editor’s picks

  • Attacks

Check Point VPN Vulnerability Advisory

Reading Time: 2 minsThis VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access…

2 years ago
  • Attacks

ConnectWise ScreenConnect 23.9.8 Advisory Alert: Tool for Vulnerability Check

Reading Time: 2 minsEfficiently confirm and address ConnectWise ScreenConnect vulnerabilities with our guide and user-friendly tool.

2 years ago
  • Trends

The Struggle to Afford SOC Analyst Salaries

Reading Time: 3 minsExplore the challenges faced by a wide range of organizations in affording SOC analyst salaries amidst rising…

2 years ago
  • Trends

MSP Blog: Is Cybersecurity Disruption an Existential Threat?

Reading Time: 5 minsDive into the impact and future of MSP Cybersecurity Disruption. Is it a looming threat or a…

2 years ago
  • Trends

Everything You Need to Know About Cyber Insurance

Reading Time: 8 minsProtect your business from digital risks with cyber insurance, covering data breaches, cyberattacks, and recovery costs.

2 years ago
  • Product

The Evolution of Lumu for MSPs in 2023

Reading Time: 4 minsDiscover Lumu's 2023 MSP breakthroughs: Improved threat detection, incident management, and more.

2 years ago
  • Technical

Visibility and Context: Securing State and Local Environments Against Ransomware

Reading Time: 2 minsDr. Chase Cunningham discusses the critical need for state and local governments to secure against ransomware, ensuring…

2 years ago
  • Stories

Cybersecurity Trends 2024 and Beyond: Embracing Maturity in AI for Sustainable Security

Reading Time: 4 minsExploring 2024 Cybersecurity Trends: How mature AI and automation are key to developing sustainable and resilient security…

2 years ago
  • Technical

Cisco IOS XE Web UI Vulnerability: Critical Advisory & Immediate Mitigation Steps

Reading Time: 3 minsAlert: Severe Cisco IOS XE Web UI vulnerability risks full system control. Immediate action needed for users…

2 years ago
  • Technical

Online Learning vs Transfer Learning for Cybersecurity: Unpacking Lumu’s Use of AI

Reading Time: 5 minsExplore Online vs Transfer Learning in Cybersecurity: Unpacking Lumu's adaptive AI use for proactive threat defense and…

2 years ago
  • Trends

Leveraging Collective Defense and AI for Better Cybersecurity

Reading Time: 5 minsCollective Defense already plays a key role in shoring up the cyberdefenses of key industries. Alongside AI,…

3 years ago
  • Trends

Lumu Hits Bullseye in GigaOm Radar for Network Detection and Response

Reading Time: 4 minsThe GigaOm Radar Report for Network Detection and Response (NDR) has just been released and we are…

3 years ago
  • Trends

How Lumu Enables Threat Hunting

Reading Time: 4 minsThreat hunting in cybersecurity can be a challenging practice. Learn how Lumu helps you build your way…

3 years ago
  • Trends

There Is No Zero Trust Without Visibility

Reading Time: 3 mins‘Dr. Zero Trust' Chase Cunningham looks at Zero Trust, network visibility’s importance, and the Forrester Wave™: Network…

3 years ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

3 years ago