Reading Time: 7 mins LockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.
Already have an account? Sign in
Reading Time: 3 mins Explore the challenges faced by a wide range of organizations in affording SOC analyst salaries amidst rising cybersecurity demands and limited budgets
Reading Time: 5 mins Dive into the impact and future of MSP Cybersecurity Disruption. Is it a looming threat or a hidden opportunity?
Reading Time: 8 mins Protect your business from digital risks with cyber insurance, covering data breaches, cyberattacks, and recovery costs.
Get the latest cybersecurity articles and insights straight from the experts.
Reading Time: 2 mins Continuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.
Reading Time: 2 mins Lumu attended RSA Conference 2020, featuring on cybersecurity news sites including Dark Reading, CSO.com, and CRN.
Reading Time: < 1 min Leading analyst firm 451 Research’s Business Impact Brief discusses how organizations lack the ability to detect compromises.
Reading Time: 2 mins Lumu hosts its first-ever Kickoff to discuss Continuous Compromise Assessment moving light speed ahead into 2020.
Reading Time: 3 mins 2019 showed that no business is immune to security breaches. Turn your attention to these 8 key areas in 2020.
Reading Time: 2 mins Security testing can learn from the aviation industry model. Data breaches have grown rapidly and testing procedures have stagnated.
Reading Time: 5 mins Financial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.
Reading Time: 3 mins In one of the largest data breaches ever, Capital One admitted recently that more than 100 million customer records were compromised.
Reading Time: 3 mins This is only the beginning. Today, I am introducing you to Lumu Technologies, which brings a radical shift in the approach to cybersecurity.
Reading Time: 3 mins A recent report from NUIX stated that an attacker only needs 15 hours on average to breach a system and identify critical data.
Reading Time: 3 mins Pentesting started as a concept in 1960 as early computer industry pioneers knew there would be inherent risks to controlling access.