Heimdal
Latest Articles

Cybersecurity Basics

Cybersecurity Basics | INTERMEDIATE READ

Your 10-Minute Guide to PKI and How Internet Encryption Works

A Deep Dive into the Foundation of Internet Security and How Encryption Plays a Role in It.

Cybersecurity Basics | QUICK READ

What Is a DNS Zone and How to Keep Safe From DNS Zone Transfer Attacks

From Definition and Types to Most Common Vulnerabilities.

Cybersecurity Basics | INTERMEDIATE READ

Fast Flux: Definition, How it Works and How to Prevent It

A 15-Year Technique that Doesn’t Show Any Signs of ‘Aging’.

Cybersecurity Basics | INTERMEDIATE READ

The Anatomy of Pharming and How to Prevent It

Learn How ‘Phishing Without a Lure’ Works and Find your Way Around It.

Cybersecurity Basics | INTERMEDIATE READ

What is Mimikatz? What can it do and how to protect

How Mimikatz is used and how to protect your organization against credential-theft attacks that leverage this tool

Cybersecurity Basics | INTERMEDIATE READ

What Is DNS Scavenging?

Learn about DNS Scavenging & Aging and their Role in DNS security.

Cybersecurity Basics | INTERMEDIATE READ

Future of Women in Cybersecurity

Inclusiveness. Opportunities. Equity.

Cybersecurity Basics | INTERMEDIATE READ

Denmark’s Journey to Becoming the Most Cyber-Secure Country

Is IT Security a Big Enough Political Topic for Danes?

Access Management | INTERMEDIATE READ

What Is an Access Control List (ACL)?

Definition, Types and Benefits.

Cybersecurity Basics | INTERMEDIATE READ

Types of Keyloggers: Definition, Examples and Prevention

Keyloggers: On the Cusp Between Legality and Crime.

Cybersecurity Basics | INTERMEDIATE READ

What Are the Main Attack Vectors in Cybersecurity?

And how to protect your business from different attack vectors

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats