Fernando Cuervo

  • Stories

Cybersecurity 2022: New Tools, Dynamic Attacks, and Talent Shortage

Reading Time: 2 mins With cybersecurity evolving at a faster pace than ever, here are some predictions for what to…

2 years ago
  • Technical

A New Experience to Help You Operate Cybersecurity Proficiently

Reading Time: 2 mins Lumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert…

3 years ago
  • Technical

The Custom Collector API: Seamless Metadata Collection

Reading Time: 2 mins Lumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise…

3 years ago
  • Attacks

Supply Chain Risk: After the SolarWinds Incident

Reading Time: 3 mins Supply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you…

3 years ago
  • Stories

CISO’s 2021 Cybersecurity Priorities

Reading Time: 2 mins A CISO’s list of responsibilities never gets any shorter, so we asked them about their most…

3 years ago
  • Technical

MITRE ATT&CK® Matrix is Now Included in Lumu

Reading Time: 3 mins The powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to…

3 years ago
  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 mins On December 13th, information was released about the SolarWinds hack, one of the most extensive and…

3 years ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 mins As security professionals, we hear about mitigation and remediation on a daily basis. However, these are…

3 years ago
  • Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 mins Security operations teams are increasingly inundated with alerts. Take a look at how Lumu can make…

3 years ago
  • Stories

Cybersecurity 2021: What to Expect After the Year That Changed Everything

Reading Time: 3 mins After a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together…

3 years ago
  • Technical

Lumu Agent: Compromise Visibility Built for Remote Workers

Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work…

4 years ago
  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common…

4 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 mins Analyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how…

4 years ago
  • Stories

Cybersecurity Strategy Post-covid: What You Should Know

Reading Time: 2 mins Cybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the…

4 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks…

4 years ago