In my opinion, the safest way to expose Blue Iris to the internet is by setting up a reverse proxy. A reverse proxy exposes just HTTP or HTTPS ports (80, and 443) and doesn't give an attacker much of an idea what's behind those ports, reducing their ability to direct an attack against specific software.
If you're willing to run pfSense as a firewall/router, pfSense can run ACME to automatically fetch free SSL certificates from Lets Encrypt, and can also install haproxy natively to let you setup the reverse proxies. pfSense is an elegant solution, but it's no joke to setup and learn. Worthwhile to setup and learn, though.
Barring that, you could also spin up a Linux virtual machine of your choosing in Hyper-V on the same system that runs Blue Iris. Such a system would need a negligible amount of CPU time and 512 MB of RAM, or less. Then you can install NGINX or Apache and configure it to use a reverse proxy. The Linux install could even be configured to use ACME to automatically get SSL certs from Lets Encrypt, if you desired. This is a bit easier to setup than pfSense, but still requires knowledge of setting up virtual machines in Hyper-V, loading and then using a Linux distro, following instructions to install packages on that distro, and finally configuring your webserver correctly.
Unfortunately, achieving security requires effort. But in this day and age knowing how to do any/all of the above things is a useful way to avoid being the low-hanging fruit that gets picked...
If you're willing to run pfSense as a firewall/router, pfSense can run ACME to automatically fetch free SSL certificates from Lets Encrypt, and can also install haproxy natively to let you setup the reverse proxies. pfSense is an elegant solution, but it's no joke to setup and learn. Worthwhile to setup and learn, though.
Barring that, you could also spin up a Linux virtual machine of your choosing in Hyper-V on the same system that runs Blue Iris. Such a system would need a negligible amount of CPU time and 512 MB of RAM, or less. Then you can install NGINX or Apache and configure it to use a reverse proxy. The Linux install could even be configured to use ACME to automatically get SSL certs from Lets Encrypt, if you desired. This is a bit easier to setup than pfSense, but still requires knowledge of setting up virtual machines in Hyper-V, loading and then using a Linux distro, following instructions to install packages on that distro, and finally configuring your webserver correctly.
Unfortunately, achieving security requires effort. But in this day and age knowing how to do any/all of the above things is a useful way to avoid being the low-hanging fruit that gets picked...