How To Detect AS-REP Roasting With Blumira
Based on a customer’s request, Blumira was able to create a detection built into platform to protect against AS-REP Roasting. Learn how.
Read MoreWhat To Log In A SIEM: Logging Best Practices
How do you know where to start when it comes to logging security events? We'll take you through 10 log sources you should prioritize in a SIEM.
Read MoreBest Practices For Configuring Firewall Rules
When securing down firewall rules, there are several best practices you should follow and ports you should almost always block
Read MoreWhy Antivirus Is Not Enough To Prevent Ransomware
Antivirus is a crucial component of any security stack, but it's not a silver bullet. Learn about why antivirus doesn't fully protect against ransomware.
Read MoreRansomware Protection: Top 7 Best Practices
Here are 7 ransomware protection tips using a variety of security practices and security layers to help you prevent a ransomware attack.
Read MoreHow To Test Antivirus and EDR Software: A Complete Guide
It's important to test antivirus software to see if it can detect malicious activity. Two testing phases ensure that tools can handle security threats.
Read MoreHow to Install & Configure Microsoft LAPS
Get a step-by-step walkthrough of how to install & configure Microsoft LAPS to limit administrative privileges to only those who need them.
Read MoreIncident Response Strategies for Ransomware
Ransomware is increasingly becoming a more common threat, which is why it's critical to have an incident response plan for ransomware attacks.
Read More4 Cloud Security Monitoring Best Practices
Follow these cloud security monitoring best practices to be strategic, gain visibility into your cloud environment and provide layers of security that will protect against malicious threats.
Read MoreHow To Detect Password Lists With Blumira
When users engage in risky behavior, security teams should know about it. Here's how Blumira can detect and alert you about password lists.
Read More