Posts by Mike Behrmann
Video - Resilient Relationship Security: Reduce Lost Connections
In this webinar, you will learn:
Read MoreAbout the Author
Mike served at the National Security Agency for seven years where he focused on leading computer network exploitation operations and was later deployed to the FBI Detroit Division’s Cyber Task Force as a Threat Analyst. He joined NetWorks Group in 2015 where he and Matt Warner established the company’s Managed Detection and Response (MDR) SaaS offering and later became the MDR Team Lead. From 2017 to 2020, Mike worked as a Sr. Security Operations Engineer with Domino’s in Ann Arbor. He rejoined Matt, Nick, Amanda and the rest of the Blumira family in early 2020 as the company’s Director of Security. Mike has earned numerous Global Information Assurance (GIAC) certifications over his career and holds advanced degrees in both International Affairs and Information Assurance.

CVE-2021-34481 Print Spooler Vulnerability
Read More
Blumira Accelerates Time to Detection to Milliseconds
Read More
Update Now: Microsoft Exchange Server Zero-Days
Read More
What You Need to Know: SolarWinds Supply Chain Malware Campaign
Read More
SecOps Simplified, Part 5: Speed & Visibility: The REAL Power Couple
Read More
SecOps Simplified, Part 4: Staffing – Haven’t I Seen This Movie Before?
Read More
How to Mitigate Against the SMBleed Vulnerability & POC Exploit
Read More
SecOps, Simplified: Part 3 – Security Orchestration, Automation and Response
Read More
SecOps Simplified, Part 2: Security Tools – Is More Better?
Read More
SecOps Simplified, Part 1: SIEM…Now Without the Headache!
Read More
Is Zoom Secure? Five Best Security Practices
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.