Protecting Against Ragnar Locker Ransomware
Get visibility into common Windows security events that can help you prevent potential system compromise or an infection like Ragnar Locker ransomware.
Read MoreTest SIEM Detections for Password Spraying
In this how-to, we'll walk you through what password spraying is and how to test your SIEM for password spraying detection using open-source tools.
Read MoreDetect and Protect Against Emotet Malware
Emotet can lead to ransomware, and enable attackers to move laterally throughout your network to steal data. Here's how to detect and defend against it.
Read MoreNow Available: Blumira’s Advanced Security Search & Reporting
Easily find logs and events with Blumira's new advanced search and reporting feature, with pre-built searches for compliance and security.
Read MoreWhat You Need to Know About SigRed: Windows DNS Vulnerability (CVE-2020-1350)
Mitigate the SigRed Windows DNS vulnerability (CVE-2020-1350) with Blumira's detection & response. Protect your Windows DNS servers from potential attacks.
Read MoreIs Your SIEM Deployment Failing? The Hidden Costs of SIEMs
Hidden SIEM costs can add up - time, consultants, additional licensing and more. See a comparison of an on-prem SIEM vs. a modern cloud SIEM deployment.
Read MoreHow to Reduce Your Overall Attack Surface With Geoblocking
One of the most basic ways to effectively reduce risk is by tracking inbound connections to your network using different security technologies.
Read MoreWhat You Need to Know About the Severe F5 BIG-IP Vulnerability
This 10/10 critical F5 vulnerability can result in complete system compromise. See how it works, who's affected and how to mitigate.
Read MoreSecOps Simplified, Part 5: Speed & Visibility: The REAL Power Couple
What makes SecOps successful is how much of the network you can see and how quickly you can respond to security events.
Read MoreCyber Warfare, Part 3: InfoSec Strategy, Principles & Biometrics
In this three-part series, Blumira VP of Operations Patrick Garrity interviews Dr. Chase Cunningham on his new cybersecurity book
Read More