
No spam, only Cyber Insights 1x a month !
"*" indicates required fields

File Integrity Monitoring aims to verify and analyze the integrity of critical files.
The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…
GDPR requires companies to protect personal data. But what exactly does this regulation mean for your organization?
Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…
As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…
No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…
In its second participation in the MITRE Evaluations, HarfangLab reaffirms the excellence of its detection capabilities and achieves first-rate protection…
HarfangLab took part in the MITRE assessments for the first time in 2023. Following last year’s success, 2024 presented new…
From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…
Cyber attacks are inevitable, and crisis management exercises can help you prepare for them. But they, too, require careful preparation!…
What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…
When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…