Advisory Alert: PowerSchool Data Breach
Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?
Reading Time: 4 minsThe December 2024 breach of a student information software solution for K-12 educational institutions, PowerSchool, leaves us asking: what can we learn from it?
Reading Time: 5 minsFollowing the release of data from over 15,000 Fortinet devices, what can we do to protect against further compromise?
Reading Time: 4 minsDetecting and stopping attacks using anonymization techniques can give your team the upper hand against cyber criminals — but how do attackers use anonymization and how can we defend against it?
Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.
Get the latest cybersecurity articles and insights straight from the experts.
Reading Time: 7 minsForrester VP & Research Director Joseph Blankenship talked to us about the state of the cybersecurity industry. Read the highlights here.
Reading Time: 4 minsXDR is the latest acronym to be buzzing around the cybersecurity industry. But does it solve the problem of ever-increasing data breaches?
Reading Time: 6 minsIn a talk presented in conjunction with the SANS Institute, cybersecurity experts Evgeniy and Jorge discuss the constructive habits that can transform professional and personal lives.
Reading Time: 3 minsA White House ransomware open letter urges business leaders to act on cybercrime. Here are some immediate action items and key takeaways.
Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes ‘fighting cyber threats with actionable intelligence a work of IT art.’
Reading Time: 4 minsThe Colonial Pipeline cyberattack highlights the dangers of critical infrastructure ransomware attacks. Here are some takeaways for security operators at SMEs.
Reading Time: 7 minsZero Trust’s most recognizable voice speaks to us about its risks, adoption, and other ZT trends. Get more insights from “Dr. Zero Trust”.
Reading Time: 2 mins“The MITRE ATT&CK Matrix serves as the basis of a threat intelligence platform.” Get more insights from CISO Manuel Santander.
Reading Time: 7 minsLIfe@Lumu gives you an insight into what it’s like to be an Illuminator. After the success of the most recent Illumination Summit, we sat down with the team that made it happen.
Reading Time: 4 minsThe $40 million attack on the Broward County public school district is an example of how ransomware attacks are evolving. Here’s what you can do to protect your organization.
Reading Time: 2 minsLumu Academy offers free cybersecurity courses on Lumu products. Get Lumu certification through our self-paced virtual courses.
Reading Time: 2 minsLumu’s New Experience is a game-changer. ‘Incidents’ groups related contacts and improves reporting for reduced alert fatigue and much more.
Reading Time: 2 minsMaria Konnikova used decision-making strategies to become a poker champion. In this session, she shares the lessons poker holds for cybersecurity.
Reading Time: 2 minsLumu’s new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.
Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this concern with the automated ATT&CK Matrix.
© Lumu Technologies All rights reserved. | Legal information.