Blumira Blog

RDP Risk: Ransomware Targets Manufacturing and Energy Plants
Read More
SecOps Simplified, Part 4: Staffing – Haven’t I Seen This Movie Before?
Read More
Cyber Warfare 1: BYOD, Social Influence & Auto Vehicles
Read More
How to Increase Windows Log Visibility: A Tutorial
Read More
Threat Detection & Response Maturity: Modern Cybersecurity Practices, Part 3
Read More
Top Security Threats: Lateral Movement
Read More
Common Threat Vectors & Industrial Control Systems (ICS): Modern Cybersecurity Practices, Part 2
Read More
How to Mitigate Against the SMBleed Vulnerability & POC Exploit
Read More
Automating Detection and Response With Cisco Firewalls & VPN
Read More
Logmira: Windows Logging Policies for Better Threat Detection
Read More
Windows Logging Tips for Better Threat Detection - On-Demand
Read More
Seeking a SIEM Alternative? Choose Automation
Read More
Top Security Threats: Detecting Ransomware Tactics
Read More
Detecting RDP Attacks With Honeypots: Blumira Data Insights
Read More
Customer Story: Securing Merit Network with Blumira’s Advanced Solutions
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.