Search Blog

RSA Conference 2023 Recap
Technical

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 mins RSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that a paradigm shift is needed in cybersecurity, it is clear that we would be stronger still if there were consensus around what that paradigm shift needs to look like.

EDITOR'S PICKS

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 mins RSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that a paradigm shift is needed in cybersecurity, it is clear that we would be stronger still if there were consensus around what that paradigm shift needs to look like.

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 mins EDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers evade Endpoint Detection and Response (EDR) systems using various techniques. Learn about the common tactics used by cyber attackers to bypass endpoint defenses and how to better protect against these stealthy attacks.

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Chris Steffen on cybersecurity operations MSP
Interviews

The Need for Cybersecurity Operations

Reading Time: 3 mins Cybersecurity operations can be hard but are needed in all businesses. EMA Research Director Chris Steffen shares how MSPs and MSSPs can help small and medium-sized businesses operate cybersecurity proficiently.

soc of the future jeffrey wheat
Trends

The SOC of the Future

Reading Time: 4 mins Lumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental improvement leads to proficient operations. Beginning his cybersecurity career at the department of defense, Jeffrey Wheat is a proven leader and CISSP with 30 years of experience spanning SOC management at international firms as well as cybersecurity architecture design and implementation.

Top quesitons Lumu's customers are asking now
Trends

Top Questions Lumu’s Customers Are Asking Now

Reading Time: 4 mins In April of 2022, it seems that cybersecurity is more unsettled than ever. Here are the top questions we’ve been receiving about cybersecurity and emerging cyber threats

ransomware flashcard 2022
Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 mins Trends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level. Here are some insights and background information to accompany the facts and figures provided by our Ransomware Flashcard 2022.

New Lumu Free Training Register.
Technical

The New and Improved Lumu Free

Reading Time: 3 mins Lumu Free just got a major upgrade. We’ve included more metadata collectors, giving you greater network visibility and more closely reflecting our vision of how cybersecurity needs to be operated.

Director of Product Marketing Nicole Ibarra on why she joined the Lumu Team
Culture

Why I Joined the Lumu Team

Reading Time: 2 mins Director of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here’s how the Lumu story—and our tech— convinced her to sign up.

Lumu's Year in Review 2021: taking a look at Lumu's accomplishments in 2021
Trends

Lumu’s Year in Review 2021

Reading Time: 2 mins In 2021 Lumu grew from strength to strength—in every metric. Here’s our Year in Review with all the unmissable highlights from the year of experience-based growth.

The Log4j vulnerability (also known as CVE-2021-44228) affects 1000's of software applications.
Attacks

Log4j: What You Need to Know

Reading Time: 2 mins The Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.

6 cybersecurity myths
Trends

Cybersecurity Myths: 6 Common Errors

Reading Time: 2 mins Small businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly believed cybersecurity myths that need to be cleared up.