HarfangLab
The Blog

Loading...
Cybersecurity YARA and Sigma rules

Perks of Sigma and YARA rules in an EDR

Sigma and YARA are rule formats for detecting threats – malicious behaviors and files (or binaries) respectively. What are the…

Read more
6min
Product
Telemetry - Cybersecurity

Cybersecurity: telemetry explained

What is the use of telemetry in cybersecurity? What are its uses and benefits for cyberanalysts? How is it collected,…

Read more
7min
Product
Cybersecurity Platform

Cybersecurity: why choose a Best-of-Breed approach?

When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…

Read more
5min
Cyber strategy
Cyber Resilience

Cyber resilience in 7 key points

In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

Read more
7min
Methodology
Cybersecurity - Offensive vs. Defensive AI

Cybersecurity: Offensive vs. Defensive AI

Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

Read more
2min
Methodology
Cybersecurity Metrics

Key metrics to evaluate EDR performance

Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

Read more
4min
Methodology
Cybersecurity Platform Support

The role of human support between software editors and users

The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

Read more
4min
Cyber strategy
Cybersecurity Platform

Is gamification a key tool to build awareness?

To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…

Read more
4min
Cyber strategy
Cybersecurity SOC analysts

What skills do SOC analysts need today?

The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

Read more
11min
Methodology
Cybersecurity Metrics

Cybersecurity: choosing an EDR, key points to assess

How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

Read more
7min
Methodology
Crisis Management Biases

5 key steps to handle a crisis

Crisis management is a moment as dreaded as it is almost inevitable, but anticipation is the key to getting through…

Read more
2min
Crisis management