Reading Time: 2 mins With cybersecurity evolving at a faster pace than ever, here are some predictions for what to…
Reading Time: 2 mins Lumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert…
Reading Time: 2 mins Lumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise…
Reading Time: 3 mins Supply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you…
Reading Time: 2 mins A CISO’s list of responsibilities never gets any shorter, so we asked them about their most…
Reading Time: 3 mins The powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to…
Reading Time: 2 mins On December 13th, information was released about the SolarWinds hack, one of the most extensive and…
Reading Time: 3 mins As security professionals, we hear about mitigation and remediation on a daily basis. However, these are…
Reading Time: 4 mins Security operations teams are increasingly inundated with alerts. Take a look at how Lumu can make…
Reading Time: 3 mins After a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together…
Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work…
Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common…
Reading Time: 3 mins Analyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how…
Reading Time: 2 mins Cybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the…
Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks…