• Attacks

Recognize the First Signs of a Ransomware Chain

3 years ago

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

3 years ago

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

  • Attacks

Monetization of Cybercrime: It’s All About the Money

3 years ago

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

  • Culture

Why I’m Taking Off With Lumu

3 years ago

Reading Time: 2 minsLuis Quiñones has joined Lumu Technologies after more than a decade in various roles at Cisco North…

  • Interviews

Flash Talk: Greg Touhill on the State of Cybersecurity

3 years ago

Reading Time: 4 minsThe State of Cybersecurity in 2021: Americas’ first federal CISO talks us in the wake of yet…

  • Interviews

In the Spotlight: SMB Cybersecurity Challenges

3 years ago

Reading Time: 5 minsAs Director of Engineering and Security at Upward Technologies, Elias Stucky works to solve small and medium-sized…

  • Technical

Is Your SIEM a Bad Habit?

3 years ago

Reading Time: 4 minsVeteran Cybersecurity Operator at Lumu Andrés Argüelles looks at using Lumu with your SIEM to get the…

  • Culture

Life@Lumu: JP González, UX/UI Tech Lead

3 years ago

Reading Time: 3 minsUX/UI Tech Lead at Lumu, JP Gonzalez shares his insight into how continuous learning drives his personal…

  • Technical

Lumu Defender: Automating Threat Defense

3 years ago

Reading Time: 3 minsLumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an automated…

  • Interviews

Flash Talk: Forrester on SIEMs, Alert Fatigue, and Prioritizing Cybersecurity Projects

3 years ago

Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry.…

  • Trends

They Call It XDR. We Call It Continuous Compromise Assessment.

3 years ago

Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the…

  • Interviews

In the Spotlight: 7 Habits of Highly Effective Cybersecurity Operators

3 years ago

Reading Time: 6 minsIn a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the…

  • Trends

White House Ransomware Open Letter: 5 Takeaways

3 years ago

Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…

  • Technical

eWeek Review: Lumu Illuminates the Current Threat Landscape

3 years ago

Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes 'fighting cyber threats with actionable intelligence a…

  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

4 years ago

Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…