No spam, only Cyber Insights 1x a month !
"*" indicates required fields
What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…
When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…
How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…
Why take out cybersecurity insurance, what does it cover, and what does it mean for cybersecurity budget.
This article was originally written in French and has been automatically translated into English. Cyber threat intelligence is the…
MITRE ATT&CK delivers more than a framework for evaluating detection capabilities, threat hunting, risk management, and threat intelligence – it…
HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…
It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…
Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…
Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…
What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…