Trends

Lumu’s Next Chapter: A Deep Dive into Our $30M Series B Funding

Table of Contents

Lumu is entering a groundbreaking phase with our $30 million Series B funding round, led by Forgepoint Capital. This milestone allows us to empower more enterprises to operate cybersecurity proficiently—turning it from a daunting challenge to an operational strength.

The Evolution of the Cybersecurity Market

As we’ve seen with Cisco’s recent purchase of Splunk, cybersecurity operations are being recognized by the market as imperative. Now, even the C-Level prioritizes cybersecurity as a critical business risk. From enterprises all the way to small businesses, all organizations are recognizing that cybersecurity cannot be ‘bought’ with a simple one-stop service. Instead, they have to navigate a sea of frequently ineffective solutions to find the right tools that cater to their particular needs. Secops is the only anchor that can bring stability amid the ever-changing cyber threats.

Lumu’s Differentiation

Lumu steps in here as the platform that can bridge the gap between siloed solutions and synchronized cybersecurity operations. We empower cybersecurity analysts, Secops, and IT team members by giving them:

  • Visibility across all the disparate segments and hybrid environments of their networks.
  • Integrations that automate real-time response to detected threats
  • AI capabilities that empower rather than distract
  • Contextual threat information that allows teams to quickly understand the strengths and weaknesses of the threats they face as well as their cybersecurity posture.

Lumu sets itself apart by offering a Free version, letting users immediately experience the value and ease of deployment we’re known for.

The Impact of this Series B Funding Round

This fresh capital will help us expand the reach of our cybersecurity operations platform, particularly in the United States. We also aim to further set ourselves apart in a cybersecurity landscape dominated by ineffective tools, offering resource-strapped security teams a lifeline.

In particular, we aim to invest in further development of AI as a feature that helps, rather than hinders Secops teams. AI in cybersecurity too often presents itself as a magic bullet that ultimately confuses and frustrates. We believe it can bridge the skills gap so sorely felt in cybersecurity and allow new entrants to quickly scale up their skills to approach expert level. 

Acknowledgments

I’d like to thank every member of the Lumu team—the Illuminators—for their unwavering commitment and spirit of innovation. Rest assured, many more ‘BOOM!’ moments are on the horizon. This funding round wouldn’t have been possible without Forgepoint’s leadership, alongside BIP Ventures, Exceptional Capital, and SIMMA Capital. For their continued support and guidance, special thanks go out to our existing investors the Opportunity Fund, Panoramic Ventures, KnowBe4 Ventures, Lane Bess, former Zscaler and Palo Alto Networks executive, and Tom Noonan, former CEO at Internet Security Systems.

The Next Chapter

The reason why Lumu was founded is more relevant than ever. When we started Lumu in 2019, we looked at the challenge of ever-increasing breaches and dwell times and resolved to make it easier to operate cybersecurity. Now, in 2023, we see cybercriminals developing new means of compromising networks and monetizing access. This Series B funding doesn’t just give us the fuel for our next phase; it amplifies our resolve to empower organizations to operate cybersecurity more efficiently and effectively. Our mission remains true. 

For anyone interested in experiencing the empowerment that comes with Continuous Compromise Assessment, I encourage you to open a Lumu Free account.

Recent Posts

  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are…

6 days ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes…

2 weeks ago
  • Trends

Automating Defense: The 2026 Battle Plan for Understaffed School IT

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is…

4 weeks ago
  • Trends

Redefining Proactive Security: Why Contact Is Not a Compromise

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly…

4 weeks ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global…

1 month ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics…

2 months ago