Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine cybersecurity, pushing organizations to adapt…
Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…
Reading Time: 2 minsLumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert fatigue…
Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.
Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…
Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent…
Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see…
Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…
Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…
Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…
Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together the…
Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…
Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…
Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…
Reading Time: 2 minsCybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19…