
Is Your Supply Chain Exposing Your Organization? 4 Security Case Studies
Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third parties, whose credential leaks are now your biggest supply chain vulnerability
Already have an account? Sign in
Sign in
Get the latest cybersecurity articles and insights straight from the experts.

Reading Time: 7 minsNetwork perimeters are no longer static. They grow and shift with third parties, whose credential leaks are now your biggest supply chain vulnerability

Reading Time: 3 minsAs RSAC 2026 concludes, Ricardo Villadiego, CEO of Lumu Technologies, reflects on the industry’s shift toward the Agentic Revolution and the move from chatbot interactions to autonomous security that operates at machine speed.

Reading Time: 4 minsManual MISP management creates a resource drain that risks business outages. It is essential to automate this intelligence to secure your financial organization.

Reading Time: 4 mins48% of ransomware attacks successfully evade EDR. Threat actors like Qilin are exploiting the ‘tuning gap’ in managed security. We look at how to regain the upper hand.

Reading Time: 6 minsAI-powered autonomous malware now generates unique threats at machine speed. This makes the transition from human-led to automated defense urgent.

Reading Time: 3 minsHow autonomous attacks, AI supply chain compromise, and geopolitical cybercrime will render traditional SOCs and endpoint security obsolete, forcing a move to a new truth layer.

Reading Time: 6 minsOur analysis of APT-C-36, Blind Eagle, breaks down how a regional phishing attack becomes a global supply chain threat, providing insights for your proactive defense.

Reading Time: 4 minsBy integrating generative AI with Lumu Defender’s carefully curated threat data, you can create a powerful virtual analyst. This guide shows how to use this to deliver faster and more effective security.

Reading Time: 7 minsGunra ransomware targets critical industries using a strict five-day payment deadline. Learn about Gunra and ransomware detection techniques to fortify your defenses.

Reading Time: 5 minsLearning how to implement Zero Trust is more than just buying tools, you have to ensure they work. Integrating Zero Trust with Lumu gives you the needed visibility.

Reading Time: 6 minsWhat is Sarcoma ransomware? This new double extortion threat both steals sensitive data and encrypting systems. You need to ensure your organization is prepared.

Reading Time: 6 minsFresh from DEFCON 33, Lumu’s Mario Lobo identifies a revolutionary shift in AI-driven attacks that is changing the rules for cyber defenders and their tools.

Reading Time: 4 minsTo defend against threats, organizations must use a structured cyber threat intelligence lifecycle. This turns knowledge about attackers into timely, decisive action.

Reading Time: 5 minsAs a new school year begins, cybersecurity for K-12 is more critical than ever. Let’s explore top tips on how to prepare.

Reading Time: 5 minsIn response to global cyber threats, a new White House executive order prioritizes network visibility to strengthen national cybersecurity. Why is network visibility important for your organization?