Blumira Blog

SecOps Simplified, Part 5: Speed & Visibility: The REAL Power Couple
Read More
Cyber Warfare, Part 3: InfoSec Strategy, Principles & Biometrics
Read More
OWASP Top 10: Automate Logging & Monitoring for Application Security
Read More
Intro to Windows Security Logs - On-Demand
Read More
Cyber Warfare, Part 2: Deep Fakes, War Strategy & Scaling Security
Read More
RDP Risk: Ransomware Targets Manufacturing and Energy Plants
Read More
SecOps Simplified, Part 4: Staffing – Haven’t I Seen This Movie Before?
Read More
Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles
Read More
How to Increase Windows Log Visibility: A Tutorial
Read More
Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3
Read More
Top Security Threats: Lateral Movement
Read More
Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2
Read More
How to Mitigate Against the SMBleed Vulnerability & POC Exploit
Read More
Automating Detection and Response With Cisco Firewalls & VPN
Read More
Logmira: Windows Logging Policies for Better Threat Detection
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.