HarfangLab
The Blog

Loading...
Healthcare Cybersecurity

Cybersecurity in healthcare sector

What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…

Read more
6min
Cyber strategy
Organise cybersecurity  crisis exercise

Organizing a cybersecurity crisis exercise

When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…

Read more
7min
Crisis management
Cybersecurity - RUST

How and why we adopted Rust to develop our EDR

How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…

Read more
8min
Product
Cybersecurity - Insurance - Protection

Insurance: why improving cybersecurity means optimizing budget

Why take out cybersecurity insurance, what does it cover, and what does it mean for cybersecurity budget.

Read more
7min
Cyber strategy
Cybersecurity - Security Platform

OSINT as a vector for cyber threat intelligence, from indicator collection to attribution

This article was originally written in French and has been automatically translated into English.   Cyber threat intelligence is the…

Read more
7min
Methodology
Cybersecurity Platform MITRE Evaluations

MITRE ATT&CK to evaluate an EDR

MITRE ATT&CK delivers more than a framework for evaluating detection capabilities, threat hunting, risk management, and threat intelligence – it…

Read more
4min
Cyber strategy
Cybersecurity - Workspace Security Platform

Cybersecurity: why combine EDR and EPP

HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…

Read more
5min
Product
Cybersecurity Platform

A practical way to bring more women to cybersecurity

It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…

Read more
7min
Cyber strategy
Cybersecurity Metrics

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

Read more
8min
Methodology
Cybersecurity YARA and Sigma rules

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

Read more
6min
Product
Telemetry - Cybersecurity

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

Read more
7min
Product