Skip to content

    Blumira Blog

    Security Trends and Info
    5 min read | June 17, 2020

    Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles

    Read More
    Security How-To
    1 min read | June 16, 2020

    How to Increase Windows Log Visibility: A Tutorial

    Read More
    Security Trends and Info
    5 min read | June 16, 2020

    Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3

    Read More
    Security Alerts
    9 min read | June 15, 2020

    Top Security Threats: Lateral Movement

    Read More
    Security Alerts
    4 min read | June 11, 2020

    Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2

    Read More
    Security How-To
    7 min read | June 10, 2020

    How to Mitigate Against the SMBleed Vulnerability & POC Exploit

    Read More
    SIEM XDR
    6 min read | June 9, 2020

    Automating Detection and Response With Cisco Firewalls & VPN

    Read More
    Security How-To
    7 min read | June 8, 2020

    Logmira: Windows Logging Policies for Better Threat Detection

    Read More
    Security How-To
    2 min read | June 3, 2020

    Windows Logging Tips for Better Threat Detection - On-Demand

    Read More
    Security Trends and Info
    9 min read | May 28, 2020

    Seeking a SIEM Alternative? Choose Automation

    Read More
    Security Alerts
    9 min read | May 27, 2020

    Top Security Threats: Detecting Ransomware Tactics

    Read More
    Security Alerts
    10 min read | May 26, 2020

    Detecting RDP Attacks With Honeypots: Blumira Data Insights

    Read More
    Customer Success Stories
    9 min read | May 23, 2020

    Customer Story: Securing Merit Network with Blumira’s Advanced Solutions

    Read More
    Security Trends and Info
    2 min read | May 20, 2020

    Replace Your SIEM With Automated Detection & Response

    Read More
    Security Alerts
    2 min read | May 19, 2020

    Protecting Against the Rise in Remote Access Attacks - On-Demand

    Read More