HarfangLab
The Blog

Loading...
Cybersecurity Information System Mapping

Identifying and containing a data breach

A data breach can have many consequences, including financial losses, legal action, damage to reputation, and loss of trust in…

Read more
8min
Methodology
Cybersecurity Platform Support

10 recommendations for mobile cybersecurity

How can you ensure the security of mobile devices?

Read more
3min
Methodology
Cybersecurity Information System Mapping

Cybersecurity and resilience: the data backup

Data breaches pose a risk to users, customers, and the very functioning of a company or institution.

Read more
5min
Methodology
Cybersecurity - French Local Authorities Study

System compromise: assessing and containing an incident

How should you respond when an IT system is compromised? From assessment to containment, InterCERT France offers a series of…

Read more
7min
Methodology
IT Hygiene for Cybersecurity

The Zero Trust model: from basic principles to deployment

Zero Trust model: Definition The Zero Trust model involves reducing the trust granted to users to access an information system. This model…

Read more
10min
Methodology
Cybersecurity - Security Platform

Email account compromise: assessing and containing an incident

How should you respond if your information system is affected by a security incident involving the compromise of one or…

Read more
8min
Methodology
Cybersecurity Platform MITRE Evaluations

Unify your Security Operations Center and Vulnerability Operations Center

Vulnerability management is growing increasingly complex as the number of CVEs and the attack surface expand and evolve. Including vulnerability…

Read more
4min
Methodology
Cybersecurity - Workspace Security Platform Setup

Methodologies and tools for mapping an information system

Information system mapping is as essential a task as it is overwhelming, because it is often a tedious, long-term undertaking.…

Read more
4min
Methodology
Cybersecurity - Workspace Security Platform

Cloud, On-Premises, Air-gapped: The impact of infrastructure on choosing your cybersecurity solution

The choice of cybersecurity tools, such as an EDR, must be consistent with the technical context, depending on whether an…

Read more
5min
Methodology
Cybersecurity - Security Platform

MSSP services and benefits of a managed EDR

A Managed Security Service Provider (MSSP) operates cybersecurity solutions for organizations of any size. They provide peace of mind to…

Read more
4min
Methodology
IT Hygiene for Cybersecurity

Basic rules for good IT hygiene

The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

Read more
8min
Methodology
Cybersecurity - Workspace Security Platform

Tips to set up an effective backup system

Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

Read more
3min
Methodology