Lumu Defender: Automating Threat Defense

Reading Time: 3 mins Lumu Defender lets you feed Lumu’s confirmed compromise instances into your existing cybersecurity stack for an automated response to cyber threats.

Lessons from (Another) Florida Ransomware Attack

Reading Time: 4 mins The $40 million attack on the Broward County public school district is an example of how ransomware attacks are evolving. Here’s what you can do to protect your organization.

2021 Cybersecurity Books to Read

Reading Time: 3 mins These holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year for cybersecurity.

New CISO: Objectives for the First 30 Days

Reading Time: 4 mins On average, a CISO’s tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays out any new CISO’s priorities.

From Zero Trust to Zero Compromises

Reading Time: 3 mins The concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.

2020 Compromise Flashcard

Reading Time: 3 mins We’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.