Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry.…
Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the…
Reading Time: 6 minsIn a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the…
Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…
Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes 'fighting cyber threats with actionable intelligence a…
Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…
Reading Time: 7 minsZero Trust's most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get…
Reading Time: 2 mins"The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform." Get more insights from…
Reading Time: 7 minsLIfe@Lumu gives you an insight into what it’s like to be an Illuminator. After the success of…
Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…
Reading Time: 2 minsLumu Academy offers free cybersecurity courses on Lumu products. Get Lumu certification through our self-paced virtual courses.
Reading Time: 2 minsLumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert fatigue…
Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons…
Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.
Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this…