the top insights from Lumu’s pre-conference workshop at IT Nation Connect, where MSP leaders shared actionable advice on building effective cybersecurity stacks, pricing services, and managing client success

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.