network visbility

  • Technical

Is Your BYOD Policy a Gateway for Attackers? Here’s How to Secure It

Reading Time: 5 minsEmbracing remote work creates BYOD security challenges. Learn to secure the personal laptops and phones connecting to…

5 months ago
  • Attacks

Akira Ransomware and the IoT Security Gap

Reading Time: 3 minsThe recent Akira ransomware attack, which exploited a vulnerable webcam to bypass EDR, underscores the critical need…

12 months ago
  • Technical

Cloud Network Threat Visibility and Response

Reading Time: 4 minsAchieve comprehensive cloud visibility across your hybrid and multi-cloud environments to proactively detect and respond to network…

1 year ago
  • Product

Introducing Lumu Discover: External Attack Surface Assessment

Reading Time: 5 minsLumu has released Lumu Discover, giving real-time, actionable intelligence on your external attack surface.

1 year ago
  • Technical

Visibility and Context: Securing State and Local Environments Against Ransomware

Reading Time: 2 minsDr. Chase Cunningham discusses the critical need for state and local governments to secure against ransomware, ensuring…

2 years ago
  • Product

Lumu for MSPs Lite: Streamlined Cybersecurity Solution for MSPs

Reading Time: 3 minsIntroducing Lumu for MSPs Lite, a free, AI-driven cybersecurity solution for Managed Service Providers, democratizing advanced threat…

2 years ago