Blumira Blog

Duo + Blumira: Identity, Monitoring & Threat Detection
Read More
Replace Your SIEM: Traditional vs. Modern SIEM
Read More
Threat Analysis: PowerShell Malicious Activity
Read More
Hands in the Honeypot: Detecting Real Security Threats
Read More
SecOps, Simplified: Part 3 – Security Orchestration, Automation and Response
Read More
SecOps Simplified, Part 2: Security Tools – Is More Better?
Read More
How to Optimize Windows Logging for Security
Read More
SecOps Simplified, Part 1: SIEM…Now Without the Headache!
Read More
Is Zoom Secure? Five Best Security Practices
Read More
Customer Story: Greenleaf Trust
Read More
Demo: Set Up Blumira With Third-Parties
Read More
Demo: Set Up Palo Alto Firewall With Blumira
Read More
Honeypots: Understanding Their Role in Cybersecurity
Read More
Customer Story: National Machinery Detection & Response Case Study
Read More
Customer Story: Greenleaf Hospitality: Threat Detection Case Study
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.