Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Posts by this author

how to implement zero trust
Product

How To Implement Zero Trust with Lumu

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they work. Integrating Zero Trust with Lumu gives you the needed visibility.

hidden pitfalls Deep Packet Inspection
Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI’s limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and threat detection.

2023 Cybersecurity Product Recap
Product

A Look Back At Our Product in 2023

Reading Time: 4 mins2023 at Lumu: Pioneering advancements in AI-driven cybersecurity solutions and partnerships, enhancing incident management and operational efficiency.

The Log4j vulnerability (also known as CVE-2021-44228) affects 1000's of software applications.
Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.