Heimdal
Latest Articles

Cybersecurity Basics

Cybersecurity Basics | QUICK READ

What Is Ethical Hacking? An Introduction to the Concept

Definition, Types, Key Concepts, and Benefits of Ethical Hacking.

Cybersecurity Basics | INTERMEDIATE READ

Your 10-Minute Guide to PKI and How Internet Encryption Works

A Deep Dive into the Foundation of Internet Security and How Encryption Plays a Role in It.

Cybersecurity Basics | QUICK READ

What Is a DNS Zone and How to Keep Safe From DNS Zone Transfer Attacks

From Definition and Types to Most Common Vulnerabilities.

Cybersecurity Basics | INTERMEDIATE READ

Fast Flux: Definition, How it Works and How to Prevent It

A 15-Year Technique that Doesn’t Show Any Signs of ‘Aging’.

Cybersecurity Basics | INTERMEDIATE READ

The Anatomy of Pharming and How to Prevent It

Learn How ‘Phishing Without a Lure’ Works and Find your Way Around It.

Cybersecurity Basics | INTERMEDIATE READ

What is Mimikatz? What can it do and how to protect

How Mimikatz is used and how to protect your organization against credential-theft attacks that leverage this tool

Cybersecurity Basics | INTERMEDIATE READ

What Is DNS Scavenging?

Learn about DNS Scavenging & Aging and their Role in DNS security.

Cybersecurity Basics | INTERMEDIATE READ

Future of Women in Cybersecurity

Inclusiveness. Opportunities. Equity.

Cybersecurity Basics | INTERMEDIATE READ

Denmark’s Journey to Becoming the Most Cyber-Secure Country

Is IT Security a Big Enough Political Topic for Danes?

Access Management | INTERMEDIATE READ

What Is an Access Control List (ACL)?

Definition, Types and Benefits.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats