Search Blog

PowerSchool Data Breach
Blog

Advisory Alert: PowerSchool Data Breach

Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?

EDITOR'S PICKS

Detecting Cyberattacks Hidden via Anonymization

Reading Time: 4 minsDetecting and stopping attacks using anonymization techniques can give your team the upper hand against cyber criminals — but how do attackers use anonymization and how can we defend against it?

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Lumu's Year in Review 2021: taking a look at Lumu's accomplishments in 2021
Trends

Lumu’s Year in Review 2021

Reading Time: 2 minsIn 2021 Lumu grew from strength to strength—in every metric. Here’s our Year in Review with all the unmissable highlights from the year of experience-based growth.

The Log4j vulnerability (also known as CVE-2021-44228) affects 1000's of software applications.
Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000’s of software applications. Here are some quick facts and how Lumu helps.

6 cybersecurity myths
Trends

Cybersecurity Myths: 6 Common Errors

Reading Time: 2 minsSmall businesses are realizing that cybersecurity is an increasingly important business risk. Here are a few commonly believed cybersecurity myths that need to be cleared up.

Culture

Why I’m Taking Off With Lumu

Reading Time: 2 minsLuis Quiñones has joined Lumu Technologies after more than a decade in various roles at Cisco North America. Here’s why he’s on board with us.

Elias Stucky interview on small and medium sized businesses SMB cybersecurity challenges
Interviews

In the Spotlight: SMB Cybersecurity Challenges

Reading Time: 5 minsAs Director of Engineering and Security at Upward Technologies, Elias Stucky works to solve small and medium-sized businesses’ technology problems. We spoke to him about some common SMB cybersecurity challenges.

Is Your SIEM a Bad Habit?
Technical

Is Your SIEM a Bad Habit?

Reading Time: 4 minsVeteran Cybersecurity Operator at Lumu Andrés Argüelles looks at using Lumu with your SIEM to get the most out of both platforms.

Lumu Defender
Technical

Lumu Defender: Automating Threat Defense

Reading Time: 3 minsLumu Defender lets you feed Lumu’s confirmed compromise instances into your existing cybersecurity stack for an automated response to cyber threats.

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.