HarfangLab - The Blog

All posts

Loading...
Cybersecurity Gender gap
Cyber strategy

A practical way to bring more women to cybersecurity

It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…

7 min
KPIs to assess IT fleet cybersecurity
Methodology

5 KPIs for assessing and monitoring IT assets security

Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…

8 min
Sigma - YARA - open format rules for cybersecurity
Product

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

6 min
Telemetry - Cybersecurity
Product

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

7 min
Cybersecurity: Best-of-breed vs. All-in-one tool
Cyber strategy

Cybersecurity: why choose a Best-of-Breed approach?

When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…

5 min
Cyber resilience 7 keypoints
Methodology

Cyber resilience in 7 key points

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

7 min
Offensive vs Defensive AI - Cybersecurity
Methodology

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

2 min
kpi-deploiement-edr
Methodology

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

4 min
customer success management in cybersecurity
Cyber strategy

The role of human support between software editors and users

The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

4 min
gamification sensibilisation cybersécurité
Cyber strategy

Is gamification a key tool to build awareness?

To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…

4 min
SOC Analysts Skills - Webinar x Mindflow
Methodology

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

11 min
Cybersécurité - Choisir un EDR
Methodology

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

7 min