HarfangLab
The Blog
Loading...

On-Premises EDR: a guide to choosing the right tool
An On-Premises EDR is not always an option. The choice may be guided by data confidentiality issues or even be…

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection
File Integrity Monitoring aims to verify and analyze the integrity of critical files.

Basic rules for good IT hygiene
The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

GDPR: what are your cybersecurity obligations?
GDPR requires companies to protect personal data. But what exactly does this regulation mean for your organization?

Tips to set up an effective backup system
Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

Why set up crisis exercises?
As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

How HarfangLab EDR efficiently protects Linux endpoints
No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…

MITRE 2024: 100% detection and 99% accuracy
In its second participation in the MITRE Evaluations, HarfangLab reaffirms the excellence of its detection capabilities and achieves first-rate protection…

MITRE 2: The Return
HarfangLab took part in the MITRE assessments for the first time in 2023. Following last year’s success, 2024 presented new…

Phishing: sharing best practices to protect Information Systems
From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…

Crisis management exercises: pitfalls and biases to avoid
Cyber attacks are inevitable, and crisis management exercises can help you prepare for them. But they, too, require careful preparation!…