Javier Vargas

Javier Vargas, Chief Product Officer at Lumu Technologies, drives product strategy and innovation, ensuring that Lumu continues to deliver world-class cybersecurity solutions. With 15 years in cutting-edge software development, he excels at transforming ideas into market-leading solutions. Previously, he held key roles at Easy Solutions and Cyxtera, leading research and product innovation. Javier has a history of building high-performing, collaborative teams. He is a Software Engineer, a self-taught musician, and promotes growth through knowledge-sharing and networking.
  • Product

How To Implement Zero Trust with Lumu

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they…

7 months ago
  • Technical

Cloud Network Threat Visibility and Response

Reading Time: 4 minsAchieve comprehensive cloud visibility across your hybrid and multi-cloud environments to proactively detect and respond to network…

1 year ago
  • Product

Introducing Lumu Discover: External Attack Surface Assessment

Reading Time: 5 minsLumu has released Lumu Discover, giving real-time, actionable intelligence on your external attack surface.

1 year ago
  • Technical

The Hidden Pitfalls of Deep Packet Inspection

Reading Time: 6 minsExplore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and…

1 year ago
  • Product

A Look Back At Our Product in 2023

Reading Time: 4 mins2023 at Lumu: Pioneering advancements in AI-driven cybersecurity solutions and partnerships, enhancing incident management and operational efficiency.

2 years ago
  • Product

Introducing Lumu’s New Incident View: Built to Empower the SOC

Reading Time: 4 minsThe new Lumu Incident View is a single screen that places at the cybersecurity operator’s fingertips the…

4 years ago
  • Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…

4 years ago
  • Attacks

Supply Chain Risk: After the SolarWinds Incident

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

5 years ago
  • Product

MITRE ATT&CK® Matrix Is Now Included in Lumu

Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see…

5 years ago
  • Trends

Artificial Intelligence Is Not an End in Itself

Reading Time: 4 minsArtificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is…

6 years ago
  • Trends

Coronavirus Workplace Disruption Demands Enhanced Compromise Visibility

Reading Time: 2 minsThe coronavirus pandemic has forced enterprises into a rushed transition to working remotely that exposes them to…

6 years ago
  • Attacks

The Unacceptable Time Gap Between a Breach and Its Detection

Reading Time: 3 minsA recent report from NUIX stated that an attacker only needs 15 hours on average to breach…

7 years ago