HarfangLab - The Blog

All posts

Loading...
EPP - HarfangLab Antivirus
Product

HarfangLab EPP: everything you need to know about our antivirus

The HarfangLab Guard package combines the detection capabilities of an EDR and EPP to empower analysts more than ever. Let’s…

4 min
Crisis exercises - Pitfalls and bias to avoid
Crisis management

Crisis management exercises: pitfalls and biases to avoid

Cyber attacks are inevitable, and crisis management exercises can help you prepare for them. But they, too, require careful preparation!…

7 min
Cybersecurity - Healthcare
Cyber strategy

Cybersecurity in healthcare sector

What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…

6 min
Organizing a cybersecurity crisis exercise
Crisis management

Organizing a cybersecurity crisis exercise

When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…

7 min
Rust
Product

How and why we adopted Rust to develop our EDR

How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…

8 min
Cybersecurity Insurance
Cyber strategy

Insurance: why improving cybersecurity means optimizing budget

Why take out cybersecurity insurance, what does it cover, and what does it mean for cybersecurity budget.

7 min
Osint renseignement menace cyber
Methodology

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution

This article was originally written in French and has been automatically translated into English.   Cyber threat intelligence is the…

7 min
MITRE - EDR evaluation
Cyber strategy

MITRE ATT&CK to evaluate an EDR

MITRE ATT&CK not only provides a framework for evaluating detection capabilities, threat hunting, risk management, threat intelligence… it also provides…

4 min
Cybersecurity - Combine EDR and EPP
Product

Cybersecurity: why combine EDR and EPP

HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…

5 min
Cybersecurity Gender gap
Cyber strategy

A practical way to bring more women to cybersecurity

It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…

7 min
KPIs to assess IT fleet cybersecurity
Methodology

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

8 min
Sigma - YARA - open format rules for cybersecurity
Product

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

6 min