Technical

  • Technical

Introducing Lumu Academy

Reading Time: 2 mins Lumu Academy offers free cybersecurity courses on Lumu products. Get Lumu certification through our self-paced virtual…

3 years ago
  • Technical

A New Experience to Help You Operate Cybersecurity Proficiently

Reading Time: 2 mins Lumu's New Experience is a game-changer. 'Incidents' groups related contacts and improves reporting for reduced alert…

3 years ago
  • Technical

The Custom Collector API: Seamless Metadata Collection

Reading Time: 2 mins Lumu's new custom collector allows seamless network metadata collection from third-party tools for better, faster compromise…

3 years ago
  • Technical

Why Optimizing Security Operations is Needed (and Possible)

Reading Time: 4 mins Are security budgets spent on solutions that actually matter? Guest blogger Chris Steffen looks at addressing…

3 years ago
  • Technical

MITRE ATT&CK® Matrix is Now Included in Lumu

Reading Time: 3 mins The powerful MITRE ATT&CK Matrix is now integrated into the Lumu Portal, making it possible to…

3 years ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 mins As security professionals, we hear about mitigation and remediation on a daily basis. However, these are…

3 years ago
  • Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 mins Security operations teams are increasingly inundated with alerts. Take a look at how Lumu can make…

3 years ago
  • Technical

Lumu Agent: Compromise Visibility Built for Remote Workers

Reading Time: 2 mins According to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work…

4 years ago
  • Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 mins Ransomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and…

4 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 mins Analyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how…

4 years ago