Skip to content

Already have an account? Sign in

Sign in

  • Business
  • MSP
    • English
    • Português
    • Spanish
  • Business
  • MSP
    • English
    • Português
    • Spanish
  • Product
  • Use Cases
  • Pricing
  • Product
  • Use Cases
  • Pricing
  • Blog
  • Resources
  • Partners
    • Resellers
    • MSP/MSSP
    • Ecosystem
  • Company
    • About Us
    • Investors
  • Get FREE Account
Menu
  • Blog
  • Resources
  • Partners
    • Resellers
    • MSP/MSSP
    • Ecosystem
  • Company
    • About Us
    • Investors
  • Get FREE Account
Menu
  • Product
  • Use Cases
  • Pricing
  • Blog
  • Resources
  • Partners
    • Resellers
    • MSP/MSSP
    • Ecosystem
  • Company
    • About Us
    • Investors
  • Sign in Business
  • Sign in MSP
  • Get FREE Account
    • English
    • Português
    • Spanish
    • English
    • Português
    • Spanish
David Sylvester

David Sylvester

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

October 27, 2021

Reading Time: 3 mins MSPs’ skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

They Call It XDR. We Call It Continuous Compromise Assessment.

June 30, 2021

Reading Time: 4 mins XDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the problem of ever-increasing data breaches?

In the Spotlight: 7 Habits of Highly Effective Cybersecurity Operators

June 8, 2021

Reading Time: 6 mins In a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the constructive habits that can transform professional and personal lives.

Critical Infrastructure Ransomware Attacks Escalate

May 11, 2021

Reading Time: 4 mins The Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for security operators at SMEs.

How CISOs Can Reduce Ransomware Anxiety

November 6, 2020

Reading Time: 3 mins From securing a sudden remote workforce to the rise of ransomware, CISOs have had an especially interesting year.

When Compromised Infrastructure Has Catastrophic Consequences

October 1, 2019

Reading Time: 5 mins Financial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

Capital One Breach Demands New Approach to Cybersecurity

August 8, 2019

Reading Time: 3 mins In one of the largest data breaches ever, Capital One admitted recently that more than 100 million customer records were compromised.

Pentesting and the False Sense of Security

June 1, 2019

Reading Time: 3 mins Pentesting started as a concept in 1960 as early computer industry pioneers knew there would be inherent risks to controlling access.

PRODUCT

  • Featured Releases
  • Key Features
  • Why Lumu?
  • Illumination Process​
  • How to Deploy Lumu
  • Industry Validation
  • Use Cases
  • Pricing
  • Take a Tour
  • FAQ

PARTNERS

  • Resellers
  • MSP/MSSP
  • Ecosystem

RESOURCES

  • Case Studies
  • Datasheets
  • Enlightenment Briefs
  • Infographics
  • Podcasts
  • Press Releases
  • Reports
  • User Guides
  • Videos
  • Whitepapers
  • Academy

COMPANY

  • About Us
  • Blog
  • Investors
  • Events
  • Careers
  • Contact

SUPPORT

  • Getting Started
  • Videos
  • Contact

TRENDING

  • Prevent ransomware
  • SOC 2 compliance
  • Lateral movement
  • Security orchestration
  • The future of cybersecurity
Facebook-f Twitter Linkedin-in Instagram Youtube

© Lumu Technologies All rights reserved. | Legal information.