Lumu Defender: Automating Threat Defense
Reading Time: 3 minsLumu Defender lets you feed Lumu’s confirmed compromise instances into your existing cybersecurity stack for an automated response to cyber threats.
Reading Time: 3 minsLumu Defender lets you feed Lumu’s confirmed compromise instances into your existing cybersecurity stack for an automated response to cyber threats.
Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry. Read the highlights here.
Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate action items and key takeaways.
Reading Time: 7 minsZero Trust’s most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get more insights from “Dr. Zero Trust”.
Reading Time: 2 mins“The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform.” Get more insights from CISO Manuel Santander.
Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware attacks are evolving. Here’s what you can do to protect your organization.
Reading Time: 3 minsThese holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year for cybersecurity.
Reading Time: 4 minsOn average, a CISO’s tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays out any new CISO’s priorities.
Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.
Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.
Reading Time: 2 minsThe economic downturn caused by the coronavirus will place financial pressure on cybersecurity budgets, forcing more intelligent spending.
Reading Time: 2 minsThe coronavirus is an unprecedented challenge, but cybercriminals won’t lose focus. Neither should security practitioners.
Reading Time: 3 minsThis is only the beginning. Today, I am introducing you to Lumu Technologies, which brings a radical shift in the approach to cybersecurity.
© Lumu Technologies All rights reserved. | Legal information.