Fabian Mejia

  • Stories

Cybersecurity Trends 2025 and Beyond: Navigating AI-Driven Evasion Techniques and Autonomous Threats for Resilient Defense

Reading Time: 2 minsAs we move into 2025, AI-driven evasion and autonomous threats will redefine cybersecurity, pushing organizations to adapt…

1 month ago
  • Stories

Cybersecurity 2022: New Tools, Dynamic Attacks, and Talent Shortage

Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

3 years ago
  • Technical

A New Experience to Help You Operate Cybersecurity Proficiently

Reading Time: 2 minsLumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert fatigue…

4 years ago
  • Technical

The Custom Collector API: Seamless Metadata Collection

Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

4 years ago
  • Attacks

Supply Chain Risk: After the SolarWinds Incident

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

4 years ago
  • Stories

CISO’s 2021 Cybersecurity Priorities

Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent…

4 years ago
  • Technical

MITRE ATT&CK® Matrix is Now Included in Lumu

Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see…

4 years ago
  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

4 years ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…

4 years ago
  • Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…

4 years ago
  • Stories

Cybersecurity 2021: What to Expect After the Year That Changed Everything

Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together the…

4 years ago
  • Technical

Lumu Agent: Compromise Visibility Built for Remote Workers

Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…

4 years ago
  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…

4 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…

4 years ago
  • Stories

Cybersecurity Strategy Post-covid: What You Should Know

Reading Time: 2 minsCybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19…

5 years ago