• Technical

Lumu Agent: Compromise Visibility Built for Remote Workers

4 years ago

Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work…

  • Trends

From Zero Trust to Zero Compromises

4 years ago

Reading Time: 3 mins The concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust…

  • Attacks

Prevent Ransomware by Avoiding These 5 Mistakes

4 years ago

Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common…

  • Technical

Ransomware Attacks and How Lumu Helps

4 years ago

Reading Time: 5 mins Ransomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and…

  • Trends

2020 Compromise Flashcard

4 years ago

Reading Time: 3 mins We’ve pored through the most recent data breach reports to paint a clear picture of how…

  • Trends

Lumu Customers’ Top 5 Aha! Moments

4 years ago

Reading Time: 2 mins The Lumu Portal always manages to delight our customers. We looked at some of the most…

  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

4 years ago

Reading Time: 3 mins Analyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how…

  • Events

Illumination Summit Recap

4 years ago

Reading Time: 4 mins Lumu's Illumination Summit has come and gone, but you can still relive every talk and discussion…

  • Attacks

Malware Delivery as a Service

4 years ago

Reading Time: 4 mins Malware Delivery as a Service is a specialized service designed to meet ransomware's demand for access…

  • Events

The Illumination Summit Marketing Journey

4 years ago

Reading Time: 3 mins Lumu's Illumination Summit is a unique experience for cybersecurity professionals. Here's how it came about.

  • Trends

Artificial Intelligence Is Not an End in Itself

4 years ago

Reading Time: 4 mins Artificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key…

  • Stories

Cybersecurity Strategy Post-covid: What You Should Know

4 years ago

Reading Time: 2 mins Cybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the…

  • Technical

Compromise Context Supercharges Incident Response

4 years ago

Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks…

  • Technical

Revealing the Magic Behind Your Metadata

4 years ago

Reading Time: 2 mins Network metadata has the power to efficiently answer the most important question in cybersecurity: Is my…

  • Trends

Lumu Celebrates a New Illumination Milestone

4 years ago

Reading Time: < 1 min We are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power…