Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Search Blog

AI-powered threats in 2026
Trends

What You Must Know about AI-Powered Threats in 2026

Reading Time: 5 minsCybercriminals are using AI today to accelerate attacks through deepfakes, smishing, exploit generation, and autonomous breach activity. This blog explores how AI is reshaping offensive cyber operations and what defenders must prioritize.

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

6 cybersecurity myths
Trends

Cybersecurity Myths: 6 Common Errors

Reading Time: 2 minsSmall businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly believed cybersecurity myths that need to be cleared up.

Elias Stucky interview on small and medium sized businesses SMB cybersecurity challenges
Trends

In the Spotlight: SMB Cybersecurity Challenges

Reading Time: 5 minsAs Director of Engineering and Security at Upward Technologies, Elias Stucky works to solve small and medium-sized businesses’ technology problems. We spoke to him about some common SMB cybersecurity challenges.

Is Your SIEM a Bad Habit?
Technical

Is Your SIEM a Bad Habit?

Reading Time: 4 minsVeteran Cybersecurity Operator at Lumu Andrés Argüelles looks at using Lumu with your SIEM to get the most out of both platforms.

Lumu Defender
Product

Lumu Defender: Automating Threat Defense

Reading Time: 3 minsLumu Defender lets you feed Lumu’s confirmed compromise instances into your existing cybersecurity stack for an automated response to cyber threats.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.