continuous compromise assessment

  • Trends

Redefining Proactive Security: Why Contact Is Not a Compromise

Reading Time: 5 minsContact is not compromise. True proactivity means prioritizing rapid response not blindly relying on prevention

4 weeks ago
  • Attacks

4 Ways Threat Actors Weaponize Domain Reputation to Bypass Your Defenses

Reading Time: 5 minsYour security stack is built on trusting domain reputation scores. But attackers now weaponize malicious domain detection…

4 months ago
  • Product

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 minsIntroducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate cybersecurity…

2 years ago
  • Technical

How Cybersecurity Analysts Can Do More With Less

Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.

3 years ago
  • Product

Lumu 2022 Product Recap

Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the…

3 years ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 minsLumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a swift…

3 years ago
  • Trends

Simple Truths for MSPs About Cybersecurity and Zero Trust

Reading Time: 3 minsDoctor Zero Trust, Chase Cunningham looks at the guiding lights that MSPs can use to navigate the…

3 years ago
  • Trends

Introducing Lumu’s New ROI Calculator

Reading Time: 2 minsThe Lumu ROI Calculator is a free tool that helps organizations get an idea of the time…

3 years ago
  • Product

Introducing Lumu’s New Incident View: Built to Empower the SOC

Reading Time: 4 minsThe new Lumu Incident View is a single screen that places at the cybersecurity operator’s fingertips the…

4 years ago
  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

Reading Time: 2 minsAnalyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’ biggest…

4 years ago
  • Trends

German Patiño: Taking Zero Trust to the Next Level

Reading Time: 2 minsGerman Patiño has spent over a decade helping companies implement cutting-edge cybersecurity, including ZT. Here’s why Lumu…

4 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

4 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

4 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

4 years ago
  • Product

Lumu Defender: Automating Threat Defense

Reading Time: 3 minsLumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an automated…

5 years ago