The Culture of Connection: the Art of Thriving at RSA Conference 2023
Do you want to meet Blumira at RSA Conference 2023? We want to meet you! Connect with us this year at S-4210 in Moscone Center, April 24-27.
Read MoreBlumira By The Numbers in 2022
In 2022, we collected a lot of data here at Blumira — over 5,000 TB — to protect our customers from threats. Looking back on the year, we can uncover threat detection and response patterns.
Read More10 Definitions Of XDR (Extended Detection & Response)
What is XDR? Depends on who you ask. We found 10 Extended Detection & Response definitions and analyzed the types, foundations and themes of XDR
Read MoreHow Endpoint Isolation Locks Down Cyber Attacks
Endpoint isolation is the act of cutting off all traffic to and from an infected computer. When an active malware infection is detected, the affected computer is quarantined from the rest of the network. By isolating the infected endpoint, security teams interrupt attack chains and prevent lateral movement of attacks.
Read MoreTop 5 Steps For SMB Endpoint Security Success
5 steps small to mid-sized businesses (SMBs) can do to stop the flood of endpoint security issues, while focusing on the day-to-day of their business.
Read MoreWhat Are Event Logs and Why Do They Matter?
Logs are everywhere. Which is good because they're a critical piece of operations work in computing, whether you work in DevOps, security operations, or IT operations. Analyzing logs helps with many different aspects of the technical support of devices, users, applications, and more. They can determine where authentication is happening, how applications work, whether a system crashed because of malicious actions or some other malfunction.
Read More