“Entra”sting Roles You’ll Want to Know About
Description and overview of Entra ID roles that defenders may not be actively aware of fully, including a script to help audit assignments.
Read More4 Myths of XDR – The Truth about Detection and Response
Discover the truth about XDR – debunking common myths, from automatic improvement to internal management challenges.
Read MoreThe 5 Most Annoying Things About Buying Cybersecurity Tools
B2B sales cycles are long, complex, and full of annoying steps buyers hate. Luckily, Blumira offers a hassle-free buying experience.
Read MoreReal-World Examples of Detecting Attacks with Sysmon
Learn how Sysmon's detailed logging of system, process and command line activity reveals threats that bypass standard Windows logging.
Read MoreSocial Engineering: The Human Element in Cybersecurity
Learn how the NIST framework provides guidance for avoiding social engineering attacks on your organization.
Read MoreCatch Threats at Every Turn with Blumira SIEM
Blumira SIEM detects threats at every stage, from reconnaissance to impact, and reduces alert noise through automation.
Read MoreThe Hedgehog Defense – Default Apps
This small change can prevent malware from running in your network and it's not related to any security products!
Read MoreSo you think you need a SOC?
For most SMBs, building an in-house SOC is complex and costly. Automated detection and response from Blumira is what you need.
Read MoreBlumira Joins MES IT Leadership Network: Better Supporting Our Midsize Customers
Blumira recently joined the MES IT Leadership Network. This online community helps IT professionals network with peers and share best practices.
Read MoreWhy You Should Migrate From On-Premise Exchange
Migrating from on-prem exchange can be a daunting task. See why it's important based on recent attacks, vulnerabilities, and best practices.
Read More