
How to Turn MISP from a Compliance Burden into Active Defense
Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Already have an account? Sign in
Sign in

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.
Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention
Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how it works and the best way to defend against it.
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons poker holds for cybersecurity.

Reading Time: 2 minsLumu’s new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this concern with the automated ATT&CK Matrix.

Reading Time: 3 minsSupply chain risk in cybersecurity keeps increasing with threat actors exploiting third-party vulnerabilities. Here’s how you can stop them.

Reading Time: 2 minsA CISO’s list of responsibilities never gets any shorter, so we asked them about their most urgent projects. Here are their 2021 cybersecurity priorities.

Reading Time: 3 minsThe powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to see relevant TTPs for all detected compromises.

Reading Time: 3 minsThese holiday cybersecurity reads are sure to captivate and educate as we head into another eventful year for cybersecurity.

Reading Time: 4 minsOn average, a CISO’s tenure is only 26 months. Fabian Zambrano, Director of Cybersecurity at Davivienda, lays out any new CISO’s priorities.

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious breaches in recent U.S. history.

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your SOC more efficient in 3 easy steps.

Reading Time: 3 minsAfter a tumultuous 2020, what will the future hold for cybersecurity in 2021? We’ve put together the 10 trends that will define the new year.

Reading Time: 3 minsFrom securing a sudden remote workforce to the rise of ransomware, CISOs have had an especially interesting year.

Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from home due to the global pandemic situation.

Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.

Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes leading to ransomware regret. Do you recognize any?