HarfangLab
The Blog
Loading...

Cybersecurity: why choose a Best-of-Breed approach?
When it comes to protecting the workstations and servers in an IT infrastructure, an “All-in-One” cybersecurity solution may seem tempting.…

Cyber resilience: 7 key points for better risk management
In an ever-changing and challenging cyber landscape, cyber resilience will help better navigate and adapt to the dynamic nature of…

Cybersecurity: Offensive vs. Defensive AI
Artificial Intelligence can be used by organizations to guard against and react to threats, but also by attackers to commit…

Key metrics to evaluate EDR performance
Want to assess the performance of an EDR, but what to measure is not totally clear to you? Here are…

The role of human support between software editors and users
The relationship between a software editor and end-users plays an essential role, yet one that is sometimes underestimated. A close…

Is gamification a key tool to build awareness?
To raise employee awareness, many companies are offering new types of online training, like “gamification” or “serious games”. But what…

What skills do SOC analysts need today?
The role of a SOC analyst is changing as cybersecurity is experiencing a swift and significant transformation. What changes? With…

Cybersecurity: choosing an EDR, key points to assess
How do you choose the right solution for your organization to protect your endpoints against threats? What criteria should you…

5 key steps to handle a crisis
Crisis management is a moment as dreaded as it is almost inevitable, but anticipation is the key to getting through…

Testimonial: managing the impact of a change in cybersecurity tool
Changing or adopting a new tool to protect the workstations and servers of an IT infrastructure is a project that…

A connector with OpenCTI to optimize incident response
OpenCTI is a solution used by CTI teams, cyber analysts and many CERTs and SOCs. It’s an IOC (Indicator Of…