Skip to content

    Blumira Blog

    Security How-To
    29 min read | September 9, 2020

    Threat Detection & Response Assessment

    Read More
    Product Updates
    4 min read | September 9, 2020

    Securing Remote Work: Blumira & Crowdstrike Integration

    Read More
    Security How-To
    3 min read | September 8, 2020

    Blumira's Security Advisors Series: Running Lean Security Operations

    Read More
    Compliance Security Frameworks and Insurance
    2 min read | September 2, 2020

    Beyond Compliance: Real Talk With Jamie – Good Intentions

    Read More
    Compliance Security Frameworks and Insurance
    2 min read | August 27, 2020

    Beyond Compliance: Real Talk With Jamie – Set It & Forget It

    Read More
    Security How-To
    4 min read | August 25, 2020

    How to Test Your SIEM’s Detections

    Read More
    Security How-To
    3 min read | August 24, 2020

    Blumira's Security Advisors Series: How to Easily Detect Lateral Movement

    Read More
    Compliance Security Frameworks and Insurance
    2 min read | August 20, 2020

    Beyond Compliance: Real Talk With Jamie – Third-Party Risk

    Read More
    SIEM XDR
    1 min read | August 19, 2020

    Blumira Product Demo

    Read More
    Life at Blumira
    4 min read | August 13, 2020

    Free-4-All: Prioritizing Mental Health in an Era of Remote Work

    Read More
    Compliance Security Frameworks and Insurance
    1 min read | August 12, 2020

    Beyond Compliance: Real Talk With Jamie – Compliance Doesn’t Equal Security

    Read More
    Compliance Security Frameworks and Insurance
    3 min read | August 12, 2020

    Blumira’s Security Advisor Series: Balancing Compliance & Security

    Read More
    Compliance Security Frameworks and Insurance
    3 min read | August 11, 2020

    Blumira's Security Advisors Series: CMMC Compliance

    Read More
    Blumira News
    3 min read | August 11, 2020

    Blumira Raises New Round of Funding For Threat Detection & Response

    Read More
    Security Trends and Info
    7 min read | August 10, 2020

    Anatomy of a Targeted Phishing Attack

    Read More