editor’s picks

  • Trends

Everything You Need to Know About Cyber Insurance

Reading Time: 8 minsProtect your business from digital risks with cyber insurance, covering data breaches, cyberattacks, and recovery costs.

1 year ago
  • Technical

The Evolution of Lumu for MSPs in 2023

Reading Time: 4 minsDiscover Lumu's 2023 MSP breakthroughs: Improved threat detection, incident management, and more.

1 year ago
  • Technical

Visibility and Context: Securing State and Local Environments Against Ransomware

Reading Time: 2 minsDr. Chase Cunningham discusses the critical need for state and local governments to secure against ransomware, ensuring…

1 year ago
  • Stories

Cybersecurity Trends 2024 and Beyond: Embracing Maturity in AI for Sustainable Security

Reading Time: 4 minsExploring 2024 Cybersecurity Trends: How mature AI and automation are key to developing sustainable and resilient security…

1 year ago
  • Technical

Cisco IOS XE Web UI Vulnerability: Critical Advisory & Immediate Mitigation Steps

Reading Time: 3 minsAlert: Severe Cisco IOS XE Web UI vulnerability risks full system control. Immediate action needed for users…

1 year ago
  • Technical

Online Learning vs Transfer Learning for Cybersecurity: Unpacking Lumu’s Use of AI

Reading Time: 5 minsExplore Online vs Transfer Learning in Cybersecurity: Unpacking Lumu's adaptive AI use for proactive threat defense and…

1 year ago
  • Trends

Leveraging Collective Defense and AI for Better Cybersecurity

Reading Time: 5 minsCollective Defense already plays a key role in shoring up the cyberdefenses of key industries. Alongside AI,…

1 year ago
  • Trends

Lumu Hits Bullseye in GigaOm Radar for Network Detection and Response

Reading Time: 4 minsThe GigaOm Radar Report for Network Detection and Response (NDR) has just been released and we are…

1 year ago
  • Trends

How Lumu Enables Threat Hunting

Reading Time: 4 minsThreat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way…

1 year ago
  • Trends

There Is No Zero Trust Without Visibility

Reading Time: 3 mins‘Dr. Zero Trust' Chase Cunningham looks at Zero Trust, network visibility’s importance, and the Forrester Wave™: Network…

1 year ago
  • Trends

Key Insights From The Forrester Wave™: Network Analysis and Visibility Q2 2023

Reading Time: 3 minsLumu has been named a leader in Forrester Research’s latest report, The Forrester Wave™: Network Analysis and…

2 years ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

2 years ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

2 years ago
  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

2 years ago
  • Attacks

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

2 years ago