Technical

  • Technical

Lumu and Fortinet Simplify Incident Response Automation

Reading Time: 2 minsAs a partner in Fortinet’s Fabric-Ready Partner Program, Lumu delivers automated attack detection and response across the…

3 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

4 years ago
  • Technical

Is Your SIEM a Bad Habit?

Reading Time: 4 minsVeteran Cybersecurity Operator at Lumu Andrés Argüelles looks at using Lumu with your SIEM to get the…

5 years ago
  • Technical

eWeek Review: Lumu Illuminates the Current Threat Landscape

Reading Time: 2 minsIn this Lumu Insights review, eWeek declares that Lumu makes 'fighting cyber threats with actionable intelligence a…

5 years ago
  • Technical

The Custom Collector API: Seamless Metadata Collection

Reading Time: 2 minsLumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise assessment.

5 years ago
  • Technical

Why Optimizing Security Operations is Needed (and Possible)

Reading Time: 4 minsAre security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing this…

5 years ago
  • Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…

5 years ago
  • Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE,…

6 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…

6 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…

6 years ago