Product Update: New Detections for Microsoft 365 & Windows
Our latest rules detect insecure user activity, potentially malicious logins, security misconfigurations and more in Microsoft 365 and Windows.
Read MoreSecuring Microsoft 365: Protecting Against Business Email Compromise
Business email compromise scams, like phishing, are on the rise - learn how to detect and stop BEC attacks in your Microsoft 365 environment.
Read MoreTop 7 Cloud Security Best Practices For 2022
Follow these cloud security best practices to bring the same level of comfort and security that on-premises has into the cloud.
Read MoreWhy Email Forwarding is a Security Risk (And How to Detect)
Threat actors use email forwarding rules to access mailboxes and leak data in BEC attacks. Know the risks and how to detect new email forwarding rules.
Read MoreProduct Update: Microsoft 365 Cloud Security Monitoring
Learn about these new Blumira detections that help with Windows and Microsoft 356 cloud security monitoring.
Read More