“Entra”sting Roles You’ll Want to Know About
Description and overview of Entra ID roles that defenders may not be actively aware of fully, including a script to help audit assignments.
Read MoreQuick Cybersecurity Wins for the Public Sector
Boost endpoint security with quick and powerful changes such as revising desktop protocols, deploying Sysmon, and utilizing grant programs.
Read MoreGetting Started with Sysmon: Configuration and Best Practices
Unlock deeper insights into Windows system activity with Sysmon. Learn how to balance detailed logging with your security needs.
Read MoreReal-World Examples of Detecting Attacks with Sysmon
Learn how Sysmon's detailed logging of system, process and command line activity reveals threats that bypass standard Windows logging.
Read MoreSocial Engineering: The Human Element in Cybersecurity
Learn how the NIST framework provides guidance for avoiding social engineering attacks on your organization.
Read MoreSMBs: Level Up Cybersecurity With NIST and XDR
Small-to-Medium-sized businesses are especially susceptible to cyberattacks. Level up your business' security with NIST & XDR from Blumira.
Read More5 Ways to Counteract Increasing Cyber Insurance Rates
Cyber insurance premiums are skyrocketing. Learn five ways to proactively strengthen security, reduce risks, and lower costs to obtain affordable coverage.
Read MoreHow To Detect File Changes in Windows Server
What Do File Changes Indicate? What attacks can file changes lead to? Learn more in this article by the Blumira SecOps team.
Read MoreThe Hedgehog Defense – Default Apps
This small change can prevent malware from running in your network and it's not related to any security products!
Read MoreSo you think you need a SOC?
For most SMBs, building an in-house SOC is complex and costly. Automated detection and response from Blumira is what you need.
Read More