Search Blog

EDITOR'S PICKS

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Security operator using the Lumu Portal Remotely
Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your SOC more efficient in 3 easy steps.

Trends

From Zero Trust to Zero Compromises

Reading Time: 3 minsThe concept of Zero Trust has gradually evolved in cybersecurity. NIST’s SP 800-207 legitimizes Zero Trust Architecture (ZTA) and provides roadmaps for its deployment.

Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE, and how Lumu detects them.

Trends

2020 Compromise Flashcard

Reading Time: 3 minsWe’ve pored through the most recent data breach reports to paint a clear picture of how cyber attacks are affecting enterprises right now.

Events

Illumination Summit Recap

Reading Time: 4 minsLumu’s Illumination Summit has come and gone, but you can still relive every talk and discussion in our highlight video or blog.

Attacks

Malware Delivery as a Service

Reading Time: 4 minsMalware Delivery as a Service is a specialized service designed to meet ransomware’s demand for access to compromised networks.

Join our pre-day 
workshop waitlist

  • By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.