• Interviews

Flash Talk: Forrester on SIEMs, Alert Fatigue, and Prioritizing Cybersecurity Projects

4 years ago

Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry.…

  • Trends

They Call It XDR. We Call It Continuous Compromise Assessment.

4 years ago

Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the…

  • Interviews

In the Spotlight: 7 Habits of Highly Effective Cybersecurity Operators

4 years ago

Reading Time: 6 minsIn a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the…

  • Trends

White House Ransomware Open Letter: 5 Takeaways

4 years ago

Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate…

  • Technical

eWeek Review: Lumu Illuminates the Current Threat Landscape

4 years ago

Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes 'fighting cyber threats with actionable intelligence a…

  • Attacks

Critical Infrastructure Ransomware Attacks Escalate

4 years ago

Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for…

  • Interviews

In the Spotlight: Chase Cunningham on Zero Trust

4 years ago

Reading Time: 7 minsZero Trust's most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get…

  • Interviews

In the Spotlight: Manuel Santander on the MITRE ATT&CK Matrix

4 years ago

Reading Time: 2 mins"The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform." Get more insights from…

  • Culture

Life@Lumu: The Illumination Summit Team

4 years ago

Reading Time: 7 minsLIfe@Lumu gives you an insight into what it’s like to be an Illuminator. After the success of…

  • Attacks

Lessons from (Another) Florida Ransomware Attack

4 years ago

Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…

  • Technical

Introducing Lumu Academy

4 years ago

Reading Time: 2 minsLumu Academy offers free cybersecurity courses on Lumu products. Get Lumu certification through our self-paced virtual courses.

  • Technical

A New Experience to Help You Operate Cybersecurity Proficiently

4 years ago

Reading Time: 2 minsLumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert fatigue…

  • Interviews

In the Spotlight: Maria Konnikova

4 years ago

Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons…

  • Technical

The Custom Collector API: Seamless Metadata Collection

4 years ago

Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

  • Technical

Why Optimizing Security Operations is Needed (and Possible)

4 years ago

Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this…