{"id":13,"date":"2025-06-06T20:06:05","date_gmt":"2025-06-06T20:06:05","guid":{"rendered":"https:\/\/lucentry.ipwebmaster.com\/?page_id=13"},"modified":"2025-07-17T16:29:53","modified_gmt":"2025-07-17T22:29:53","slug":"home","status":"publish","type":"page","link":"https:\/\/lucentry.ai\/","title":{"rendered":"Home"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide heading=&#8221;Welcome to Lucero\u2019s Cyber Innovations&#8221; button_text=&#8221;Learn More&#8221; use_bg_overlay=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_line_height=&#8221;1.6em&#8221; body_font_size=&#8221;23px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#0a0606&#8243; background_enable_color=&#8221;on&#8221; background_image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/cyber-1.png&#8221; background_enable_image=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;]<\/p>\n<p class=\"p1\"><span class=\"textAlign-left\" contenteditable=\"false\" data-block=\"true\" data-editor=\"e1hpp\" data-offset-key=\"antu5-0-0\"><span class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"antu5-0-0\"><span data-offset-key=\"antu5-0-0\">Our cybersecurity consulting company is dedicated to protecting businesses, government agencies, and defense contractors from evolving cyber threats. We provide comprehensive security solutions, including risk assessments, compliance management, threat mitigation, and AI-driven cybersecurity innovations.<\/span><\/span><\/span><\/p>\n<p>[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#a5a5a5&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_row disabled_on=&#8221;on|on|on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; disabled=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_video src=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/Lucentry-1.mp4&#8243; play_icon_color=&#8221;#E02B20&#8243; font_icon=&#8221;&#x45;||divi||400&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;48%&#8221; module_alignment=&#8221;center&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; disabled_on=&#8221;on|on|on&#8221; disabled=&#8221;on&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;Our Services&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; title_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;CMMC Compliance Readiness&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-blue-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Get audit-ready with expert guidance on CMMC standards. We help you document, prepare, and meet every requirement to secure federal contract eligibility.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Risk Management &#038; Strategy&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-orange-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Identify and manage cyber risks with frameworks aligned to NIST and DoD standards. We help you build a proactive, resilient cybersecurity posture.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Threat Detection &#038; Response&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-red-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Detect threats early and respond fast. Our team deploys tools and strategies to contain incidents and protect critical systems before damage is done.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;AI-Driven Security Innovation&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-red-2-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">We use AI and machine learning to automate threat detection, analyze anomalies, and stay ahead of cyberattacks with smarter, faster security insights.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,1_4,1_4,1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Advanced Cloud Security Architecture&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-green-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Design and implement secure cloud environments with encryption, identity controls, and compliance built in to meet the needs of modern organizations.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Penetration Testing &#038; Audits&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-blue-2-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Simulate real-world attacks to uncover weaknesses. Our testing and audit process strengthens your defenses before hackers can exploit them.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;DoD &#038; NIST Compliance Support&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-grey-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Confidently meet NIST 800-171, DFARS, and related DoD mandates. We simplify complex frameworks so you can stay compliant and mission-ready.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blurb title=&#8221;Vendor &#038; Supply Chain Security&#8221; image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/sentry-1-purple-150&#215;150.png&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_text_align=&#8221;center&#8221; body_text_align=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p class=\"p1\">Secure your full supply chain by assessing third-party risks. We help ensure your vendors meet cybersecurity standards and won\u2019t expose your network.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#e8e8e8&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_heading title=&#8221;About&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_heading][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Founded by Lucero Huante-Frias, a seasoned cybersecurity expert, our company is dedicated to providing expert solutions that safeguard against digital threats. We integrate advanced AI measures to stay ahead of emerging cyber risks, ensuring your organization\u2019s resilience in the face of cyber challenges.<\/p>\n<p><span class=\"textAlign-left\" contenteditable=\"false\" data-block=\"true\" data-editor=\"e1hpp\" data-offset-key=\"antu5-0-0\"><span class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"antu5-0-0\"><span data-offset-key=\"antu5-0-0\">Our cybersecurity consulting company is dedicated to protecting businesses, government agencies, and defense contractors from evolving cyber threats. We provide comprehensive security solutions, including risk assessments, compliance management, threat mitigation, and AI-driven cybersecurity innovations.<\/span><\/span><\/span><\/p>\n<p><span class=\"textAlign-left\" contenteditable=\"false\" data-block=\"true\" data-editor=\"e1hpp\" data-offset-key=\"6rrtg-0-0\"><span class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"6rrtg-0-0\"><span data-offset-key=\"6rrtg-0-0\"><br data-text=\"true\" \/><\/span><\/span><\/span><span class=\"textAlign-left\" contenteditable=\"false\" data-block=\"true\" data-editor=\"e1hpp\" data-offset-key=\"7ad6f-0-0\"><span class=\"public-DraftStyleDefault-block public-DraftStyleDefault-ltr\" data-offset-key=\"7ad6f-0-0\"><span data-offset-key=\"7ad6f-0-0\">As technology advances, so do cyber threats. That\u2019s why we stay ahead of emerging risks by integrating cutting-edge artificial intelligence and the latest security measures. Our team of experts works closely with clients to develop tailored security strategies that fortify digital infrastructures, safeguard sensitive data, and ensure business continuity.<\/span><\/span><\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_blog fullwidth=&#8221;off&#8221; show_author=&#8221;off&#8221; show_date=&#8221;off&#8221; show_categories=&#8221;off&#8221; show_excerpt=&#8221;off&#8221; show_pagination=&#8221;off&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_blog][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_4,3_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/Seal_of_the_United_States_Department_of_Defense.svg_-150&#215;150.png&#8221; title_text=&#8221;Seal_of_the_United_States_Department_of_Defense.svg&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; width=&#8221;53%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;3_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>We specialize in working with the Department of Defense (DoD) and other government entities, offering top-tier cybersecurity services. With a commitment to innovation and excellence, we help organizations navigate the complex cybersecurity landscape with confidence. Trust us to be your partner in securing critical infrastructure, classified data, and national security assets while ensuring full compliance with DoD cybersecurity regulations.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\t\n\t\t<div id=\"gs_logo_area_48\" class=\"gs_logo_area gs_logo_area_48 slider1\" style=\"opacity: 0; visibility: hidden;\">\n\t\t\t<div class=\"gs_logo_area--inner\">\n\t\n\t\t\t\t\n<div class=\"gs_logo_container gs_carousel_swiper gs_logo_fix_height_and_center\" data-carousel-config='{\"direction\":\"horizontal\",\"speed\":500,\"isAutoplay\":true,\"autoplayDelay\":2000,\"loop\":true,\"pauseOnHover\":true,\"ticker\":false,\"navs\":true,\"navs_pos\":\"bottom\",\"dots\":false,\"dynamic_dots\":true,\"slideSpace\":10,\"slidesPerGroup\":1,\"desktopLogos\":5,\"tabletLogos\":3,\"mobileLogos\":2,\"reverseDirection\":false}'>\n\n\t\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/c6fd4380-37be-4d1b-a792-9d1e9a3b853f\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/b415cf50edc1955df11b9046c68b7e2debbd41f1-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"Certified Information Systems Auditor &#8211; CISA\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/b415cf50edc1955df11b9046c68b7e2debbd41f1-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/b415cf50edc1955df11b9046c68b7e2debbd41f1-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/b415cf50edc1955df11b9046c68b7e2debbd41f1.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">Certified Information Systems Auditor &#8211; CISA<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/fe120a41-6a7f-43a9-997d-b03c79920510\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/blob-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA Security+ ce Certification\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/blob-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/blob-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/blob.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA Security+ ce Certification<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/992c58b6-b986-4410-a03b-e018d765580c\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_Linux_2BLPI-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA Linux+ Certification\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_Linux_2BLPI-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_Linux_2BLPI-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_Linux_2BLPI.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA Linux+ Certification<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"167\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/certified-wbenc-womens-business-enterprise-logo-vector-300x167.webp\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"Women&#8217;t Business Enterprise Certified\" \/>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">Women&#8217;t Business Enterprise Certified<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"261\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/csss-logo-jpg-2-300x261.jpg\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA CSSS\" \/>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA CSSS<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/7ba293eb-66e6-4187-ae23-dbeaa75d38fa\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/018bc8478c84ec2a681e649c4718a690a7445617-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"Certified in Risk and Information Systems Control &#8211; CRISC\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/018bc8478c84ec2a681e649c4718a690a7445617-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/018bc8478c84ec2a681e649c4718a690a7445617-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/018bc8478c84ec2a681e649c4718a690a7445617.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">Certified in Risk and Information Systems Control &#8211; CRISC<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/02ce9f9d-4d32-4dff-8b68-8874372f153e\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/dbdea6794f1a6bbcc18d90eea923421aac7df6b5-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"Certified Information Security Manager &#8211; CISM\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/dbdea6794f1a6bbcc18d90eea923421aac7df6b5-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/dbdea6794f1a6bbcc18d90eea923421aac7df6b5-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/dbdea6794f1a6bbcc18d90eea923421aac7df6b5.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">Certified Information Security Manager &#8211; CISM<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"261\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/cios-logo-jpg-300x261.jpg\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA CIOS\" \/>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA CIOS<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"249\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/networkplus-logo-300x249.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA Network+ Certification\" \/>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA Network+ Certification<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"250\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/aplus-logo-300x250.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"CompTIA A+ certification\" \/>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">CompTIA A+ certification<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\n\t\t\t<div class=\"gs_logo_single--wrapper\">\n\t\t\t\t<div class=\"gs_logo_single\">\n\n\t\t\t\t\t<!-- Logo Img -->\n\t\t\t\t\t<a href=\"https:\/\/www.credly.com\/badges\/e0d9dd02-1c7e-453b-9aa3-4f73624b5f36\/linked_in_profile\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_CSIS-300x300.png\" class=\"gs-logo--img wp-post-image\" alt=\"\" title=\"Secure Infrastructure Specialist &#8211; CSIS\" srcset=\"https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_CSIS-300x300.png 300w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_CSIS-150x150.png 150w, https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/CompTIA_CSIS.png 340w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>\n\t\t\t\t\t<!-- Logo Title -->\n\t\t\t\t\t<h3 class=\"gs_logo_title\">Secure Infrastructure Specialist &#8211; CSIS<\/h3>\t\t\t\t\t\n\t\t\t\t\t<!-- Logo Category -->\n\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\n\t\n<\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\n\t\t<style>#gs_logo_area_48:not(.verticaltickerdown):not(.verticalticker) .gs_logo_container{margin-left:-5px}#gs_logo_area_48:not(.verticaltickerdown):not(.verticalticker) .gs_logo_container{margin-right:-5px}#gs_logo_area_48:not(.verticaltickerdown):not(.verticalticker) .gs_logo_single--wrapper{padding:5px}#gs_logo_area_48 ul.gs-logo-filter-cats{text-align:center!important}#gs_logo_area_48 .gs_logo_single--wrapper{width:20%}@media (max-width:1023px){#gs_logo_area_48 .gs_logo_single--wrapper{width:33.333333333333%}}@media (max-width:767px){#gs_logo_area_48 .gs_logo_single--wrapper{width:50%}}<\/style>[\/et_pb_code][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_slider _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_slide heading=&#8221;Welcome to Lucero\u2019s Cyber Innovations&#8221; button_text=&#8221;Learn More&#8221; use_bg_overlay=&#8221;on&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; header_font=&#8221;|700|||||||&#8221; header_line_height=&#8221;1.6em&#8221; body_font_size=&#8221;23px&#8221; body_line_height=&#8221;1.8em&#8221; background_color=&#8221;#0a0606&#8243; background_enable_color=&#8221;on&#8221; background_image=&#8221;https:\/\/lucentry.ai\/wp-content\/uploads\/2025\/06\/cyber-1.png&#8221; background_enable_image=&#8221;on&#8221; global_colors_info=&#8221;{}&#8221; sticky_transition=&#8221;on&#8221;] Our cybersecurity consulting company is dedicated to protecting businesses, government agencies, and defense contractors from evolving cyber threats. We provide comprehensive security solutions, including risk assessments, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-13","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/pages\/13","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/comments?post=13"}],"version-history":[{"count":26,"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions"}],"predecessor-version":[{"id":212,"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/pages\/13\/revisions\/212"}],"wp:attachment":[{"href":"https:\/\/lucentry.ai\/index.php\/wp-json\/wp\/v2\/media?parent=13"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}