Heimdal
Latest Articles

Cybersecurity Basics

Cybersecurity Basics | INTERMEDIATE READ

Your 10-Minute Guide to PKI and How Internet Encryption Works

A Deep Dive into the Foundation of Internet Security and How Encryption Plays a Role in It.

Cybersecurity Basics | QUICK READ

What Is a DNS Zone and How to Keep Safe From DNS Zone Transfer Attacks

From Definition and Types to Most Common Vulnerabilities.

Cybersecurity Basics | INTERMEDIATE READ

Fast Flux: Definition, How it Works and How to Prevent It

A 15-Year Technique that Doesn’t Show Any Signs of ‘Aging’.

Cybersecurity Basics | INTERMEDIATE READ

The Anatomy of Pharming and How to Prevent It

Learn How ‘Phishing Without a Lure’ Works and Find your Way Around It.

Cybersecurity Basics | INTERMEDIATE READ

What is Mimikatz? What can it do and how to protect

How Mimikatz is used and how to protect your organization against credential-theft attacks that leverage this tool

Cybersecurity Basics | INTERMEDIATE READ

What Is DNS Scavenging?

Learn about DNS Scavenging & Aging and their Role in DNS security.

Cybersecurity Basics | INTERMEDIATE READ

Future of Women in Cybersecurity

Inclusiveness. Opportunities. Equity.

Cybersecurity Basics | INTERMEDIATE READ

Denmark’s Journey to Becoming the Most Cyber-Secure Country

Is IT Security a Big Enough Political Topic for Danes?

Access Management | INTERMEDIATE READ

What Is an Access Control List (ACL)?

Definition, Types and Benefits.

Cybersecurity Basics | INTERMEDIATE READ

Types of Keyloggers: Definition, Examples and Prevention

Keyloggers: On the Cusp Between Legality and Crime.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats