indicators of compromise

  • Attacks

SolarWinds Hack: Immediate Action Items

Reading Time: 2 mins On December 13th, information was released about the SolarWinds hack, one of the most extensive and…

3 years ago
  • Technical

Mitigate & Remediate – Don’t Skip Either in Incident Response

Reading Time: 3 mins As security professionals, we hear about mitigation and remediation on a daily basis. However, these are…

3 years ago
  • Technical

Compromise Context Supercharges Incident Response

Reading Time: 3 mins Lumu now provides compromise context in one place, providing more insight into the nature of attacks…

4 years ago
  • Technical

Revealing the Magic Behind Your Metadata

Reading Time: 2 mins Network metadata has the power to efficiently answer the most important question in cybersecurity: Is my…

4 years ago
  • Stories

Cybersecurity 2020: What You Should Know before Heading into the New Year

Reading Time: 3 mins 2019 showed that no business is immune to security breaches. Turn your attention to these 8…

4 years ago
  • Trends

It’s Time To Evolve Security Testing

Reading Time: 2 mins Security testing can learn from the aviation industry model. Data breaches have grown rapidly and testing…

4 years ago
  • Attacks

When Compromised Infrastructure Has Catastrophic Consequences

Reading Time: 5 mins Financial institutions, retailers, school districts, hospitals, airlines, public offices will all be future targets of cyberattacks.

5 years ago