HarfangLab - The Blog

All posts

Loading...
kpi-deploiement-edr
Methodology

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

4 min
customer success management in cybersecurity
Cyber strategy

The role of human support between software editors and users

The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

4 min
gamification sensibilisation cybersécurité
Cyber strategy

Is gamification a key tool to build awareness?

To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…

4 min
SOC Analysts Skills - Webinar x Mindflow
Methodology

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

11 min
Cybersécurité - Choisir un EDR
Methodology

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

7 min
Management crise - 5 réflexes
Crisis management

5 key steps to handle a crisis

Crisis management is a moment as dreaded as it is almost inevitable, but anticipation is the key to getting through…

2 min
Changer de solution cyber
Cyber strategy

Testimonial: managing the impact of a change in cybersecurity tool

Changing or adopting a new tool to protect the workstations and servers of an IT infrastructure is a project that…

3 min
Connector HarfangLab - OpentCTI - Filigran
Product

A connector with OpenCTI to optimize incident response

OpenCTI is a solution used by CTI teams, cyber analysts and many CERTs and SOCs. It’s an IOC (Indicator Of…

3 min
Cybersécurité - Agent - Auto-protection
Product

Cybersecurity: how EDR protects itself against attacks

As cyber-attack techniques become more sophisticated and increase in volume, so do the tools available to deal with them.

6 min
Grégoire Germain - HarfangLab - Cybersécurité
Cyber strategy

Evolving to pursue our mission: protecting your endpoints

HarfangLab is now 6 years old. This is an opportunity to look back at the genesis of the company’s project.…

6 min
TDIR - Cybersécurité
Methodology

Why should organizations care about TDIR?

TDIR (Threat Detection Investigation Response) is a new approach to enhancing the analysis and action capabilities of SOC Managers.

4 min
False alarm - Whitelist
Methodology

Cybersecurity: how to optimize false positives

Reacting quickly to security incidents is crucial, but you also need the right information at the right time, with the…

7 min