“Entra”sting Roles You’ll Want to Know About
Description and overview of Entra ID roles that defenders may not be actively aware of fully, including a script to help audit assignments.
Read MoreQuick Cybersecurity Wins for the Public Sector
Boost endpoint security with quick and powerful changes such as revising desktop protocols, deploying Sysmon, and utilizing grant programs.
Read MoreHow to Select a SIEM for CrowdStrike
Learn why you'll need a SIEM for CrowdStrike and how to choose one that will play well with your existing environment.
Read MoreHow to Select a SIEM for Google Workspace
A SIEM for Google Workspace improves security, but it’s essential to find one that will play nicely with your existing environment.
Read MoreHow to Select SIEM for Microsoft 365
The right SIEM for Microsoft 365 isn't always Sentinel. Learn how to make a decision based on your security needs and budget.
Read MoreCloud SIEM Detection & Response for Cisco Umbrella
Securing the cloud can be a challenge for organizations, but Blumira easily integrates with Cisco Umbrella to help detect & respond to cloud security risks.
Read MoreMicrosoft Security Detections
Most orgs don’t know what Microsoft threats they should be monitoring for - these are the common misconfigurations & threats you should be able to detect.
Read MoreSecurity Detection & Response for Microsoft Office 365
Common detection and response playboooks for Microsoft Office 365 including anomalous, suspicious and threat-like behavior and activity
Read MoreSecuring Remote Work: Detection & Response With G Suite
Blumira secures productivity tools like G Suite and Office 365 to monitor for suspicious activity and indicators of potential internal and external threats.
Read MoreSecuring Remote Work: Blumira & Crowdstrike Integration
Secure your remote workforce by integrating Blumira with Crowdstrike's endpoint security tools for automated detection and response.
Read More