editor’s picks

  • Interviews

What I’ve Learned from My Conversations With Customers

Reading Time: 4 minsAfter numerous conversations with customers Nicole Ibarra, Lumu's Director of Product Marketing, reports back on her findings.

3 years ago
  • Interviews

The Need for Cybersecurity Operations

Reading Time: 3 minsCybersecurity operations can be hard but are needed in all businesses. EMA Research Director Chris Steffen shares…

3 years ago
  • Trends

The SOC of the Future

Reading Time: 4 minsLumu’s recently appointed Field CTO Jeffrey Wheat looks at the future of the SOC and how incremental…

3 years ago
  • Trends

Top Questions Lumu’s Customers Are Asking Now

Reading Time: 4 minsIn April of 2022, it seems that cybersecurity is more unsettled than ever. Here are the top…

3 years ago
  • Attacks

Ransomware Flashcard 2022: The Vicious Cycle

Reading Time: 3 minsTrends from 2021 indicate that 2022 will see an increased threat of ransomware on a global level.…

3 years ago
  • Technical

The New and Improved Lumu Free

Reading Time: 3 minsLumu Free just got a major upgrade. We've included more metadata collectors, giving you greater network visibility…

3 years ago
  • Trends

2022 CISO Priorities Flashcard: Remote Workforce Remains Top Concern

Reading Time: 2 minsWe polled over 300 CISOs from across the Americas on the cybersecurity challenges they're prioritizing in 2022.…

3 years ago
  • Culture

Why I Joined the Lumu Team

Reading Time: 2 minsDirector of Product Marketing, Nicole Ibarra, just joined the Lumu Team. Here's how the Lumu story—and our…

3 years ago
  • Trends

Lumu’s Year in Review 2021

Reading Time: 2 minsIn 2021 Lumu grew from strength to strength—in every metric. Here's our Year in Review with all…

3 years ago
  • Attacks

Log4j: What You Need to Know

Reading Time: 2 minsThe Log4j vulnerability (designated as CVE-2021-44228 by MITRE) affects 1000's of software applications. Here are some quick…

3 years ago
  • Stories

Cybersecurity 2022: New Tools, Dynamic Attacks, and Talent Shortage

Reading Time: 2 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

3 years ago
  • Trends

Continuous Compromise Assessment™ is Championing the NAV Market

Reading Time: 2 minsAnalyst firm Frost & Sullivan assesses how major players in the NAV market are addressing organizations’ biggest…

3 years ago
  • Attacks

Recognize the First Signs of a Ransomware Chain

Reading Time: 5 minsRansomware is always preceded by signs that can be identified and stopped. Learn about ransomware chains and…

3 years ago
  • Technical

MSP Spotlight: Help SMBs Build Cybersecurity Resilience

Reading Time: 3 minsMSPs' skills and resources make them perfectly positioned to fulfill SMBs’ need for increased cybersecurity resilience.

3 years ago
  • Attacks

Monetization of Cybercrime: It’s All About the Money

Reading Time: 2 minsThe monetization of cybercrime has diversified while deep web credential market activity has been accelerating. Here's why…

3 years ago