Search Blog

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Conti ransomware group alliances
Attacks

Conti Ransomware Group: the Alliances Behind the Chaos

Reading Time: 4 minsThe Conti Ransomware Group has recently unleashed a series of attacks on nations including Costa Rica, resulting in the declaration of a state of emergency. The key to their success is the network of alliances that they have built with precursor malware operators.

Chris Steffen on cybersecurity operations MSP
Interviews

The Need for Cybersecurity Operations

Reading Time: 3 minsCybersecurity operations can be hard but are needed in all businesses. EMA Research Director Chris Steffen shares how MSPs and MSSPs can help small and medium-sized businesses operate cybersecurity proficiently.

soc of the future jeffrey wheat
Trends

The SOC of the Future

Reading Time: 4 minsLumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental improvement leads to proficient operations. Beginning his cybersecurity career at the department of defense, Jeffrey Wheat is a proven leader and CISSP with 30 years of experience spanning SOC management at international firms as well as cybersecurity architecture design and implementation.

Top quesitons Lumu's customers are asking now
Trends

Top Questions Lumu’s Customers Are Asking Now

Reading Time: 4 minsIn April of 2022, it seems that cybersecurity is more unsettled than ever. Here are the top questions we’ve been receiving about cybersecurity and emerging cyber threats

ransomware flashcard 2022
Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 minsTrends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level. Here are some insights and background information to accompany the facts and figures provided by our Ransomware Flashcard 2022.

New Lumu Free Training Register.
Technical

The New and Improved Lumu Free

Reading Time: 3 minsLumu Free just got a major upgrade. We’ve included more metadata collectors, giving you greater network visibility and more closely reflecting our vision of how cybersecurity needs to be operated.

Director of Product Marketing Nicole Ibarra on why she joined the Lumu Team
Culture

Why I Joined the Lumu Team

Reading Time: 2 minsDirector of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here’s how the Lumu story—and our tech— convinced her to sign up.

Lumu's Year in Review 2021: taking a look at Lumu's accomplishments in 2021
Trends

Lumu’s Year in Review 2021

Reading Time: 2 minsIn 2021 Lumu grew from strength to strength—in every metric. Here’s our Year in Review with all the unmissable highlights from the year of experience-based growth.

The Log4j vulnerability (also known as CVE-2021-44228) affects 1000's of software applications.
Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.

6 cybersecurity myths
Trends

Cybersecurity Myths: 6 Common Errors

Reading Time: 2 minsSmall businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly believed cybersecurity myths that need to be cleared up.

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.