Humio

humio

Log management right of boom

You’ve likely heard the phrase “left and right of boom” in relation to the activities that take place before and after a cybersecurity incident. Log management plays a critical role both left and right of boom. I previously explained how log management left of boom helps reduce the risk of an attack. In this blog post, we’ll take a closer look at the value of log management right of boom, or after an attack, when you’re in incident response mode.

humio

Observability and your Scrum team

A Scrum master has two sets of responsibilities. The first responsibility, which most Scrum masters concentrate on, is to facilitate the Scrum process within the development team. The second and equally important responsibility is to promote the Scrum process externally. In other words, to educate the business on what it means to be agile. The observability that comes from logging everything can help with this often-neglected task.

humio

SOC Prime and Humio Integration

Humio and SOC Prime have built a deep set of platform integrations that simplify security operations for our joint customers. The SOC Prime Threat Detection Marketplace contains over 5,700 detection rules for Humio and with a single click customers can now push these rules to their Humio service. With SOC Prime’s Continuous Content Management feature customers can have new detection rules that match a defined criteria automatically pushed to their Humio service.

humio

Log management left of boom

The phrase “left and right of boom” has been adopted by the cybersecurity industry as a way to talk about security measures before and after an incident. As we explained in session 3 of our Advanced Log Management Course, log management plays a critical role both left and right of boom. In this blog post, we’ll take a closer look at log management best practices left of boom. Next week, we’ll look at right of boom.

humio

In the rush to adopt machine learning, don't forget to empower human intelligence

Machine learning has gained popularity in cybersecurity, and for good reason: in the never-ending race against dwell times, security professionals are looking for an advantage. While machine learning can help reduce the mean time to detect and respond to a threat, organizations should be careful not to rely so much on machine learning that they forget to empower their most important asset: human intelligence.

humio

Top five ways logging everything will change your organization

At Humio, we’ve transformed log management by making it affordable to log everything. What’s even more exciting, however, is the transformation that occurs in our customers’ organizations when they begin using Humio. No longer bound by budget restrictions, organizations are free to uncover the hidden value in their log data. Here are just five of the changes that you can expect when you log everything.

humio

A look at 4 security log management use cases

It’s a mistake to think log management tools are a simple reactive security tool. A fully modern log management platform does more than just facilitate threat hunting and forensics. Optimal log management helps generate new insights from the data contained in your logs by providing customizable dashboards to view and explore them. Additional features including alerts, and automation speed up processes and make a security team more responsive in real time.