Blumira Blog
Security Trends and Info
10 min read
| February 27, 2023
Top 10 XDR Definitions | Blumira: Extended Detect & Response
Read More
Security How-To
6 min read
| February 24, 2023
How Endpoint Isolation Locks Down Cyber Attacks
Read More
Security Trends and Info
2 min read
| February 23, 2023
Top 5 Tools for Microsoft Products
Read More
Security How-To
10 min read
| February 17, 2023
Top 5 Steps For SMB Endpoint Security Success
Read More
Security Trends and Info
12 min read
| February 7, 2023
What Are Event Logs and Why Do They Matter?
Read More
Blumira News
4 min read
| January 17, 2023
Blumira Agent: SMB Endpoint Security
Read More
SIEM XDR
19 min read
| January 17, 2023
New Feature Release: Blumira Agent – Endpoint Security For SMBs
Read More
Product Updates
3 min read
| January 17, 2023
Blumira Agent Demo: SMB Endpoint Security
Read More
Security Alerts
14 min read
| January 13, 2023
How To Navigate Microsoft 365 Audit Logs
Read More
Product Updates
3 min read
| January 5, 2023
20-Minute Live Demo: Blumira Agent
Read More
Security How-To
18 min read
| January 4, 2023
How To Manage Windows Firewall with GPOs
Read More
Security How-To
18 min read
| December 23, 2022
Top 18 Tips to Secure SSH on Linux
Read More
Security How-To
19 min read
| December 23, 2022
How To Use Nmap To Scan For Open Ports
Read More
Blumira News
8 min read
| December 22, 2022
Blumira Earns G2’s Best Support Award For The 10th Consecutive Time
Read More
Security Trends and Info
15 min read
| December 20, 2022
Top Five Cloud Security Threats, Risks, and Challenges in 2023
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.