Skip to content

    Blumira Blog

    Security How-To
    3 min read | January 22, 2025

    On-Demand - Maximizing Security Effectiveness with Limited Resources

    Read More
    Product Updates
    2 min read | January 22, 2025

    Security Detection Update – 2025-1-22

    Read More
    Compliance Security Frameworks and Insurance
    3 min read | January 21, 2025

    [Webinar] Security Monitoring Essentials for 2025 Compliance

    Read More
    Security How-To
    2 min read | January 15, 2025

    [Webinar] Resilient Relationship Security: Reduce Lost Connections

    Read More
    Security How-To
    1 min read | January 14, 2025

    Normalizing Security Culture: Don't Have to Get Ready if You Stay Ready

    Read More
    Security Alerts
    17 min read | January 8, 2025

    SonicWall Discloses Multiple Vulnerabilities Including a High Severity Authentication Bypass Flaw

    Read More
    Customer Success Stories
    7 min read | January 6, 2025

    Customer Story: District of Sparwood

    Read More
    4 min read | January 6, 2025

    What Security Teams Get Wrong About Log Management and How to Fix It

    Read More
    Blog
    5 min read | January 3, 2025

    Microsoft Defender for Cloud Apps: Integrate with Blumira SIEM

    Read More
    Product Updates
    11 min read | January 2, 2025

    November 2024 Product Release Notes

    Read More
    3 min read | December 17, 2024

    Meet Amanda Berlin: Making Enterprise Security Accessible for All

    Read More
    Security Alerts
    13 min read | December 17, 2024

    Vulnerabilities in Cleo Software Allow for Unauthenticated Remote Code Execution via CVE-2024-55956

    Read More
    Security Trends and Info
    4 min read | December 16, 2024

    Unraveling Cybersecurity: From Virus Hunters to Intelligent Defenders

    Read More
    Security Alerts
    11 min read | December 12, 2024

    SonicWall Advisory Reveals Two Unauthenticated Remote Code Execution Vulnerabilities

    Read More
    SIEM XDR
    5 min read | December 11, 2024

    Manual vs Automated Security Visibility for Resource-Constrained Teams

    Read More