• Trends

In the Spotlight: Maria Konnikova

5 years ago

Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons…

  • Technical

The Custom Collector API: Seamless Metadata Collection

5 years ago

Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

  • Technical

Why Optimizing Security Operations is Needed (and Possible)

5 years ago

Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this…

  • Attacks

Supply Chain Risk: After the SolarWinds Incident

5 years ago

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

  • Stories

CISO’s 2021 Cybersecurity Priorities

5 years ago

Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent…

  • Product

MITRE ATT&CK® Matrix Is Now Included in Lumu

5 years ago

Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see…

  • Trends

2021 Cybersecurity Books to Read

5 years ago

Reading Time: 3 minsThese holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year…

  • Trends

New CISO: Objectives for the First 30 Days

5 years ago

Reading Time: 4 minsOn average, a CISO's tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays…

  • Attacks

SolarWinds Hack: Immediate Action Items

5 years ago

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

  • Technical

Optimize Security Operations in 3 Steps

5 years ago

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…

  • Stories

Cybersecurity 2021: What to Expect After the Year That Changed Everything

5 years ago

Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together the…

  • Trends

How CISOs Can Reduce Ransomware Anxiety

5 years ago

Reading Time: 3 minsFrom securing a sudden remote workforce to the rise of ransomware, CISOs have had an especially interesting…

  • Product

Lumu Agent: Compromise Visibility Built for Remote Workers

5 years ago

Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…

  • Trends

From Zero Trust to Zero Compromises

5 years ago

Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture…

  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

5 years ago

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…