Skip to content

    Blumira Blog

    Security Trends and Info
    10 min read | February 27, 2023

    Top 10 XDR Definitions | Blumira: Extended Detect & Response

    Read More
    Security How-To
    6 min read | February 24, 2023

    How Endpoint Isolation Locks Down Cyber Attacks

    Read More
    Security Trends and Info
    2 min read | February 23, 2023

    Top 5 Tools for Microsoft Products

    Read More
    Security How-To
    10 min read | February 17, 2023

    Top 5 Steps For SMB Endpoint Security Success

    Read More
    Security Trends and Info
    12 min read | February 7, 2023

    What Are Event Logs and Why Do They Matter?

    Read More
    Blumira News
    4 min read | January 17, 2023

    Blumira Agent: SMB Endpoint Security

    Read More
    SIEM XDR
    19 min read | January 17, 2023

    New Feature Release: Blumira Agent – Endpoint Security For SMBs

    Read More
    Product Updates
    3 min read | January 17, 2023

    Blumira Agent Demo: SMB Endpoint Security

    Read More
    Security Alerts
    14 min read | January 13, 2023

    How To Navigate Microsoft 365 Audit Logs

    Read More
    Product Updates
    3 min read | January 5, 2023

    20-Minute Live Demo: Blumira Agent

    Read More
    Security How-To
    18 min read | January 4, 2023

    How To Manage Windows Firewall with GPOs

    Read More
    Security How-To
    18 min read | December 23, 2022

    Top 18 Tips to Secure SSH on Linux

    Read More
    Security How-To
    19 min read | December 23, 2022

    How To Use Nmap To Scan For Open Ports

    Read More
    Blumira News
    8 min read | December 22, 2022

    Blumira Earns G2’s Best Support Award For The 10th Consecutive Time

    Read More
    Security Trends and Info
    15 min read | December 20, 2022

    Top Five Cloud Security Threats, Risks, and Challenges in 2023

    Read More