HarfangLab - The Blog

All posts

Loading...
Telemetry - Cybersecurity
Product

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

7 min
Cybersecurity: Best-of-breed vs. All-in-one tool
Cyber strategy

Cybersecurity: why choose a Best-of-Breed approach?

When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…

5 min
Cyber resilience 7 keypoints
Methodology

Cyber resilience in 7 key points

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

7 min
Offensive vs Defensive AI - Cybersecurity
Methodology

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

2 min
kpi-deploiement-edr
Methodology

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

4 min
customer success management in cybersecurity
Cyber strategy

The role of human support between software editors and users

The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

4 min
gamification sensibilisation cybersécurité
Cyber strategy

Is gamification a key tool to build awareness?

To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…

4 min
SOC Analysts Skills - Webinar x Mindflow
Methodology

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

11 min
Cybersécurité - Choisir un EDR
Methodology

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

7 min
Management crise - 5 réflexes
Crisis management

5 key steps to handle a crisis

Crisis management is a moment as dreaded as it is almost inevitable, but anticipation is the key to getting through…

2 min
Changer de solution cyber
Cyber strategy

Testimonial: managing the impact of a change in cybersecurity tool

Changing or adopting a new tool to protect the workstations and servers of an IT infrastructure is a project that…

3 min
Connector HarfangLab - OpentCTI - Filigran
Product

A connector with OpenCTI to optimize incident response

OpenCTI is a solution used by CTI teams, cyber analysts and many CERTs and SOCs. It’s an IOC (Indicator Of…

3 min