
How to Turn MISP from a Compliance Burden into Active Defense
Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Already have an account? Sign in
Sign in

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.
Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.
Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention
Reading Time: 6 minsAsyncRAT is an adaptable open-source Trojan that has evolved into a global threat. We look at how it works and the best way to defend against it.
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.

Reading Time: 2 minsLumu attended RSA Conference 2020, featuring on cybersecurity news sites including Dark Reading, CSO.com, and CRN.

Reading Time: < 1 minLeading analyst firm 451 Research’s Business Impact Brief discusses how organizations lack the ability to detect compromises.

Reading Time: 2 minsLumu hosts its first-ever Kickoff to discuss Continuous Compromise Assessment moving light speed ahead into 2020.

Reading Time: 3 mins2019 showed that no business is immune to security breaches. Turn your attention to these 8 key areas in 2020.

Reading Time: 2 minsSecurity testing can learn from the aviation industry model. Data breaches have grown rapidly and testing procedures have stagnated.

Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

Reading Time: 3 minsIn one of the largest data breaches ever, Capital One admitted recently that more than 100 million customer records were compromised.

Reading Time: 3 minsThis is only the beginning. Today, I am introducing you to Lumu Technologies, which brings a radical shift in the approach to cybersecurity.

Reading Time: 3 minsA recent report from NUIX stated that an attacker only needs 15 hours on average to breach a system and identify critical data.

Reading Time: 3 minsPentesting started as a concept in 1960 as early computer industry pioneers knew there would be inherent risks to controlling access.