feature post

  • Product

Introducing Lumu Autopilot: Autonomous Cybersecurity Operations

Reading Time: 5 minsIntroducing Lumu Autopilot, the latest innovation that delivers on our promise to help the world operate cybersecurity…

2 years ago
  • Attacks

LockBit Takedown: Advisory Alert

Reading Time: 7 minsLockBit takedown news and guidance: arrests made, resilience shown, and future cybersecurity steps.

2 years ago
  • Trends

Navigating SLED Cybersecurity Challenges

Reading Time: 5 minsUncover key tactics for navigating SLED cybersecurity challenges, focusing on budget-friendly solutions, advanced threat detection, and automated…

2 years ago
  • Product

A Look Back At Our Product in 2023

Reading Time: 4 mins2023 at Lumu: Pioneering advancements in AI-driven cybersecurity solutions and partnerships, enhancing incident management and operational efficiency.

2 years ago
  • Product

Lumu for MSPs Lite: Streamlined Cybersecurity Solution for MSPs

Reading Time: 3 minsIntroducing Lumu for MSPs Lite, a free, AI-driven cybersecurity solution for Managed Service Providers, democratizing advanced threat…

2 years ago
  • Trends

Lumu’s Next Chapter: A Deep Dive into Our $30M Series B Funding

Reading Time: 3 minsLumu secures $30M Series B led by Forgepoint Capital, boosting cybersecurity innovation and enhancing real-time threat management.

2 years ago
  • Trends

MSSP Security Must Adapt to Serve Customers

Reading Time: 8 minsManaged Security Service Providers (MSSPs) have become pivotal allies for businesses, providing expert services and robust technological…

3 years ago
  • Technical

Lumu’s Ransomware Infographic: The 2023 Ransomware Flashcard

Reading Time: 3 minsExplore the key insights and trends from our 2023 Ransomware Infographic Flashcard. Learn about how hackers are…

3 years ago
  • Technical

EDR Evasion: How Hackers Get Past Endpoint Defenses

Reading Time: 11 minsEDR Evasion includes a suite of techniques that hackers use to elude endpoint defenses. Discover how hackers…

3 years ago
  • Trends

CISO Priorities 2023: Automation Over Cost-Cutting

Reading Time: 2 minsWe surveyed 213 U.S. cybersecurity executives on their priorities for the new year. Here’s what their responses…

3 years ago
  • Technical

The Power of a Threat-Informed Defense Strategy

Reading Time: 6 minsThreat-informed defense is a strategic approach to risk-based cybersecurity that even smaller organizations can get up and…

3 years ago
  • Stories

Cybersecurity 2023: Recession Opens Opportunities for Criminals and Defenders

Reading Time: 3 minsWith cybersecurity evolving at a faster pace than ever, here are some predictions for what to look…

3 years ago
  • Trends

The MSP Cybersecurity Market Opportunity Blueprint

Reading Time: 2 minsThe MSP Cybersecurity Market Opportunity Blueprint shows MSPs how they can grow their business through value-added cybersecurity…

3 years ago
  • Trends

The Value of Continuous Measurement in Cybersecurity

Reading Time: 4 minsLumu Founder and CEO Ricardo Villadiego reflects on how continuous measurement in cybersecurity allows for a swift…

3 years ago
  • Attacks

Compromise Flashcard 2022: The Disparate Realities of Cybersecurity

Reading Time: 4 minsLumu’s Compromise Flashcard 2022 tells the story of compromise in 2022. Learn how threat actors are targeting…

4 years ago