HarfangLab
The Blog
Loading...
Phishing: sharing best practices to protect Information Systems
From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…
Crisis management exercises: pitfalls and biases to avoid
Cyber attacks are inevitable, and crisis management exercises can help you prepare for them. But they, too, require careful preparation!…
Cybersecurity in healthcare sector
What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…
Organizing a cybersecurity crisis exercise
When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…
How and why we adopted Rust to develop our EDR
How did we switch from Python to Rust, and why? Beyond optimizing RAM and CPU consumption, how does this development…
Insurance: why improving cybersecurity means optimizing budget
Why take out cybersecurity insurance, what does it cover, and what does it mean for cybersecurity budget.
OSINT as a vector for cyber threat intelligence, from indicator collection to attribution
This article was originally written in French and has been automatically translated into English. Cyber threat intelligence is the…
MITRE ATT&CK to evaluate an EDR
MITRE ATT&CK delivers more than a framework for evaluating detection capabilities, threat hunting, risk management, and threat intelligence – it…
Cybersecurity: why combine EDR and EPP
HarfangLab extends its protection with an EDR + EPP package. What are the technical advantages? What are the benefits for…
A practical way to bring more women to cybersecurity
It’s nothing new to say that cyber is short of professionals. And neither is the lack of women. But how…
5 KPIs for assessing and monitoring IT assets security
Can security be measured? Absolutely! Here is a selection of key indicators to help assess security, adapt your strategy and…