Technical

  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…

4 years ago
  • Technical

Optimize Security Operations in 3 Steps

Reading Time: 4 minsSecurity operations teams are increasingly inundated with alerts. Take a look at how Lumu can make your…

4 years ago
  • Technical

Lumu Agent: Compromise Visibility Built for Remote Workers

Reading Time: 2 minsAccording to Gartner, 88% of organizations worldwide made it mandatory or encouraged their employees to work from…

4 years ago
  • Technical

Ransomware Attacks and How Lumu Helps

Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE,…

4 years ago
  • Technical

Blocking Spam Is Good, Analyzing Spam Is Better

Reading Time: 3 minsAnalyzing spam metadata lets Lumu's portal present insights on which users are being targeted and how your…

4 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…

5 years ago
  • Technical

Revealing the Magic Behind Your Metadata

Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network…

5 years ago
  • Technical

Continuous Compromise Assessment – Why Only Now

Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.

5 years ago