Introducing Lumu Autopilot: Autonomous Cybersecurity Operations
Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate cybersecurity proficiently.
Already have an account? Sign in
Sign in
Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate cybersecurity proficiently.
Reading Time: 2 mins Efficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.
Reading Time: 3 mins Explore the challenges faced by a wide range of organizations in affording SOC analyst salaries amidst rising cybersecurity demands and limited budgets
Reading Time: 5 mins Dive into the impact and future of MSP Cybersecurity Disruption. Is it a looming threat or a hidden opportunity?
Get the latest cybersecurity articles and insights straight from the experts.
Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from home due to the global pandemic situation.
Reading Time: 3 mins The concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.
Reading Time: 4 mins Over 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes leading to ransomware regret. Do you recognize any?
Reading Time: 5 mins Ransomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE, and how Lumu detects them.
Reading Time: 3 mins We’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.
Reading Time: 2 mins The Lumu Portal always manages to delight our customers. We looked at some of the most pleasantly surprising factors.
Reading Time: 3 mins Analyzing spam metadata lets Lumu’s portal present insights on which users are being targeted and how your company is being compromised.
Reading Time: 4 mins Lumu’s Illumination Summit has come and gone, but you can still relive every talk and discussion in our highlight video or blog.
Reading Time: 4 mins Malware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.
Reading Time: 3 mins Lumu’s Illumination Summit is a unique experience for cybersecurity professionals. Here’s how it came about.
Reading Time: 4 mins Artificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is how you use them.
Reading Time: 2 mins Cybersecurity Strategy needs to be more adaptable and resilient following the revelations brought about by the Covid-19 pandemic
Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks and improving incident response
Reading Time: 2 mins Network metadata has the power to efficiently answer the most important question in cybersecurity: Is my network compromised?
Reading Time: < 1 min We are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power of Continuous Compromise Assessment™.
© Lumu Technologies All rights reserved. | Legal information.