Master Cybersecurity Through Asset Lifecycle Management

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”4.16″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”row” _builder_version=”4.16″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”With Cloud, Infrastructure as Code, Containers” _builder_version=”4.16″ _module_preset=”default” global_colors_info=”{}”] With Cloud, Infrastructure as Code, Containers, and BYOD to name a few of the rapidly adopting technologies, the struggles with […]

Cybersecurity Excellence Multi-Award Winner

cyber excellence awards

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.6″ _module_preset=”default” global_colors_info=”{}”] Lucidum has been recognized by the Cybersecurity Excellence Awards [/et_pb_text][et_pb_text _builder_version=”4.14.6″ _module_preset=”default” global_colors_info=”{}”] The Cybersecurity Excellence Awards honor companies, services, and individuals that demonstrate excellence, innovation […]

All I Needed to Know About Machine Learning I Learned at the Wood Mill

Stack of wood from a mill

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.5″ _module_preset=”default” global_colors_info=”{}”] The Value of Machine Learning How would you make Machine Learning valuable? Since Machine Learning is the competitive assembly of algorithms that improve over time, how […]

Security Leaders: Get Off the Treadmill of Panic

Shadowed treadmill

[et_pb_section fb_built=”1″ _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.6″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″ header_4_font_size=”22px” header_4_line_height=”1.3em”] Setting Yourself Up for Success New threats and vulnerabilities are surfacing every day, and if they’re as significant as Log4j it can […]

Lies, Damn Lies, and Artificial Intelligence

Darkened vision of a chess board with King in focus

[et_pb_section fb_built=”1″ _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”The Formula Isn’t Wrong Row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” collapsed=”on” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text admin_label=”The Formula Isn’t Wrong” _builder_version=”4.14.6″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”] The Formula Isn’t Wrong “Put a bird on it.”  Like an episode of Portlandia that never […]

A Look Back at 2021 and Predictions for 2022

Time lapse of sparkler firework

[et_pb_section fb_built=”1″ _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.6″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″] Chronicles of a Tech Startup   A year ago, we gave you our 2021 predictions. And in it, we predicted that at the end […]

Identifying and Remediating the Log4j2 Zero-Day Vulnerability

shattered pane of security glass

[et_pb_section fb_built=”1″ _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”] Log4j Vulnerability – December 2021 Updates   In December 2021, a serious vulnerability was identified (CVE-2021-44228) that affects Log4j2 versions 2.0 to 2.14.1. This vulnerability highlights the […]

Log4J2 2.15.0: How can I verify that the Lucidum appliance has been updated to mitigate the Log4j2 CVE-2021-44228 vulnerability?

dry cracked dirt

[et_pb_section fb_built=”1″ admin_label=”section” _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row admin_label=”row” _builder_version=”3.25″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.5″ _module_preset=”default” hover_enabled=”0″ global_colors_info=”{}” sticky_enabled=”0″] Log4j Lucidum Appliance Update A zero-day exploit for a vulnerability (CVE-2021-44228) in the widely-used Apache Log4j framework was publicly released on December 9th, 2021. […]

The Importance of Asset Visibility

human eye abstract

[et_pb_section fb_built=”1″ _builder_version=”3.22″ da_disable_devices=”off|off|off” global_colors_info=”{}” da_is_popup=”off” da_exit_intent=”off” da_has_close=”on” da_alt_close=”off” da_dark_close=”off” da_not_modal=”on” da_is_singular=”off” da_with_loader=”off” da_has_shadow=”on”][et_pb_row _builder_version=”4.14.4″ background_size=”initial” background_position=”top_left” background_repeat=”repeat” global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.14.4″ header_2_line_height=”1.2em” background_size=”initial” background_position=”top_left” background_repeat=”repeat” custom_margin=”||0px||false|false” custom_padding=”||0px||false|false” global_colors_info=”{}”] Why IT Departments Need Asset Visibility  Security teams recognize the importance of asset visibility. One of the main concerns that CISOs have shared […]