Humio Staff

One engineer. One day. One petabyte of log data.
Start Logging Everything: Humio Community Edition Series
Automate Your Cloud Operations With Humio and Fylamynt
Accelerate Troubleshooting, Forensics and Response With Fast and Efficient Search
CrowdStrike Falcon Pro for Mac Achieves Highest Score in AV-TEST MacOS Evaluation for Business Users (March 2022)
Extend Threat Visibility With Humio's Integration With CrowdStrike's Indicators of Compromise (IOCs)
Why Actionable Logs Require Sufficient History
Introducing The Nest, by Humio
How Humio Outpaces Traditional Logging Solutions and Leaves Competitors in the Dust
Top 6 financial services log management use cases
Mind the MPLog: Leveraging Microsoft Protection Logging for Forensic Investigations
Introduction to the Humio Marketplace
Using Humio Log Management as the Heart of a SIEM
How to Sniff Out (and Block) BloodHound Attacks
Detecting and Mitigating NTLM Relay Attacks Targeting Microsoft Domain Controllers
How Humio Index-free Log Management Searches 1 PB in Under a Second
Set Up Your Logs for Better Insight: Make Logs First-class Citizens In Your Codebase
7 Things to Know About Index-free Technology
GDPR Enforcement is Right Around the Corner — Is Your Organization Prepared?
CROWDSTRIKE FALCON XDR: Extending Detection and Response — The Right Way
Everything You Need to Know About Securing Containers With Falcon
Humio at Lunar Way: Log Management for a Kubernetes and Cloud Native Environment
Humio at MSU: Real-time Observability to Identify and Investigate Security Threats
The 5 Steps of Log Management: Essential Steps to Improve Observability, Enhance Security, and Monitor System and Application Performance
Falcon Complete and CrowdStrike Adversary Emulation Pen Testing Recognized as “Cyber Catalysts” in Marsh Cyber Risk Evaluation
Observability and Your Scrum Team: Break Down Silos and Promote Agility
Humio at FreeAgent: Transforming Fintech with Observability and Empowering Transition to Cloud Hosting
Convolutional Neural Networks Are MALE Models for PE Malware
The Hoot Podcast (Episode 22): Humio at Vijilan with Kevin Nejad, Founder and CEO
Building a String-Based Machine Learning Model to Detect Malicious Activity
The Hoot Podcast (Episode 33): Financial Services Roundtable
The Hoot Podcast (Episode 35): Humio at Bloomreach with Junaid Sheriff
Recognizing the Resilience of the CrowdStrike Community
The Hoot Podcast (Episode 19): Humio with Miguel Adams, Government Agency Security Engineer
Podcast: CrowdStrike CTO Michael Sentonas Shares His Thoughts on Humio and how CrowdStrike is Addressing the Complexity of the Threat Landscape
CrowdStrike Congressional Testimony: 5 Recommendations to Secure the Public Sector
Why We Chose Elm for Humio’s Web UI
Large-Scale Endpoint Security MOLD Remediation
Observability (Re)defined
What is Cloud Native, Anyway?
Humio at Decisiv: An Industrial Internet of Things Company Reduces Log Management Costs by 37%
Three Key Features of Log Management for Cloud Native Systems
Optimizing an Elm Library
Intermex Reduces Critical Vulnerabilities by 98% with Falcon Exposure Management
Seven ways to think about observability
How Human Intelligence Is Supercharging CrowdStrike's Artificial Intelligence
Humio at Lunar: Log Management for a Kubernetes and Cloud Native Environment
Increasing Relevance of Access Broker Market Shown in Improved ECX Model
CrowdStrike Falcon® Platform Summer Release: Delivering HOT New Features
Humio at Decisiv: An Industrial Internet of Things Company Reduces Log Management Costs by 37%
How Humio Outpaces Traditional Logging Solutions and Leaves Competitors in the Dust
Humio Brings Streaming Observability to Fal.Con 2021
HTTP iframe Injecting Linux Rootkit
The Evolution of Protected Processes Part 2: Exploit/Jailbreak Mitigations, Unkillable Processes and Protected Services
A More Modern Approach to Logging in Go
Humio at M1 Finance: Real-time Observability for Intelligent Financial Solutions
Modern Infrastructure Requires Modern Cloud Security