HarfangLab
The Blog
Loading...

Case study: behind-the-scenes IT architecture deployment, or the cyber secret life of SMBs
Ivan Kwiatkowski, Lead Cyber Threat Researcher, shares his experience of the deployment of an IT architecture in a very small…

Cybersecurity: 4 misconceptions your board needs to overcome
Is EDR expensive, just an enhanced antivirus, or just for big business? Here’s a look at some preconceived ideas that…

Guillaume Dubuc, CISO at Altitude Infra, a “propagator of healthy paranoia”.
Guillaume Dubuc is CISO at Altitude Infra, France’s 3rd largest fiber optic infrastructure operator. How do you convince your board,…

On-Premises customer onboarding at HarfangLab
Everything you need to know about onboarding for HarfangLab’s On-Premises customers: from preparing the environment to installing and deploying agents,…

How HarfangLab protects SMB Altitude Infra from cyber attacks
How does HarfangLab meet the company’s cybersecurity needs, and what are the concrete benefits of this collaboration? We tell you…

Antonin Garcia, CISO at Veepee: “EDR is an essential key to dealing with evolving cyberthreats.”
Veepee is Europe’s pioneer in online event sales. Founded in 2001, the retailer employs 5,000 people. Strategic choices, budget, recruitment:…

Anticipating a cyber crisis: why is it essential to map your information systems?
Why use mapping to prepare for a crisis? And how to map for maximum efficiency? Follow the guide.

How to communicate in times of cyber crisis?
How do you communicate internally during a crisis? Should the usual channels be used? And externally, how do we communicate…

Anticipating a cyber crisis: who does what in the crisis unit?
What is a crisis unit? How should roles be allocated? How to adapt the crisis unit to the nature of…
Deploying or changing EDR: a team effort
Who to involve in a project to deploy or change EDR, before and during the implementation of a cyber project.

The crucial role of analysts for investigations in cybersecurity
Why the role of cyber experts remains essential in the event of an attack – even with automation tools -,…