No spam, only Cyber Insights 1x a month !
"*" indicates required fields
Ivan Kwiatkowski, Lead Cyber Threat Researcher, shares his experience of the deployment of an IT architecture in a very small…
Is EDR expensive, just an enhanced antivirus, or just for big business? Here’s a look at some preconceived ideas that…
Guillaume Dubuc is CISO at Altitude Infra, France’s 3rd largest fiber optic infrastructure operator. How do you convince your board,…
Everything you need to know about onboarding for HarfangLab’s on-premise customers: from preparing the environment to installing and deploying agents,…
How does HarfangLab meet the company’s cybersecurity needs, and what are the concrete benefits of this collaboration? We tell you…
Veepee is Europe’s pioneer in online event sales. Founded in 2001, the retailer employs 5,000 people. Strategic choices, budget, recruitment:…
Why use mapping to prepare for a crisis? And how to map for maximum efficiency? Follow the guide.
How do you communicate internally during a crisis? Should the usual channels be used? And externally, how do we communicate…
What is a crisis unit? How should roles be allocated? How to adapt the crisis unit to the nature of…
Who to involve in a project to deploy or change EDR, before and during the implementation of a cyber project.
Why the role of cyber experts remains essential in the event of an attack – even with automation tools -,…
EDR and cybersecurity – the benefits of AI: how to contain risk upstream, thanks to an engine that runs directly…