Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work…
Reading Time: 3 mins The concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust…
Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common…
Reading Time: 5 mins Ransomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and…
Reading Time: 3 mins We’ve pored through the most recent data breach reports to paint a clear picture of how…
Reading Time: 2 mins The Lumu Portal always manages to delight our customers. We looked at some of the most…
Reading Time: 3 mins Analyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how…
Reading Time: 4 mins Lumu's Illumination Summit has come and gone, but you can still relive every talk and discussion…
Reading Time: 4 mins Malware Delivery as a Service is a specialized service designed to meet ransomware's demand for access…
Reading Time: 3 mins Lumu's Illumination Summit is a unique experience for cybersecurity professionals. Here's how it came about.
Reading Time: 4 mins Artificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key…
Reading Time: 2 mins Cybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the…
Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks…
Reading Time: 2 mins Network metadata has the power to efficiently answer the most important question in cybersecurity: Is my…
Reading Time: < 1 min We are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power…