Search Blog

EDITOR'S PICKS

Check Point VPN Vulnerability Advisory

Reading Time: 2 mins This VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access networks. Stay informed and secure your network promptly.

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Security operator using the Lumu Portal Remotely
Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 mins Security operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your SOC more efficient in 3 easy steps.

Trends

From Zero Trust to Zero Compromises

Reading Time: 3 mins The concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.

Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 mins Ransomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE, and how Lumu detects them.

Trends

2020 Compromise Flashcard

Reading Time: 3 mins We’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.

Events

Illumination Summit Recap

Reading Time: 4 mins Lumu’s Illumination Summit has come and gone, but you can still relive every talk and discussion in our highlight video or blog.

Attacks

Malware Delivery as a Service

Reading Time: 4 mins Malware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.