- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Posts by Justin Kikani
The Iranian Cyber Threat: Key Insights for IT Teams
9 min read
| July 2, 2025
Although there is currently a ceasefire in place, geopolitical tensions between the United States and Iran continue to escalate. As a result, we're witnessing a corresponding...
Read MoreAbout the Author
At Blumira, Justin helps to craft detection rules as part of the Incident Detection Engineering team. Prior to joining the team, he was the Director of IT at Nexus Direct, where he supported the company in its transition to a remote infrastructure. Before that, he held various IT and engineering roles, including a major telecommunications company and a local commercial IT consulting company, where he gained a reputation for his knowledge in building mobile and data center solutions. Justin has a Bachelor’s Degree from Old Dominion University.

Product Updates
6 min read
| June 11, 2025
New Detection: Catching Session Token Theft in Microsoft 365
Read More
Security Alerts
5 min read
| April 12, 2024
CVE-2024-3400: Palo Alto Vulnerabilities in GlobalProtect Gateway Lead to RCE
Read More
Security How-To
13 min read
| March 15, 2024
“Entra”sting Roles You’ll Want to Know About
Read More
Security Alerts
14 min read
| January 13, 2023
How To Navigate Microsoft 365 Audit Logs
Read More
Security How-To
18 min read
| December 23, 2022
Top 18 Tips to Secure SSH on Linux
Read More
Security How-To
15 min read
| November 22, 2022
Office 365 Audit Log Retention: Why It Matters and Best Practices
Read More
Security How-To
20 min read
| November 15, 2022
A Guide To Microsoft Azure Security Logging
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.