Local Government and Education Cybersecurity Advisory
Reading Time: 6 mins Local Government and Education Institutions are under increasing threat from cyber criminals. Explore how these critical sectors can level up their cybersecurity posture. The post...
View ArticleCheck Point VPN Vulnerability Advisory
Reading Time: 2 mins This VPN vulnerability highlights a typical risks associated with perimeter defenses, which can allow attackers to access networks. Stay informed and secure your network promptly....
View ArticleThe Downsides of Platformization Show the Need for an Open SecOps Platform
Reading Time: 4 mins Platformization can limit flexibility and innovation. Discover why an open SecOps Platform is essential for cybersecurity The post The Downsides of Platformization Show the Need...
View ArticleAdvisory Alert: Snowflake Supply Chain Attack
Reading Time: 3 mins Explore the Snowflake supply chain attack, how infostealer malware impacted hundreds of major companies, and essential measures to protect your organization from similar threats...
View ArticleBack-to-School K–12 Cybersecurity Tips
Reading Time: 4 mins Essential cybersecurity tips to safeguard K-12 schools during the back-to-school season. The post Back-to-School K–12 Cybersecurity Tips appeared first on Lumu Technologies.
View ArticleAdvisory Alert: CrowdStrike Outage – What We Know
Reading Time: 3 mins Learn about the recent CrowdStrike outage affecting Microsoft devices, its impact, recovery steps, and how Lumu can help ensure continued network security. The post Advisory Alert:...
View ArticleHow Lumu Helps MSPs Achieve CIS Compliance
Reading Time: 3 mins Learn how Lumu helps MSPs meet CIS compliance with real-time malware detection, network defense, and automated incident response. The post How Lumu Helps MSPs Achieve CIS...
View ArticleLumu Recognized as a Leader and Outperformer by GigaOm
Reading Time: 4 mins We are incredibly excited to share that Lumu has been recognized as one of the best Network Detection and Response (NDR) solutions for the second year running in the GigaOm Radar...
View ArticleOur 3 Biggest Takeaways From DEFCON 32
Reading Time: 6 mins Mario Lobo, Cybersecurity Specialist at Lumu Technologies, recently attended DEFCON – a hacker convention held annually in Las Vegas, Nevada – and he highlights his big takeaways....
View ArticleAdvisory: CISA Releases Advisory on RansomHub Ransomware Attacks
Reading Time: 4 mins RansomHub is a new ransomware group offering Ransomware as a Service that has already encrypted and exfiltrated data from at least 210 victims. How does RansomHub bypass defenses...
View ArticleLumu’s Journey to Log Retention: Reducing Costs and Enabling Compliance
Reading Time: 6 mins Discover how Lumu's Playback feature improves visibility and efficiency while addressing the limitations of traditional SIEMs in handling vast amounts of network data. The post...
View Article3 Cybersecurity Trends From the Lumu Compromise Report 2024
Reading Time: 3 mins Lumu’s new Compromise Report 2024 reveals the greatest current cybersecurity trends and how to defend against them. We look at the top three takeaways to watch out for in the...
View ArticleThe Hidden Pitfalls of Deep Packet Inspection
Reading Time: 6 mins Explore DPI's limitations in network security and discover how Lumu’s cloud-native, metadata-driven approach provides essential visibility and threat detection. The post The Hidden...
View ArticleLumu Compromise Report 2024: 2 Essential Tips for MSPs to Protect Clients
Reading Time: 4 mins For MSPs to proactively protect their clients they need good intelligence, such as the trends and tendencies in cyber threats revealed in the Lumu Compromise Report 2024. The post...
View ArticleDoes Infostealer Malware Have US Organizations Under Siege?
Reading Time: 5 mins Lumu’s Compromise Report for 2024 uncovers surprising information about how infostealer malware has increasingly targeted US organizations, local government, and education...
View Article