
How to Turn MISP from a Compliance Burden into Active Defense
Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Already have an account? Sign in
Sign in

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.
Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention
Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how it works and the best way to defend against it.
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE, and how Lumu detects them.

Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.

Reading Time: 2 minsThe Lumu Portal always manages to delight our customers. We looked at some of the most pleasantly surprising factors.

Reading Time: 3 minsAnalyzing spam metadata lets Lumu’s portal present insights on which users are being targeted and how your company is being compromised.

Reading Time: 4 minsLumu’s Illumination Summit has come and gone, but you can still relive every talk and discussion in our highlight video or blog.

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.

Reading Time: 3 minsLumu’s Illumination Summit is a unique experience for cybersecurity professionals. Here’s how it came about.

Reading Time: 4 minsArtificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is how you use them.

Reading Time: 2 minsCybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19 pandemic

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and improving incident response

Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network compromised?

Reading Time: < 1 minWe are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power of Continuous Compromise Assessment™.

Reading Time: 2 minsThe economic downturn caused by the coronavirus will place financial pressure on cybersecurity budgets, forcing more intelligent spending.

Reading Time: 2 minsThe coronavirus pandemic has forced enterprises into a rushed transition to working remotely that exposes them to security breaches.

Reading Time: 2 minsThe coronavirus is an unprecedented challenge, but cybercriminals won’t lose focus. Neither should security practitioners.