Posts by Thu Pham
About the Author
Thu has over 15 years of experience in the information security and technology industries. Prior to joining Blumira, she held both content and product marketing roles at Duo Security, leading go-to-market (GTM) and messaging for the portfolio solution Cisco Zero Trust. She holds a bachelor of science degree in journalism and advertising.

Security Alerts
5 min read
| June 23, 2020
RDP Risk: Ransomware Targets Manufacturing and Energy Plants
Read More
Security Trends and Info
5 min read
| June 17, 2020
Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles
Read More
Security How-To
1 min read
| June 16, 2020
How to Increase Windows Log Visibility: A Tutorial
Read More
Security Trends and Info
5 min read
| June 16, 2020
Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3
Read More
Security Alerts
9 min read
| June 15, 2020
Top Security Threats: Lateral Movement
Read More
Security Alerts
4 min read
| June 11, 2020
Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2
Read More
SIEM XDR
6 min read
| June 9, 2020
Automating Detection and Response With Cisco Firewalls & VPN
Read More
Security How-To
7 min read
| June 8, 2020
Logmira: Windows Logging Policies for Better Threat Detection
Read More
Security How-To
2 min read
| June 3, 2020
Windows Logging Tips for Better Threat Detection - On-Demand
Read More
Security Trends and Info
9 min read
| May 28, 2020
Seeking a SIEM Alternative? Choose Automation
Read More
Security Alerts
9 min read
| May 27, 2020
Top Security Threats: Detecting Ransomware Tactics
Read More
Customer Success Stories
9 min read
| May 23, 2020
Customer Story: Securing Merit Network with Blumira’s Advanced Solutions
Read More
Security Trends and Info
2 min read
| May 20, 2020
Replace Your SIEM With Automated Detection & Response
Read More
Security Alerts
2 min read
| May 19, 2020
Protecting Against the Rise in Remote Access Attacks - On-Demand
Read More
Security Trends and Info
3 min read
| May 14, 2020
What is a Traditional SIEM?
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.