Julian Brown

  • Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 minsTrends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level.…

4 years ago
  • Trends

2022 CISO Priorities Flashcard: Remote Workforce Remains Top Concern

Reading Time: 2 minsWe polled over 300 CISOs from across the Americas on the cybersecurity challenges they're prioritizing in 2022.…

4 years ago
  • Stories

Cybersecurity 2022: New Tools, Dynamic Attacks, and Talent Shortage

Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

4 years ago
  • Trends

Cybersecurity Myths: 6 Common Errors

Reading Time: 2 minsSmall businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly…

4 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

4 years ago
  • Trends

In the Spotlight: SMB Cybersecurity Challenges

Reading Time: 5 minsAs Director of Engineering and Security at Upward Technologies, Elias Stucky works to solve small and medium-sized…

5 years ago
  • Technical

eWeek Review: Lumu Illuminates the Current Threat Landscape

Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes 'fighting cyber threats with actionable intelligence a…

5 years ago
  • Trends

In the Spotlight: Maria Konnikova

Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons…

5 years ago
  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

5 years ago
  • Stories

Cybersecurity 2021: What to Expect After the Year That Changed Everything

Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together the…

5 years ago
  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…

5 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…

6 years ago
  • Stories

Cybersecurity Strategy Post-covid: What You Should Know

Reading Time: 2 minsCybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19…

6 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…

6 years ago
  • Technical

Continuous Compromise Assessment – Why Now

Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.

6 years ago