Events

Lumu’s RSA Conference 2020 Recap

So, we went to RSA Conference 2020 as we are sure most of our readers probably did. The unexpectedly sunny and warm streets of San Francisco were crowded by a passionate group, collectively trying to address what is deemed as one of the most challenging issues of modern history: the fight against cybercriminals.  

The last two weeks were a whirlwind, which started with Lumu’s inclusion in CSO’s 12 Hottest Cybersecurity Startups of RSAC. Also, we showed up on Dark Reading which covered our global launch announcement; we were included in CSO.com’s Hottest New Cybersecurity Products of RSA Conference 2020; and in CRN’s 13 Hot Endpoint and Network Security Tools at RSAC 2020.  Through all of this, we launched a new web experience, because, why not? Take a look: www.lumu.io.

On Monday February 24, our leadership team attended AGC’s Growth Conference where we showcased Lumu’s positioning, market traction and technology. DataBreachToday’s Tom Field  hosted Lumu for a video interview, in which we discussed industry challenges on detecting compromise and where we stand in addressing them. The full interview can be found here: The question every business leader asks – Are we compromised?

We spoke with over 500 RSAC attendees and delivered more than 150 product demos in only 23 hours of booth time.

Our team was thrilled to showcase Lumu to RSA Conference 2020. Our company’s culture came true before and during the conference, which was amazing. We left S.F. tired but fired up about the product and company we are building — knowing. This is only the beginning.  

If you missed the chance to see/visit Lumu at RSAC, here is a quick video recap. Enjoy.

Recent Posts

  • Trends

Why EDR Evasion is the New Threat Standard

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are…

6 days ago
  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes…

2 weeks ago
  • Trends

Automating Defense: The 2026 Battle Plan for Understaffed School IT

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is…

4 weeks ago
  • Trends

Redefining Proactive Security: Why Contact Is Not a Compromise

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly…

4 weeks ago
  • Attacks

Advisory Alert: AsyncRAT – Analysis, Evolution, and Defense Strategies

Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global…

1 month ago
  • Technical

Deconstructing a Multi-Stage Living-off-the-Land Attack

Reading Time: 10 minsThis technical deep-dive analyzes a sophisticated Amadey Stealer campaign leveraging Living-off-the-Land tactics…

2 months ago