Filter by author:
Filter by tag:
Filter by title:
Definition, implementation, importance and alternatives
Learn about vulnerability remediation, its place and importance in vulnerability management, and differentiate it from vulnerability mitigation and acceptance.
Keep tabs on this proposal from the Biden-Harris Admin
Learn about the cybersecurity strategy announced by the Biden-Harris Administration, specifically, the issues it aims to address and the pillars it is based on.
Vulnerability scanning and pentesting for a safer web
Learn how website and web app security scanning work, their role in vulnerability management, and why mix them with pentesting in vulnerability assessment.
Definitions, classifications and pros and cons
Learn what vulnerability scanners and vulnerability scanning are, what their classifications are, and what their pros and cons are.
Is your security testing covering the right risks?
You need to prioritize the security testing techniques that cover the actual threats you're facing. We explain how Lumu's MITRE ATT&CK® Global Matrix can help.
How this process works and what benefits come with it
Learn about the vulnerability management process, its stages, and the benefits your organization can obtain by implementing it.
Get an overview of vulnerability assessment
Learn what vulnerability assessment is, why this IT systems evaluation process is important, what types exist, and how it relates to vulnerability management.
Benefits of continuous over point-in-time pentesting
Continuous penetration testing beats periodic point-in-time pen tests. We present its benefits and how we overcome challenges to its implementation.
For which security standards is pentesting a must-have?
We present whether penetration testing is required for compliance with these security standards: GDPR, GLBA, HIPAA, ISO 27001, PCI DSS, SOC 2 and SWIFT CSCF.