- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
DEF CON is the world’s largest annual hacker conference, and it’s a great place to learn about the latest security threats and how to protect your organization. This year’s conference is being held in Las Vegas from August 10th-13th, and there are a number of talks that would be of interest to SMB security practitioners. I have been attending DEFCON now for around 10 years, with this being the 7th year officially as a staff member (goon) on the production photo team, and regular panel member for the late night game show “Who’s Slide”.
How to Secure Your SMB
One talk that I’m definitely planning on attending is “How to Secure Your SMB” by John Strand. This talk will cover the top security threats facing SMBs and how to mitigate them. John Strand is a well-known security expert with over 20 years of experience. He is the founder of BlackHills Information Security, and Antisyphon Infosec Training, and he is the author of several books on security, including “The Art of Security” and “The Security Risk Assessment Handbook.”
I believe that this talk would be very helpful for SMB security professionals. It will provide them with a comprehensive overview of the security threats that SMBs face, and it will give them some practical tips on how to mitigate those threats.
The Art of Security Logging
This talk will teach you how to collect, analyze, and interpret security logs to detect and respond to attacks. Patrick Wardle is a well-known security researcher and author. He is the founder of the security blog Null Byte, and he is the author of several books on security, including “The Art of Security Logging” and “The Practice of Network Security Monitoring.”
I believe that this talk would be very helpful for security professionals who are responsible for collecting and analyzing security logs. It will provide them with a comprehensive overview of the logging process, and it will give them some practical tips on how to use logs to detect and respond to attacks.
Hunting in the Dark: Defeating Advanced Adversaries
This talk will discuss how to hunt for advanced adversaries who are using sophisticated techniques to evade detection. Kevin Beaumont is a well-known security researcher and author. He is the founder of the security blog The Kevin Beaumont Blog, and he is the author of several books on security, including “Hunting in the Dark” and “The Cyber War.”
I believe that this talk would be very helpful for security professionals who are interested in and responsible for threat hunting in their organization. It will provide them with a comprehensive overview of the threat landscape, and it will give them some practical tips on how to identify and respond to advanced attacks.
In addition to these talks, there are also a large number and variety of workshops and tutorials that would be of interest to anyone in the technology and security space. These sessions will provide hands-on training on topics such as incident response, penetration testing, and malware analysis.
Overall, DEF CON is a great opportunity to learn from some of the world’s leading security experts. If you’re serious about protecting your organization, I encourage you to attend the conference.
I hope you’ll join me at DEF CON 31!
Amanda Berlin
Amanda Berlin is the Senior Product Manager of Cybersecurity at Blumira, bringing nearly two decades of experience to her position. At Blumira she leads a team of incident detection engineers who are responsible for creating new detections based on threat intelligence and research for the Blumira platform. An...
More from the blog
View All Posts
Customer Success Stories
6 min read
| May 23, 2023
Customer Story: Tullahoma Utilities Authority
Read More
Security Trends and Info
11 min read
| February 1, 2024
Why You Should Migrate From On-Premise Exchange
Read More
Security How-To
18 min read
| January 4, 2023
How To Manage Windows Firewall with GPOs
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.