HarfangLab
The Blog

Loading...
IT Hygiene for Cybersecurity

Basic rules for good IT hygiene

The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

Read more
8min
Methodology
Cybersecurity - Workspace Security Platform

Tips to set up an effective backup system

Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

Read more
3min
Methodology
Organise cybersecurity crisis exercises

Why set up crisis exercises?

As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

Read more
6min
Methodology
Phishing

Phishing: sharing best practices to protect Information Systems

From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…

Read more
3min
Methodology
Cybersecurity - OSINT

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution

This article was originally written in French and has been automatically translated into English.   Cyber threat intelligence is the…

Read more
7min
Methodology
Cybersecurity Metrics

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

Read more
8min
Methodology
Cyber Resilience

Cyber resilience in 7 key points

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

Read more
7min
Methodology
Cybersecurity - Offensive vs. Defensive AI

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

Read more
2min
Methodology
Cybersecurity Metrics

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

Read more
4min
Methodology
Cybersecurity SOC analysts

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

Read more
11min
Methodology
Cybersecurity Metrics

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

Read more
7min
Methodology
Cybersecurity SOC analysts

Why should organizations care about TDIR?

TDIR (Threat Detection Investigation Response) is a new approach to enhancing the analysis and action capabilities of SOC Managers.

Read more
4min
Methodology