• Attacks

Malware Delivery as a Service

4 years ago

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware's demand for access to…

  • Events

The Illumination Summit Marketing Journey

5 years ago

Reading Time: 3 minsLumu's Illumination Summit is a unique experience for cybersecurity professionals. Here's how it came about.

  • Trends

Artificial Intelligence Is Not an End in Itself

5 years ago

Reading Time: 4 minsArtificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is…

  • Stories

Cybersecurity Strategy Post-covid: What You Should Know

5 years ago

Reading Time: 2 minsCybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19…

  • Technical

Compromise Context Supercharges Incident Response

5 years ago

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…

  • Technical

Revealing the Magic Behind Your Metadata

5 years ago

Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network…

  • Trends

Lumu Celebrates a New Illumination Milestone

5 years ago

Reading Time: < 1 minWe are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power of…

  • Trends

The Post-coronavirus Economy and Cybersecurity Planning

5 years ago

Reading Time: 2 minsThe economic downturn caused by the coronavirus will place financial pressure on cybersecurity budgets, forcing more intelligent…

  • Trends

Coronavirus Workplace Disruption Demands Enhanced Compromise Visibility

5 years ago

Reading Time: 2 minsThe coronavirus pandemic has forced enterprises into a rushed transition to working remotely that exposes them to…

  • Trends

The Two Ways Coronavirus is Affecting Cybersecurity

5 years ago

Reading Time: 2 minsThe coronavirus is an unprecedented challenge, but cybercriminals won't lose focus. Neither should security practitioners.

  • Technical

Continuous Compromise Assessment – Why Only Now

5 years ago

Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.

  • Events

Lumu’s RSA Conference Recap

5 years ago

Reading Time: 2 minsLumu attended RSA Conference 2020, featuring on cybersecurity news sites including Dark Reading, CSO.com, and CRN.

  • Trends

451 Business Impact Brief: Illuminating and Transforming Enterprise Security

5 years ago

Reading Time: < 1 minLeading analyst firm 451 Research's Business Impact Brief discusses how organizations lack the ability to detect…

  • Events

Kick-Off Week at Lumu: Light Speed Ahead

5 years ago

Reading Time: 2 minsLumu hosts its first-ever Kickoff to discuss Continuous Compromise Assessment moving light speed ahead into 2020.

  • Stories

Cybersecurity 2020: What You Should Know before Heading into the New Year

5 years ago

Reading Time: 3 mins2019 showed that no business is immune to security breaches. Turn your attention to these 8 key…