Reading Time: 4 minsOver 90% of ransomware attacks are preventable. We have compiled a list of the most common mistakes…
Reading Time: 5 minsRansomware attacks have been increasing in frequency; we look at some examples like Sodinokibi, WannaCry, and MAZE,…
Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…
Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network…
Reading Time: < 1 minWe are thrilled to announce a new illumination milestone: 500 enterprises have embraced the power of…
Reading Time: 2 minsThe coronavirus pandemic has forced enterprises into a rushed transition to working remotely that exposes them to…
Reading Time: 2 minsThe coronavirus is an unprecedented challenge, but cybercriminals won't lose focus. Neither should security practitioners.
Reading Time: 2 minsContinuous Compromise Assessment identifies cybercriminals in real time by using several cutting-edge technologies.
Reading Time: 2 minsLumu attended RSA Conference 2020, featuring on cybersecurity news sites including Dark Reading, CSO.com, and CRN.
Reading Time: < 1 minLeading analyst firm 451 Research's Business Impact Brief discusses how organizations lack the ability to detect…
Reading Time: 2 minsLumu hosts its first-ever Kickoff to discuss Continuous Compromise Assessment moving light speed ahead into 2020.
Reading Time: 2 minsSecurity testing can learn from the aviation industry model. Data breaches have grown rapidly and testing procedures…
Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.