Building a Cybersecurity Program: Modern Cybersecurity Practices, Part 1
Pascal Ackerman discusses modern cybersecurity practices and how to approach building a mature cybersecurity program within your organization.
Read MoreSeeking a SIEM Alternative? Choose Automation
SIEMs don't have to be complex or difficult to manage. Security automation is the future of more effective threat detection and response.
Read MoreTop Security Threats: Detecting Ransomware Tactics
Ransomware is targeting SMBs, using new tactics to evade detection. Here's how to effectively detect on risky activity and protect against infection.
Read MoreDetecting RDP Attacks With Honeypots
See our honeypot data on remote access attack trends against RDP since the start of the pandemic and rise in remote work, and get advice on how to protect your organization against remote attacks.
Read MoreHow To Detect Data Exfiltration
To prevent data exfiltration, it's important to know the signs. Here's what to look out for to detect data exfiltration.
Read MorePalo Alto Next-Generation Firewalls Integration: Automated Threat Detection & Response
By collecting and parsing firewall logs, Blumira's automated platform can detect indicators of threats and help you respond to them quickly.
Read More