editor’s picks

  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

3 years ago
  • Attacks

Advisory Alert: All About the 3CX Desktop App Attack

Reading Time: 2 minsOur Threat Intelligence Team has discovered approximately 70,000 instances potentially exposed to a dangerous vulnerability in the…

3 years ago
  • Attacks

Clop Ransomware Blitz: Understanding and Mitigating This Pervasive Threat

Reading Time: 6 minsClop Ransomware is currently being unleashed in a blitz of attacks against organizations across the globe. To…

3 years ago
  • Attacks

Manufacturing Industry Targeted by Ransomware

Reading Time: 8 minsThe Manufacturing industry is targeted by ransomware more than any other industry in the USA. Take a…

3 years ago
  • Attacks

Lumu’s Ransomware Incident Response Playbook

Reading Time: 2 minsThere’s a lot of information available about ransomware, but most of what exists focuses on how to…

3 years ago
  • Technical

How Cybersecurity Analysts Can Do More With Less

Reading Time: 5 minsCybersecurity Analysts can turn to these 7 habits to complement their cybersecurity strategy and be more efficient.

3 years ago
  • Product

Lumu 2022 Product Recap

Reading Time: 3 minsThe 2022 Lumu Product Recap brings together all the Continuous Compromise Assessment Improvements we delivered over the…

3 years ago
  • Stories

Cybersecurity 2023: Recession Opens Opportunities for Criminals and Defenders

Reading Time: 3 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

3 years ago
  • Technical

Lumu and Fortinet Simplify Incident Response Automation

Reading Time: 2 minsAs a partner in Fortinet’s Fabric-Ready Partner Program, Lumu delivers automated attack detection and response across the…

3 years ago
  • Trends

The MSP Cybersecurity Market Opportunity Blueprint

Reading Time: 2 minsThe MSP Cybersecurity Market Opportunity Blueprint shows MSPs how they can grow their business through value-added cybersecurity…

3 years ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 minsLumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a swift…

3 years ago
  • Trends

Government Grants Available to Fund New Cybersecurity Programs

Reading Time: 4 minsThe recent Biden-Harris administration government represents the biggest current Zero Trust initiative. Dr. Chase Cunningham looks at…

3 years ago
  • Trends

Simple Truths for MSPs About Cybersecurity and Zero Trust

Reading Time: 3 minsDoctor Zero Trust, Chase Cunningham looks at the guiding lights that MSPs can use to navigate the…

3 years ago
  • Trends

Introducing Lumu’s New ROI Calculator

Reading Time: 2 minsThe Lumu ROI Calculator is a free tool that helps organizations get an idea of the time…

3 years ago
  • Attacks

Compromise Flashcard 2022: The Disparate Realities of Cybersecurity

Reading Time: 4 minsLumu’s Compromise Flashcard 2022 tells the story of compromise in 2022. Learn how threat actors are targeting…

4 years ago