Category: Technical

Subscribe to Our Blog

Get the latest cybersecurity articles and insights straight from the experts.

Lumu Datasheet

Cybersecurity is meant to do one thing: prevent compromise. Yet despite billions of dollars invested in cybersecurity, companies continue to be compromised. Current practices focus

Enlightenment Brief: Lumu and IDPS

Get to know what defines Intrusion Detection and Prevention Systems, how Lumu compares and contrasts with IDPS, and why Lumu can ultimately replace this legacy

Mining Incident Response Playbook

The Lumu Mining Incident Response Playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). This

Spam Incident Response Playbook

The Lumu Spam Incident Response Playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). This

Malware Incident Response Playbook

The Lumu Malware Incident Response Playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). This

Phishing Incident Response Playbook

The Lumu Phishing Incident Response Playbook is based on the  Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). This

General Incident Response Playbook

The Lumu General Incident Response Playbook is based on the Computer Security Incident Handling Guide by the National Institute of Standards and Technology (NIST). This

Enlightenment Brief: Lumu & SIEMs

Our enlightenment briefs aim to help you better understand where Lumu fits in the crowded cybersecurity market, all in one page. This Enlightenment brief covers

Lumu Quick Start Guide

Start measuring your compromise level in three simple steps. Step 1 Create your Lumu Free account & log-in Log-in Step 2 Deploy and set up

Frequently Asked Questions

We have collected the most common questions from our +2300 customers. If you don’t find what you are looking for, feel free to contact us

Lumu OnDemand Datasheets

Using existing network data sources, Lumu OnDemand assesses the entire enterprise to determine the level of compromise. Findings empower IT and security teams to illuminate