HarfangLab
The Blog

Loading...
Cybersecurity Solution - Security Platform

The Cloud Sovereignty Framework: a first step toward assessing sovereignty

In October 2025, the European Commission published a document entitled Cloud Sovereignty Framework. It defines the sovereignty criteria, assurance levels,…

Read more
4min
Cyber strategy
Cybersecurity YARA and Sigma rules

How fragmented endpoint strategies derail Attack Surface Management

Managing your attack surface is impossible without full visibility over your workspace. Unfortunately, fragmented endpoint strategies are a major blind spot.

Read more
2min
Cyber strategy
Cybersecurity - Security Platform

Email account compromise: assessing and containing an incident

How should you respond if your information system is affected by a security incident involving the compromise of one or…

Read more
8min
Methodology
Cybersecurity Platform MITRE Evaluations

Unify your Security Operations Center and Vulnerability Operations Center

Vulnerability management is growing increasingly complex as the number of CVEs and the attack surface expand and evolve. Including vulnerability…

Read more
4min
Methodology
Cybersecurity Platform

Artificial intelligence and cybersecurity: our experts’ predictions for 2026

The information war has marked 2025. Manipulation and disinformation are part of world leaders’ arsenals, and artificial intelligence is fully…

Read more
4min
Cyber strategy
On-Premises Cybersecurity Solution - Workspace Security Platform

HarfangLab certified by the BSI

HarfangLab is the first EDR certified by the BSI, the Federal Office for Information Security. What are the steps in…

Read more
3min
Product
Cybersecurity Platform

Cyber Threat Research: 2025 wrap up

Gamaredon, SadFuture, Ivanti CSA vulnerabilities, UAC-0057… what did HarfangLab CTR Team discover in 2025?

Read more
4min
Cyber strategy
Cybersecurity - Security Platform

CISO, CEO, CIO: Shared agendas and priorities for 2026

CISOs are at the heart of cyber, technical, and business challenges. How can they develop a security strategy that addresses…

Read more
6min
Cyber strategy
File integrity monitoring

Ransomware: A Threat Landscape Study

Advanced techniques, cybercrime syndicates, and the sheer number of attacks: ransomware is evolving constantly and rapidly. In the face of…

Read more
10min
Cyber strategy
Cybersecurity - Workspace Security Platform Setup

Workspace Security Platform: A response to changing cyber practices

What is a Workspace Security Platform?  According to Gartner, a Workspace Security Platform brings together the techniques and tools used…

Read more
7min
Cyber strategy
Cybersecurity Platform

NIS 2: prerequisites, recommendations and tips for relevant entities

The NIS 2 (Network and Information Security) Directive, published in the Official Journal of the European Union in December 2022,…

Read more
10min
Regulation