This story is based on true events and dives into what happens when initial contact is made with some of…
Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that…
Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…
Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…
Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…
Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…
Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…
Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…
Reading Time: 2 minsWe surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their responses…
Reading Time: 6 minsThreat-informed defense is a strategic approach to risk-based cybersecurity that even smaller organizations can get up and…
Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.
Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the…
Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…
Reading Time: 3 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…
Reading Time: 4 minsOur CISOs' Lessons report shares the insights of cybersecurity leaders who have experienced worst-case security breaches. Here's…