
Is Your Supply Chain Exposing Your Organization? 4 Security Case Studies
Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third parties, whose credential leaks are now your biggest supply chain vulnerability
Already have an account? Sign in
Sign in
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third parties, whose credential leaks are now your biggest supply chain vulnerability

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the industry’s shift toward the Agentic Revolution and the move from chatbot interactions to autonomous security that operates at machine speed.

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in managed security. We look at how to regain the upper hand.

Reading Time: 4 minsThe Education sector is the number one global cyber target. It is clearer than ever that manual defense is failing. We look at how to automate detection and response and win the battle.

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention

Reading Time: 6 minsWe have entered a new ‘Age of Adaptation’. The enemy is becoming more difficult to stop at the gate. We need to shift from reliance on perimeter defenses to continuous, real-time assessment.

Reading Time: 4 mins For cybersecurity operators, Large Language Models (LLMs) provide many potential uses. To help you maximize their value, here are 10 suggested cybersecurity prompts for anyone in the space to pose to their favorite AI chatbot.

Reading Time: 4 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security obsolete, requiring the establishment of a new viable “truth layer” capable of inferring intent in an environment.

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen national cybersecurity. Why is network visibility important for your organization?

Reading Time: 6 minsSummer break is a high-risk period in cybersecurity for schools. Discover practical cybersecurity solutions for how to secure school networks over the summer.

Reading Time: 4 minsLumu has worked hand-in-hand with MSPs throughout a year that consolidated the need for cybersecurity in the role of MSPs.

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the stage for a more proactive cybersecurity approach.

Reading Time: 7 minsEndpoint Detection and Response (EDR) has a critical role in most companies’ security setup, but cybercriminals are mastering EDR bypass tactics. How can we defend against them?

Reading Time: 5 minsLumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations, local government, and education establishments.