Top Five Security Threats You Should Be Detecting
A basic primer on some of the top attacker techniques you might not be catching - from ransomware to brute-force attacks - based on Blumira detections.
Read MoreBlumira’s Threat Hunting Playbook
Blumira automates threat hunting to save clients countless hours of security analysis - here's our playbook for efficiently finding network threats.
Read MoreHow To Choose a SIEM For Small Business
Small businesses often struggle to find a SIEM that's not overly complex and expensive. Here's what small teams can prioritize to find the right fit.
Read MoreAnalysis of a Threat: PowerShell Malicious Activity
An in-depth breakdown of an analysis of a real threat detected by Blumira and our recommended security mitigations.
Read MoreHands in the Honeypot: Detecting Real Security Threats
What is a honeypot? Here's how to set up a honeypot with Blumira to help you detect and stop network intruders.
Read MoreDetection as an Effective Strategy for Cyber Attacks
When it comes to cyber attacks, developing a strategy and being prepared is half the battle. Here’s what you need to know about keeping your company’s data safe in the event of a cyber attack, and how Blumira can help.
Read More