Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…
Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…
Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We've put together the…
Reading Time: 3 minsFrom securing a sudden remote workforce to the rise of ransomware, CISOs have had an especially interesting…
Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…
Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture…
Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…
Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE,…
Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber…
Reading Time: 2 minsThe Lumu Portal always manages to delight our customers. We looked at some of the most pleasantly…
Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…
Reading Time: 4 minsLumu's Illumination Summit has come and gone, but you can still relive every talk and discussion in…
Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware's demand for access to…
Reading Time: 3 minsLumu's Illumination Summit is a unique experience for cybersecurity professionals. Here's how it came about.
Reading Time: 4 minsArtificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is…