Shooting at a Moving Target, Together lightreading.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from lightreading.com Daily Mail and Mail on Sunday newspapers.
By Ryan Naraine on February 19, 2021
NEWS ANALYSIS: The strategic positioning to own and control the massive data lakes powering enterprise security programs took another expensive turn with CrowdStrike announcing it would shell out $400 million to buy early-stage log analytics start-up Humio.
The $400 million cash-and-equity deal represents a massive exit for Humio, a company that raised just $32 million in two funding rounds led by Dell Technologies Capital. Humio has about 70 employees in the U.S., London and Denmark and has found a niche as an affordable but powerful alternative to bigger vendors in the lucrative log analytics space.
The CrowdStrike/Humio marriage signals a continuation of the trend by anti-malware vendors to beef up data logging and indexing capabilities to cash in on “proactively-collect-and-store-everything” policies at larger enterprises.
One silver lining that has come out of the SolarWinds (Solorigate) incident is the huge amount of new security blogs and content that Microsoft and other vendors have published. Even if your organization was not directly affected by the attack, you are probably having to answer questions about what you and your team are doing to protect your network from this sort of attack. These resources will prepare you to respond appropriately.
Microsoft Solorigate Resource Center
The Microsoft Solorigate Resource Center is an ever-expanding resource of information and investigation techniques. Take the time to review these links. If you are a Microsoft 365 or Azure Active Directory (AD) customer, review the Azure AD workbook to assess SolarWinds risk. You may need to first set up an Azure workspace and then Azure AD logs with Azure Monitor logs to access the workbook. Here’s how: