continuous compromise assessment

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate…

2 weeks ago
  • Technical

How Cybersecurity Analysts Can Do More With Less

Reading Time: 5 mins Cybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more…

1 year ago
  • Technical

Lumu 2022 Product Recap

Reading Time: 3 mins The 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over…

1 year ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 mins Lumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a…

2 years ago
  • Trends

Simple Truths for MSPs About Cybersecurity and Zero Trust

Reading Time: 3 mins Doctor Zero Trust, Chase Cunningham looks at the guiding lights that MSPs can use to navigate…

2 years ago
  • Trends

Introducing Lumu’s New ROI Calculator

Reading Time: 2 mins The Lumu ROI Calculator is a free tool that helps organizations get an idea of the…

2 years ago
  • Technical

Introducing Lumu’s New Incident View: Built to Empower the SOC

Reading Time: 4 mins The new Lumu Incident View is a single screen that places at the cybersecurity operator’s fingertips…

2 years ago
  • Culture

Why I Joined the Lumu Team

Reading Time: 2 mins Director of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here's how the Lumu story—and…

2 years ago
  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

Reading Time: 2 mins Analyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’…

2 years ago
  • Trends

German Patiño: Taking Zero Trust to the Next Level

Reading Time: 2 mins German Patiño has spent over a decade helping companies implement cutting-edge cybersecurity, including ZT. Here’s why…

2 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 mins Ransomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains…

2 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 mins MSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

3 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 mins The monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's…

3 years ago
  • Culture

Why I’m Taking Off With Lumu

Reading Time: 2 mins Luis Quiñones has joined Lumu Technologies after more than a decade in various roles at Cisco…

3 years ago
  • Technical

Lumu Defender: Automating Threat Defense

Reading Time: 3 mins Lumu Defender lets you feed Lumu's confirmed compromise instances into your existing cybersecurity stack for an…

3 years ago