Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PR Newswire
SAN FRANCISCO, June 6, 2022
Firm helps minimize impact of cybercrime on organizations with speedy detection, accurate response
SAN FRANCISCO, June 6, 2022 /PRNewswire/ -- Lumu, creators of the Continuous Compromise Assessment cybersecurity model that empowers organizations to measure compromise in real time, today launched Lumu's Incident View, providing cybersecurity operators with a single view of their company's cybersecurity stack for threat investigations. Built for proficient cybersecurity operations, its new feature is part of the company's paid tiers, Lumu Insights and Lumu Defender, and it allows for maximum efficiency during critical moments between detection and response.
When it comes to early incident detection and response, operators receive alerts without much context, a problem that Lumu has been working to solve. Lumu's Incident View shows operators everything they need to know in one place for swift and precise response. Teams receive actionable information about who was impacted, when the incident took place and how best to respond before it escalates to a bigger problem. The Incidents View capability contains details about which actions were taken by other elements of a company's cybersecurity stack for better incident management.
"Ransomware attacks are some of the biggest cybersecurity threats for businesses, thanks to the current geopolitical landscape. Couple that with a looming global recession - a period in which threat actors know cybersecurity budgets have been slashed before and are prepared to strike - and you have a recipe for chaos," says Lumu CEO Ricardo Villadiego. "The good news is, as a society we're becoming more vigilant, so CISOs, CTOs and IT directors are prioritizing spending toward solutions that are going to help them minimize the impact of cybercrime in their organizations. That's where Lumu's Incident View comes in."
Villadiego says, "Each incident has a unique attack playbook, so Lumu provides all of the necessary context to understand each and every incident and the specific techniques used by attackers for a more targeted and swift response plan. With this level of detail, cybersecurity operators can take steps to mitigate a malicious incident before it spreads across your organization."
Lumu's Incident View facilitates collaboration with the ability for individuals to leave comments in its dashboard and reply to other team members, tracking progress internally. Security teams can track incidents and the internal progress through the comment section within the incident. They can also communicate with each other to understand if and when action is necessary, or if an action has already been taken.
To learn more about Lumu's Incident View, please visit www.lumu.io or visit us at RSA, booth # 4315 for a demo.
Headquartered in Miami, Florida, Lumu is a cybersecurity company focused on helping enterprise organizations illuminate threats and isolate confirmed instances of compromise. Applying principles of Continuous Compromise Assessment, Lumu has built a powerful closed-loop, self-learning solution that helps security teams accelerate compromise detection, gain real-time visibility across their infrastructure, and close the breach detection gap from months to minutes. Learn more about how Lumu illuminates network blindspots at www.lumu.io.
View original content to download multimedia:https://www.prnewswire.com/news-releases/lumu-launches-new-incident-view-for-faster-attack-management-built-to-empower-security-teams-301561082.html
SOURCE Lumu
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs