Skip to content

    Posts by Thu Pham

    About the Author

    Thu has over 15 years of experience in the information security and technology industries. Prior to joining Blumira, she held both content and product marketing roles at Duo Security, leading go-to-market (GTM) and messaging for the portfolio solution Cisco Zero Trust. She holds a bachelor of science degree in journalism and advertising.

    Security How-To
    6 min read | August 3, 2020

    Test SIEM Detections for Password Spraying

    Read More
    Security Alerts
    7 min read | July 22, 2020

    Detect and Protect Against Emotet Malware

    Read More
    Product Updates
    9 min read | July 21, 2020

    Now Available: Blumira’s Advanced Security Search & Reporting

    Read More
    Compliance Security Frameworks and Insurance
    11 min read | July 14, 2020

    Is Your SIEM Deployment Failing? The Hidden Costs of SIEMs

    Read More
    Security How-To
    6 min read | July 9, 2020

    How to Reduce Your Overall Attack Surface With Geoblocking

    Read More
    Security Trends and Info
    6 min read | June 29, 2020

    Cyber Warfare, Part 3: InfoSec Strategy, Principles & Biometrics

    Read More
    Compliance Security Frameworks and Insurance
    5 min read | June 25, 2020

    OWASP Top 10: Automate Logging & Monitoring for Application Security

    Read More
    Security Trends and Info
    3 min read | June 25, 2020

    Intro to Windows Security Logs - On-Demand

    Read More
    Security Trends and Info
    5 min read | June 24, 2020

    Cyber Warfare, Part 2: Deep Fakes, War Strategy & Scaling Security

    Read More
    Security Alerts
    5 min read | June 23, 2020

    RDP Risk: Ransomware Targets Manufacturing and Energy Plants

    Read More
    Security Trends and Info
    5 min read | June 17, 2020

    Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles

    Read More
    Security How-To
    1 min read | June 16, 2020

    How to Increase Windows Log Visibility: A Tutorial

    Read More
    Security Trends and Info
    5 min read | June 16, 2020

    Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3

    Read More
    Security Alerts
    9 min read | June 15, 2020

    Top Security Threats: Lateral Movement

    Read More
    Security Alerts
    4 min read | June 11, 2020

    Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2

    Read More