Posts by Kim Brown

Security How-To
6 min read
| February 6, 2024
Uncover Threats in Your Windows Environment with Sysmon
Read More
Security Trends and Info
3 min read
| February 1, 2024
Navigating the Complex XDR Landscape: A Guide for SMBs
Read More
Security Trends and Info
11 min read
| January 30, 2024
Ace the State and Local Cybersecurity Grant Program Application—Without Going Crazy
Read More
Security Trends and Info
3 min read
| January 23, 2024
Unveiling the Power of Sysmon: A Deep Dive into Threat Hunting
Read More
Security Trends and Info
3 min read
| January 16, 2024
5 Must-Have Cybersecurity Tools for Lean IT Teams
Read More
Blog
16 min read
| January 5, 2024
How Leaders Can Foster a Culture of Cybersecurity
Read More
Security Trends and Info
6 min read
| January 4, 2024
5 Key Takeaways for Healthcare Security IT Teams
Read More
Compliance Security Frameworks and Insurance
12 min read
| January 3, 2024
Choosing the Right Cloud SIEM for Government Cybersecurity & NIST
Read More
Security How-To
9 min read
| December 15, 2023
How to Get Cybersecurity Buy-in from Executive Leadership
Read More
SIEM XDR
2 min read
| December 14, 2023
Easy SIEM Delivering Quick Threat Detection for Improved Compliance
Read More
Security How-To
9 min read
| December 12, 2023
How Manufacturing Companies Can Prevent Cyber-Attacks
Read More
Security How-To
11 min read
| November 20, 2023
Blumira’s SMB Cybersecurity Checklist
Read More
Security Trends and Info
8 min read
| November 8, 2023
5 Cybersecurity Tips for Small IT Teams
Read More
Blumira News
5 min read
| November 1, 2023
Cybersecurity Innovator Blumira Bolsters Executive Team for Next Growth Phase
Read More
Security Trends and Info
2 min read
| October 19, 2023
Choosing the Right XDR Strategy
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.