HarfangLab - The Blog

All posts

Loading...
File Integrity Monitoring and EDR
Product

EDR & FIM: monitor file integrity and easily link to telemetry to improve protection

File Integrity Monitoring aims to verify and analyze the integrity of critical files.

4 min
IT Hygiene for cybersecurity
Methodology

Basic rules for good IT hygiene

The protection of an information system must be constantly adapted to keep pace with changing usage patterns and cyber threats.…

8 min
GDPR and Cybersecurity
Regulation

GDPR: what are your cybersecurity obligations?

GDPR requires companies to protect personal data. But what exactly does this regulation mean for your organization?

4 min
Cybersecurity - System backup
Methodology

Tips to set up an effective backup system

Whether it’s espionage or a ransom demand, data is coveted by attackers. How can you establish an effective backup system…

3 min
Crisis exercices
Methodology

Why set up crisis exercises?

As a CISO or SOC Manager, let’s assume you’re convinced of the benefits of crisis drills, but your IT department…

6 min
How HarfangLab EDR efficiently protects Linux endpoints
Product

How HarfangLab EDR efficiently protects Linux endpoints

No threat can target Linux endpoints? Think twice. Ransomware attacks, cryptocurrency miners, web shells, and rootkits are often used to…

4 min
MITRE 2024 - Results harfangLab EDR - Protection and Detection
Product

MITRE 2024: 100% detection and 99% accuracy

In its second participation in the MITRE Evaluations, HarfangLab reaffirms the excellence of its detection capabilities and achieves first-rate protection…

3 min
MITRE 2024 Evaluation - Behind the scenes
Product

MITRE 2: The Return

HarfangLab took part in the MITRE assessments for the first time in 2023. Following last year’s success, 2024 presented new…

6 min
Phishing
Methodology

Phishing: sharing best practices to protect Information Systems

From small businesses to large corporations, from town halls to state institutions, no organization is immune to cyberattacks. Let’s take…

3 min
Crisis exercises - Pitfalls and bias to avoid
Crisis management

Crisis management exercises: pitfalls and biases to avoid

Cyber attacks are inevitable, and crisis management exercises can help you prepare for them. But they, too, require careful preparation!…

7 min
Cybersecurity - Healthcare
Cyber strategy

Cybersecurity in healthcare sector

What cyber threats is the healthcare sector facing? What challenges do healthcare facilities have to take up? And what solutions…

6 min
Organizing a cybersecurity crisis exercise
Crisis management

Organizing a cybersecurity crisis exercise

When it comes to IT security, anticipation and preparation are essential to be able to cope with a crisis. To…

7 min