Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…
Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…
Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…
Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE,…
Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…
Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…
Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network…
Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.