
Sign up to save your podcasts
Or
This week, John talks with Miguel Adams, a security officer at a US government agency. Miguel shares his thoughts on why they chose Humio, and offers some suggestions for other agency personnel that are charged with keeping their infrastructure secure and resilient.
They use Humio to look for malicious activity, including indicators of compromise, adherence to policies, use of whitelisted ports and protocols, and behavior like lateral movement and elevation of privileges.
On a routine basis, we get indicators of compromise (IOCs), and we’re able to do that almost instantaneously with Humio. The return is within a matter of seconds or minutes, whereas before it took us half or day or more.
- Miguel Adams
We discuss how budgets impact planning, and what Miguel is doing to make sure he has up-to-date tools and an experienced staff.
Tune in to the podcast to learn more about Miguel’s environment, and hear his tips on implementing and running Humio.
5
11 ratings
This week, John talks with Miguel Adams, a security officer at a US government agency. Miguel shares his thoughts on why they chose Humio, and offers some suggestions for other agency personnel that are charged with keeping their infrastructure secure and resilient.
They use Humio to look for malicious activity, including indicators of compromise, adherence to policies, use of whitelisted ports and protocols, and behavior like lateral movement and elevation of privileges.
On a routine basis, we get indicators of compromise (IOCs), and we’re able to do that almost instantaneously with Humio. The return is within a matter of seconds or minutes, whereas before it took us half or day or more.
- Miguel Adams
We discuss how budgets impact planning, and what Miguel is doing to make sure he has up-to-date tools and an experienced staff.
Tune in to the podcast to learn more about Miguel’s environment, and hear his tips on implementing and running Humio.