• Attacks

Conti Ransomware Group: the Alliances Behind the Chaos

2 years ago

Reading Time: 4 minsThe Conti Ransomware Group has recently unleashed a series of attacks on nations including Costa Rica, resulting…

  • Interviews

What I’ve Learned from My Conversations With Customers

3 years ago

Reading Time: 4 minsAfter numerous conversations with customers Nicole Ibarra, Lumu's Director of Product Marketing, reports back on her findings.

  • Interviews

The Need for Cybersecurity Operations

3 years ago

Reading Time: 3 minsCybersecurity operations can be hard but are needed in all businesses. EMA Research Director Chris Steffen shares…

  • Trends

The SOC of the Future

3 years ago

Reading Time: 4 minsLumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental…

  • Trends

Top Questions Lumu’s Customers Are Asking Now

3 years ago

Reading Time: 4 minsIn April of 2022, it seems that cybersecurity is more unsettled than ever. Here are the top…

  • Attacks

Ransomware Flashcard 2022: The Vicious Cycle

3 years ago

Reading Time: 3 minsTrends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level.…

  • Technical

The New and Improved Lumu Free

3 years ago

Reading Time: 3 minsLumu Free just got a major upgrade. We've included more metadata collectors, giving you greater network visibility…

  • Trends

2022 CISO Priorities Flashcard: Remote Workforce Remains Top Concern

3 years ago

Reading Time: 2 minsWe polled over 300 CISOs from across the Americas on the cybersecurity challenges they're prioritizing in 2022.…

  • Culture

Why I Joined the Lumu Team

3 years ago

Reading Time: 2 minsDirector of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here's how the Lumu story—and our…

  • Trends

Lumu’s Year in Review 2021

3 years ago

Reading Time: 2 minsIn 2021 Lumu grew from strength to strength—in every metric. Here's our Year in Review with all…

  • Attacks

Log4j: What You Need to Know

3 years ago

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…

  • Stories

Cybersecurity 2022: New Tools, Dynamic Attacks, and Talent Shortage

3 years ago

Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

3 years ago

Reading Time: 2 minsAnalyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’ biggest…

  • Trends

German Patiño: Taking Zero Trust to the Next Level

3 years ago

Reading Time: 2 minsGerman Patiño has spent over a decade helping companies implement cutting-edge cybersecurity, including ZT. Here’s why Lumu…

  • Trends

Cybersecurity Myths: 6 Common Errors

3 years ago

Reading Time: 2 minsSmall businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly…