• Interviews

In the Spotlight: Chase Cunningham on Zero Trust

4 years ago

Reading Time: 7 minsZero Trust's most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get…

  • Interviews

In the Spotlight: Manuel Santander on the MITRE ATT&CK Matrix

4 years ago

Reading Time: 2 mins"The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform." Get more insights from…

  • Culture

Life@Lumu: The Illumination Summit Team

4 years ago

Reading Time: 7 minsLIfe@Lumu gives you an insight into what it’s like to be an Illuminator. After the success of…

  • Attacks

Lessons from (Another) Florida Ransomware Attack

4 years ago

Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware…

  • Technical

Introducing Lumu Academy

4 years ago

Reading Time: 2 minsLumu Academy offers free cybersecurity courses on Lumu products. Get Lumu certification through our self-paced virtual courses.

  • Technical

A New Experience to Help You Operate Cybersecurity Proficiently

4 years ago

Reading Time: 2 minsLumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert fatigue…

  • Interviews

In the Spotlight: Maria Konnikova

4 years ago

Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons…

  • Technical

The Custom Collector API: Seamless Metadata Collection

4 years ago

Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

  • Technical

Why Optimizing Security Operations is Needed (and Possible)

4 years ago

Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this…

  • Attacks

Supply Chain Risk: After the SolarWinds Incident

4 years ago

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here's how you can…

  • Stories

CISO’s 2021 Cybersecurity Priorities

4 years ago

Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent…

  • Technical

MITRE ATT&CK® Matrix is Now Included in Lumu

4 years ago

Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see…

  • Trends

2021 Cybersecurity Books to Read

4 years ago

Reading Time: 3 minsThese holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year…

  • Trends

New CISO: Objectives for the First 30 Days

4 years ago

Reading Time: 4 minsOn average, a CISO's tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays…

  • Attacks

SolarWinds Hack: Immediate Action Items

4 years ago

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…