HarfangLab
The Blog

Loading...
Organise cybersecurity crisis exercises

Why set up crisis exercises?

As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

Read more
6min
Methodology
Phishing

Phishing: sharing best practices to protect Information Systems

From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…

Read more
3min
Methodology
Cybersecurity - Security Platform

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution

This article was originally written in French and has been automatically translated into English.   Cyber threat intelligence is the…

Read more
7min
Methodology
Cybersecurity Metrics

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

Read more
8min
Methodology
Cyber Resilience

Cyber resilience: 7 key points for better risk management

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

Read more
7min
Methodology
Cybersecurity - Offensive vs. Defensive AI

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

Read more
2min
Methodology
Cybersecurity Metrics

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

Read more
4min
Methodology
Cybersecurity SOC analysts

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

Read more
11min
Methodology
Cybersecurity Metrics

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

Read more
7min
Methodology
Cybersecurity SOC analysts

Why should organizations care about TDIR?

TDIR (Threat Detection Investigation Response) is a new approach to enhancing the analysis and action capabilities of SOC Managers.

Read more
4min
Methodology
Cybersecurity Platform

Cybersecurity: how to optimize false positives

Reacting quickly to security incidents is crucial, but you also need the right information at the right time, with the…

Read more
7min
Methodology
Organise cybersecurity  crisis exercise

After the crisis: the importance of investigation

Determining the end of a cyber crisis remains complex, as it is often marked by the cessation of emergency measures…

Read more
3min
Crisis management