Reading Time: 3 minsLumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an automated…
Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry.…
Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…
Reading Time: 7 minsZero Trust's most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get…
Reading Time: 2 mins"The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform." Get more insights from…
Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…
Reading Time: 3 minsThese holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year…
Reading Time: 4 minsOn average, a CISO's tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays…
Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture…
Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber…
Reading Time: 2 minsThe economic downturn caused by the coronavirus will place financial pressure on cybersecurity budgets, forcing more intelligent…
Reading Time: 2 minsThe coronavirus is an unprecedented challenge, but cybercriminals won't lose focus. Neither should security practitioners.
Reading Time: 3 minsThis is only the beginning. Today, I am introducing you to Lumu Technologies, which brings a radical…