HarfangLab
The Blog
Loading...

Methodologies and tools for mapping an information system
Information system mapping is as essential a task as it is overwhelming, because it is often a tedious, long-term undertaking.…

Air-gapped EDR: how does it work?
Air-gap: definition An air-gapped infrastructure is a computer system that is totally cut off from external networks to guarantee maximum…

DLL Sideloading: solutions to protect your workspace
From detecting the loading of suspicious libraries to blocking threats, how can you protect your workspace against DLL Sideloading attacks?

Cloud, On-Premises, Air-gapped: The impact of infrastructure on choosing your cybersecurity solution
The choice of cybersecurity tools, such as an EDR, must be consistent with the technical context, depending on whether an…

AI and cybersecurity: threats, responses, and future development
AI and security are bound for better or worse: cybercriminals are using it to attack faster and harder. In the…

MSSP services and benefits of a managed EDR
A Managed Security Service Provider (MSSP) operates cybersecurity solutions for organizations of any size. They provide peace of mind to…

Critical National Infrastructure (CNI) and Data Protection: from supply chain attacks to On-Prem defenses
Companies and public organizations are routinely targeted by cybercriminals and state-sponsored organizations alike, with attacks spanning ransomware, espionage-motivated intrusions, and…

On-Premises EDR: a guide to choosing the right tool
An On-Premises EDR is not always an option. The choice may be guided by data confidentiality issues or even be…

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection
File Integrity Monitoring aims to verify and analyze the integrity of critical files.

Basic rules for good IT hygiene
The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

GDPR: what are your cybersecurity obligations?
GDPR requires companies to protect personal data. But what exactly does this regulation mean for your organization?