HarfangLab
The Blog

Basic rules for good IT hygiene
The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

Tips to set up an effective backup system
Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

Why set up crisis exercises?
As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

Phishing: sharing best practices to protect Information Systems
From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution
This article was originally written in French and has been automatically translated into English. Cyber threat intelligence is the…

5 KPIs for assessing and monitoring IT assets security
Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

Cyber resilience in 7 key points
In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

Cybersecurity: Offensive vs. Defensive AI
Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

Key metrics to evaluate EDR performance
Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

What skills do SOC analysts need today?
The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

Cybersecurity: choosing an EDR, key points to assess
How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

Why should organizations care about TDIR?
TDIR (Threat Detection Investigation Response) is a new approach to enhancing the analysis and action capabilities of SOC Managers.