continuous compromise assessment

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 minsIntroducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate cybersecurity…

8 months ago
  • Technical

How Cybersecurity Analysts Can Do More With Less

Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.

2 years ago
  • Technical

Lumu 2022 Product Recap

Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the…

2 years ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 minsLumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a swift…

2 years ago
  • Trends

Simple Truths for MSPs About Cybersecurity and Zero Trust

Reading Time: 3 minsDoctor Zero Trust, Chase Cunningham looks at the guiding lights that MSPs can use to navigate the…

2 years ago
  • Trends

Introducing Lumu’s New ROI Calculator

Reading Time: 2 minsThe Lumu ROI Calculator is a free tool that helps organizations get an idea of the time…

2 years ago
  • Technical

Introducing Lumu’s New Incident View: Built to Empower the SOC

Reading Time: 4 minsThe new Lumu Incident View is a single screen that places at the cybersecurity operator’s fingertips the…

3 years ago
  • Culture

Why I Joined the Lumu Team

Reading Time: 2 minsDirector of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here's how the Lumu story—and our…

3 years ago
  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

Reading Time: 2 minsAnalyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’ biggest…

3 years ago
  • Trends

German Patiño: Taking Zero Trust to the Next Level

Reading Time: 2 minsGerman Patiño has spent over a decade helping companies implement cutting-edge cybersecurity, including ZT. Here’s why Lumu…

3 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

3 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

3 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

3 years ago
  • Culture

Why I’m Taking Off With Lumu

Reading Time: 2 minsLuis Quiñones has joined Lumu Technologies after more than a decade in various roles at Cisco North…

3 years ago
  • Technical

Lumu Defender: Automating Threat Defense

Reading Time: 3 minsLumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an automated…

3 years ago