HarfangLab - The Blog

All posts

Loading...
Osint renseignement menace cyber
Methodology

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution

This article was originally written in French and has been automatically translated into English.   Cyber threat intelligence is the…

7 min
MITRE - EDR evaluation
Cyber strategy

MITRE ATT&CK to evaluate an EDR

MITRE ATT&CK not only provides a framework for evaluating detection capabilities, threat hunting, risk management, threat intelligence… it also provides…

4 min
Cybersecurity - Combine EDR and EPP
Product

Cybersecurity: why combine EDR and EPP

HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…

5 min
Cybersecurity Gender gap
Cyber strategy

A practical way to bring more women to cybersecurity

It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…

7 min
KPIs to assess IT fleet cybersecurity
Methodology

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

8 min
Sigma - YARA - open format rules for cybersecurity
Product

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

6 min
Telemetry - Cybersecurity
Product

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

7 min
Cybersecurity: Best-of-breed vs. All-in-one tool
Cyber strategy

Cybersecurity: why choose a Best-of-Breed approach?

When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…

5 min
Cyber resilience 7 keypoints
Methodology

Cyber resilience in 7 key points

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

7 min
Offensive vs Defensive AI - Cybersecurity
Methodology

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

2 min
kpi-deploiement-edr
Methodology

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

4 min
customer success management in cybersecurity
Cyber strategy

The role of human support between software editors and users

The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

4 min