Category: Heimdal Security Blog

What is (an) Intrusion Prevention System?

Read the original article: What is (an) Intrusion Prevention System? Intrusion Prevention System may very well be the next milestone in proactive network security. The reasoning behind the statement is not hard to grasp – a June 2020 study, focused…

What is Vulnerability Management?

Read the original article: What is Vulnerability Management? Some people still believe their IT infrastructure is unflawed simply because they’ve never experienced a cybersecurity incident – until something goes wrong and the company becomes the victim of a malware attack…

Web Application Security – A Complete Guide

Read the original article: Web Application Security – A Complete Guide OCD or just very fond of structure, I must confess that I like pretty much everything around me to be in (a specific) order. Due to this habit, I…

Cloud Computing Threats: Beyond Vulnerabilities

Read the original article: Cloud Computing Threats: Beyond Vulnerabilities When you hear the term cloud computing, know that it has little to do with the famous cloud number 9 some sing about – it is a key concept in the…

What is Privileged Access Management (PAM)?

Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…

What is Privileged Access Management (PAM)?

Read the original article: What is Privileged Access Management (PAM)? Privileged Access Management ensures business safety through privileged accounts monitoring, preventing external and internal threats that result from the improper use of admin rights. It is based upon the Principle…

Best IoT Security Management for your Business

Read the original article: Best IoT Security Management for your Business We might feel that technology plays a big part in our lives, always with our eyes on our phones or turning on the TV immediately after we got home…

What is Patch Management?

Read the original article: What is Patch Management? You can’t control the emergence of cyber threats. But you can have complete control over your organization’s vulnerabilities and efficiently manage them. Bad patch management has been one of the reasons behind…

What Is EDR and Why Is It Important?

Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…

What Is EDR and Why Is It Important?

Read the original article: What Is EDR and Why Is It Important? Oftentimes, your organization’s endpoints can become key entry points for cyber attackers. With the evolution of workplace mobility and employees connecting to the Internet from their off-site endpoints…

SECURITY ALERT: Emotet Infected A Large Danish Company

Recently, a large Danish company was hit by Emotet, a highly popular and dangerous type of malware, which is causing extensive and disruptive incidents. Emotet acts as a downloader/dropper, with multiple features, and in many cases, plants a secondary payload…

Emotet Infected A Large Danish Company

Recently, a large Danish company was hit by Emotet, a highly popular and dangerous type of malware, which is causing extensive and disruptive incidents. Emotet acts as a downloader/dropper, with multiple features, and in many cases, plants a secondary payload…

What Is the Country with Highest Digital Quality of Life?

The Digital Quality of Life, or DQL, study examines the gaps between citizens’ online experiences on a society-to-society basis. In almost every aspect of life, the digital world impacts everyone. From day-to-day commutes to workplace computing, smartphones and computers are…

The Trends in IT Security, As You See It

I wanted to share a few insights with all the CIOs, CISOs, IT managers out there, reading our blog, regarding the main trends in IT security and what we’ve learned from them. Many of you give us a lot of…

Supply Chain Cyber Security: What Are the Risks?

As organizations and their partners are increasingly becoming interconnected, cyber security risks can endanger all parties involved. And even when your business is protected by sophisticated security tools, you may never be certain your suppliers also have the same methods…