feature post

  • Trends

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 mins Introducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate…

5 days ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 mins LockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

2 months ago
  • Trends

Navigating SLED Cybersecurity Challenges

Reading Time: 5 mins Uncover key tactics for navigating SLED cybersecurity challenges, focusing on budget-friendly solutions, advanced threat detection, and…

3 months ago
  • Technical

A Look Back At Our Product in 2023

Reading Time: 4 mins 2023 at Lumu: Pioneering advancements in AI-driven cybersecurity solutions and partnerships, enhancing incident management and operational…

4 months ago
  • Technical

Lumu for MSPs Lite: Streamlined Cybersecurity Solution for MSPs

Reading Time: 3 mins Introducing Lumu for MSPs Lite, a free, AI-driven cybersecurity solution for Managed Service Providers, democratizing advanced…

6 months ago
  • Culture

Lumu’s Next Chapter: A Deep Dive into Our $30M Series B Funding

Reading Time: 3 mins Lumu secures $30M Series B led by Forgepoint Capital, boosting cybersecurity innovation and enhancing real-time threat…

7 months ago
  • Trends

MSSP Security Must Adapt to Serve Customers

Reading Time: 8 mins Managed Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust…

11 months ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 mins Explore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers…

1 year ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 mins EDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how…

1 year ago
  • Trends

CISO Priorities 2023: Automation Over Cost-Cutting

Reading Time: 2 mins We surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their…

1 year ago
  • Technical

The Power of a Threat-Informed Defense Strategy

Reading Time: 6 mins Threat-informed defense is a strategic approach to risk-based cybersecurity that even smaller organizations can get up…

1 year ago
  • Stories

Cybersecurity 2023: Recession Opens Opportunities for Criminals and Defenders

Reading Time: 3 mins With cybersecurity evolving at a faster pace than ever, here are some predictions for what to…

1 year ago
  • Interviews

CISOs’ Lessons: Why We Need to Listen

Reading Time: 4 mins Our CISOs' Lessons report shares the insights of cybersecurity leaders who have experienced worst-case security breaches.…

1 year ago
  • Trends

The MSP Cybersecurity Market Opportunity Blueprint

Reading Time: 2 mins The MSP Cybersecurity Market Opportunity Blueprint shows MSPs how they can grow their business through value-added…

2 years ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 mins Lumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a…

2 years ago