kate-gibson
Zscaler Deception
Last Updated: June 29, 2024Zscaler Deception (formerly Smokescreen IllusionBLACK) is a deception-based threat detection platform delivered as part of the Zscaler Zero Trust Exchange. Zscaler Deception uses decoys/honeypots to detect advanced in-network threats that have bypassed existing defenses. Zscaler Deception detects compromised users, stops lateral movement, and defends against human-operated ransomware, hands-on keyboard threats, supply chain attacks, and malicious...
SecurityScorecard
Last Updated: June 29, 2024SecurityScorecard provides instant cyber risk ratings of vendors and supply chains. SecurityScorecard enables self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting. Parameters URL (required): The URL of the SecurityScorecard API, for example, https://api.securityscorecard.io. API Token (required): SecurityScorecard API token. Verify SSL (optional, default is false): Verify the SSL certificate or not. API Documentation https://securityscorecard.readme.io/reference/introduction
CyCognito
Last Updated: June 28, 2024The CyCognito platform is an attack surface management solution that automatically discovers your organization’s structure and internet-exposed assets, performs continuous, active security testing of all exposed assets, and then provides prescriptive and intelligent remediation guidance. Configuring the Connector for CyCognito To configure Lucidum to ingest data from CyCognito: Log in to Lucidum. In the left...
Citrix Endpoint Management
Last Updated: June 28, 2024Citrix Endpoint Management (formerly XenMobile) is a Unified Endpoint Management (UEM) solution. Citrix Endpoint Management offers a single, uniform, over-the-air management interface for mobile, laptops, PCs, and other devices like wearables and IoT endpoints. Configuring the Connector for Citrix Endpoint Management To configure Lucidum to ingest data from Citrix Endpoint Management: Log in to Lucidum....
Cyware
Last Updated: June 28, 2024Cyware is a threat intelligence platform that collects and analyzes threat data from various sources to identify and prevent threats to an organization’s network. Cyware provides real-time insights and actionable information about emerging cyber threats, vulnerabilities, and malicious activities and fosters active security collaboration through bidirectional threat intelligence sharing. Parameters URL (required): The URL of the...
Managing a Dashboard
Last Updated: November 5, 2025This chapter describes the actions you can perform on a dashboard. Permissions Channels control your permissions. If a dashboard is in a channel where you have read-only privileges, you will have read-only privileges for the member dashboards. If a dashboard is in a channel where you have read-write privileges, you will have read-write privileges for...
Exporting and Importing a Dashboard
Last Updated: November 4, 2025This chapter describes how to export and import dashboards. You can export dashboards to a JSON file or a PDF file. You can import dashboards using a JSON file. Exporting a Dashboard To export a dashboard to JSON or PDF: Log in to your Lucidum system. In the left menu, click Dashboards. In the Channel...
Creating a Dashboard
Last Updated: November 6, 2025Ways to Create a Dashboard There are three ways to create a dashboard: You can create a new dashboard from scratch You can import a JSON file from another Lucidum system. You can also copy a dashboard and then edit the copy. This chapter describes all these options. Creating a New Dashboard To create a...