AI

  • Attacks

Why AI Malware Demands Machine-Speed Defense

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to…

2 weeks ago
  • Trends

10 Cybersecurity Prompts to Ask Your Favorite LLM

Reading Time: 4 mins For cybersecurity operators, Large Language Models (LLMs) provide many potential uses. To help you maximize their…

2 months ago
  • Technical

3 Ways Generative AI Can Improve Your Cybersecurity Workflow

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual…

5 months ago
  • Events

3 Game-Changing Cybersecurity Trends From DEFCON 33

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing…

7 months ago
  • Trends

New Executive Order Demands Network Visibility

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen…

9 months ago
  • Technical

Defense Against Zero Day Attacks With Lumu

Reading Time: 7 minsDefense against zero day attacks requires constant vigilance and meticulous preparation, and Lumu should be an essential…

10 months ago
  • Trends

Reflecting on 2024: Lumu’s Innovations in SecOps

Reading Time: 5 minsLumu’s 2024 SecOps advancements focus on automation and smarter threat detection, with new features that set the…

1 year ago
  • Events

Our 3 Biggest Takeaways From DEFCON 32

Reading Time: 7 minsMario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in…

2 years ago
  • Attacks

Local Government and Education Cybersecurity Advisory

Reading Time: 6 minsLocal Government and Education Institutions are under increasing threat from cyber criminals. Explore how these critical sectors…

2 years ago
  • Events

Reflections from RSAC 2024

Reading Time: 4 minsMissed RSA Conference 2024? Explore Lumu CEO and RSAC veteran Ricardo Villadiego’s perspective on the key takeaways…

2 years ago
  • Technical

Online Learning vs Transfer Learning for Cybersecurity: Unpacking Lumu’s Use of AI

Reading Time: 5 minsExplore Online vs Transfer Learning in Cybersecurity: Unpacking Lumu's adaptive AI use for proactive threat defense and…

2 years ago
  • Trends

Leveraging Collective Defense and AI for Better Cybersecurity

Reading Time: 5 minsCollective Defense already plays a key role in shoring up the cyberdefenses of key industries. Alongside AI,…

3 years ago
  • Events

RSA Conference 2023 Observations: Embracing the Paradigm Shift

Reading Time: 4 minsRSAC 2023 brought the cybersecurity world together in San Francisco. While there is a general consensus that…

3 years ago
  • Trends

Artificial Intelligence Is Not an End in Itself

Reading Time: 4 minsArtificial intelligence and Machine Learning are increasingly popular in cybersecurity, but like all tools, the key is…

6 years ago
  • Technical

Continuous Compromise Assessment – Why Now

Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.

6 years ago