indicators of compromise

  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 minsOn December 13th, information was released about the SolarWinds hack, one of the most extensive and serious…

4 years ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 minsAs security professionals, we hear about mitigation and remediation on a daily basis. However, these are terms…

4 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 minsLumu now provides compromise context in one place, providing more insight into the nature of attacks and…

5 years ago
  • Technical

Revealing the Magic Behind Your Metadata

Reading Time: 2 minsNetwork metadata has the power to efficiently answer the most important question in cybersecurity: Is my network…

5 years ago
  • Stories

Cybersecurity 2020: What You Should Know before Heading into the New Year

Reading Time: 3 mins2019 showed that no business is immune to security breaches. Turn your attention to these 8 key…

5 years ago
  • Trends

It’s Time To Evolve Security Testing

Reading Time: 2 minsSecurity testing can learn from the aviation industry model. Data breaches have grown rapidly and testing procedures…

5 years ago
  • Attacks

When Compromised Infrastructure Has Catastrophic Consequences

Reading Time: 5 minsFinancial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

5 years ago