Aarhus, Denmark
Oct 1, 2021   |  By Huzaifa Dalal
An indicator of compromise (IOC) is a piece of digital forensics that suggests that an endpoint or network may have been breached. The ability to monitor for indicators of compromise is critical to a comprehensive cybersecurity strategy, bringing improved detection accuracy and speed, along with faster remediation times.
Aug 20, 2021   |  By Humio
We are excited to announce the availability of a new integration with Mimecast which allows Humio customers to ingest email security logs from their Mimecast email security service. Email is the top initial attack vector, with phishing campaigns responsible for many damaging cyber attacks, including ransomware.
Aug 9, 2021   |  By Gartner Report
For organizations of every size, cybersecurity has become both a challenge and a top priority. Many businesses may not realize they already have some tools in their arsenal to help with the challenge of cybersecurity. In particular, central log management is often overlooked and undervalued when it comes to being a tool that helps with an organization’s threat management and compliance capabilities and requirements.
Jul 28, 2021   |  By Cinthia Portugal
Ransomware attacks, the malicious code that attackers use to encrypt data or lock users out of their devices, have been rampant and are on the rise globally. The largest ransomware payout thus far in 2021 was made by an insurance company at $40 million. A more recent attack occurred in early July and was launched by a group called REvil. The immediate victim was a Florida company, Kaseya, that provides software to companies that manage technology for thousands of smaller firms.
Jul 26, 2021   |  By Simon Simonsen
Cybersecurity is front and center today for every business regardless of size or industry. Major ransomware attacks and data breaches seem to make headlines just about every day. Sophisticated attackers and cybercriminals are always finding new ways to extort businesses, steal confidential data, and wreak havoc. A quick read of the CrowdStrike 2021 Global Threat Report will surely give you cause for concern.
Jun 28, 2021   |  By Huzaifa Dalal
I recently had the pleasure of speaking with CrowdStrike CTO Michael Sentonas for Episode 47 of our The Hoot podcast series. Michael has 20+ years of cybersecurity experience and played a lead role in the Humio acquisition so it was great to get his take on why CrowdStrike acquired Humio and how the acquisition will help customers. Michael also shared some of his thoughts on the latest security trends, current chip shortage and news of the day.
Jun 24, 2021   |  By Huzaifa Dalal
I recently had the pleasure of chatting with Michigan State University Network Security Engineer David Graff for Episode 46 of our Hoot podcast series. MSU uses Humio for SecOps log management so it was great to get his first-hand perspective on how Humio helps the security team improve visibility and streamline forensics.
Jun 3, 2021   |  By Cinthia Portugal
Just a few weeks ago, President Biden and the White House put out an executive order on improving cybersecurity resilience after the country’s public and private sectors continue to be plagued by cyber attacks. Not long after this, Microsoft confirmed that the culprits behind the recent SolarWinds hack are at it again, striking more than 150 government agencies and organizations across the globe.
May 25, 2021   |  By Humio Staff
Last week President Biden issued a widely publicized executive order to improve cybersecurity and protect federal government networks. The order comes in the wake of several prominent attacks against public-sector and private-sector infrastructure in recent months including last week’s Colonial Pipeline ransomware attack that disrupted fuel supplies and triggered gasoline shortages in the Southeast.
May 20, 2021   |  By Ken Greene
Threat hunting can seem like an intimidating discipline to many. Something that is shrouded in mystery and the preserve of highly experienced and trained cyber specialists in companies with huge resources. Operating a world-class 24/7 threat hunting team like the experts in CrowdStrike’s Falcon OverWatch is far from simple and in reality many companies never even try. We want to encourage people who are new to threat hunting to give it a go and make it easy to get started.
Aug 20, 2021   |  By Humio
This video steps the student through a scenario of adding LDAP groups to Humio. First the exercise is prototyped with the api-explorer (or GraphiQL).
Jun 24, 2021   |  By Humio
This video will step you through the configuration settings and steps to help you use OKTA as an authentication method for accessing Humio self managed.
Jun 21, 2021   |  By Humio
This video will step you through the configuration settings and steps to help you use LDAP as a authentication method for accessing Humio. There is also a convenient test that allows you to work with your configuration before connecting to a Humio instance.
Feb 25, 2020   |  By Humio
A summary of Humio features presented at the RSA Conference 2020, February 24-28, 2020.
Jan 28, 2021   |  By Humio
The digital landscape continues to grow increasingly complex. The technologies and trends enterprises embrace as they accelerate their digital transformation - remote work, cloud computing, microservices, Internet of Things - all increase the complexity of the IT environment and, in turn, increase security risk and operational costs.

Send, search, and visualize all logs instantly, easily, and affordably, On-Premises or in the Cloud.

Humio is a time-series log management solution for unrestricted, comprehensive event analysis, On-Premises or in the Cloud. With 1TB/day of raw log ingest/node, in-memory stream processing, and live, shareable dashboards and alerts, you can can instantly and in real-time explore, monitor, and visualise any system’s metrics.

Your most important data at your fingertips, instantly:

  • All of your data: Humio ingests log data as quickly as it comes, regardless of bursts.
  • When you need it: Real-time querying brings data to your fingertips, instantly.
  • How you want it: Experiment, find what you need, and share it with your team.

Data from everywhere. At any scale, for any team.