Heimdal
Latest Articles

Cybersecurity Basics

Cybersecurity Basics | INTERMEDIATE READ

Man-in-the Middle (MITM) Attack

Learn What Is a Man-in-the-Middle Attack, How It Works, and How to Protect Your Company

Cybersecurity Basics | INTERMEDIATE READ

Defining Zero-Day Vulnerability

All About How You Can Protect Your Business from a Zero-Day Attack

Cybersecurity Basics | INTERMEDIATE READ

Cybercrime Explained – A Brief Guide to the Dangers of the Online World

The Internet Can Be a Very Dangerous Place Nowadays. Here’s What You Need to Know About Cybercrime.

Cybersecurity Basics | INTERMEDIATE READ

What Is a Botnet & How to Prevent Your PC From Being Enslaved

Everything You Need to Know About Botnets and Zombies. A Simplified Version of How a Botnet Is Created.

Cybersecurity Basics | SLOW READ

What Is Biometric Authentication? A Complete Overview

Advantages & Disadvantages of Biometric Authentication. Use Cases and How Popular Biometric Methods Work.

Cybersecurity Basics | INTERMEDIATE READ

Top 10 Most Dangerous Banking Malware That Can Empty Your Bank Account

“It Can’t Happen to Me” Is Not a Good Defense Strategy against Banking Malware. Learn How Banking Trojans Work and What Are the Most Dangerous Malware Families!

Cybersecurity Basics | INTERMEDIATE READ

Is Inventory Management Software Free? The Best 5 Alternatives to Consider

Free Inventory Management Software Does Not Need to Sacrifice on Quality. Here Are the Best Alternatives for Your Enterprise.

Cybersecurity Basics | QUICK READ

Heimdal Case Files: The Honda Ransomware Attack

How Did the Ransomware Attack on Honda Happen? Who Was Behind the Honda Ransomware Attack?

Cybersecurity Basics | INTERMEDIATE READ

What is Audit Failure in Event Viewer?

Most Common Event ID Failures. Ways to Remedy Common Event ID Failures

Cybersecurity Basics | QUICK READ

What Is CERT in Security and Why Do You Need It?

A Brief History of CERT. The Role of CERT in Information Security.

Cybersecurity Basics | INTERMEDIATE READ

About the Garmin Ransomware Case: Here’s What Happened

It Appears that WastedLocker Was Behind the Garmin Ransomware Attack. Here’s What We’ve Learned and How to Stay Safe!

Cybersecurity Basics | QUICK READ

Kia Ransomware 101: How It Started and How The Situation Developed

What Actually Happened? Who Was Behind the Attack?

Cybersecurity Basics | INTERMEDIATE READ

Advanced Threat Protection ATP: What It Is and How You Can Achieve It

Advanced Threat Protection Is a Complex Set of Practices That Keep Your Enterprise Safe. Here’s Everything You Need to Know About It.

Cybersecurity Basics | QUICK READ

Taking Host Intrusion Prevention System (HIPS) Apart

What Is Host Intrusion Prevention System (HIPS)? How HIPS Works and Why You Need It?

Cybersecurity Basics | QUICK READ

What Is Software Deployment: Definition, Specific Activities, Challenges and Advantages

Software Deployment: Initial Installs, Updates and Security Patches. Learn Why They’re Important for Your Company’s Cybersecurity!

Cybersecurity Basics | QUICK READ

Blackbaud Ransomware Attack 101

How the Attack Affected a Large Number of Industries. What do You need to Know About It?

Cybersecurity Basics | INTERMEDIATE READ

Threat Prevention 101: What You Need to Know to Keep Your Business Safe

Threat Prevention Is Essential to a Strong Cybersecurity Strategy. Here’s Everything You Need to Know About It.

Cybersecurity Basics | QUICK READ

What Is SSL Vulnerability In Computer Network Science?

Vulnerabilities of the SSL/TLS Protocol. Most Common SSL Attacks.

Cybersecurity Basics | INTERMEDIATE READ

What Is Bandwidth Usage and How Can You Monitor It?

Types of Bandwidth: Pros and Cons. How to Reduce Bandwidth Usage on Your Networks.

Cybersecurity Basics | QUICK READ

What Is Desktop Configuration?

The Importance of Desktop Configuration. Desktop Security Best Practices.

Cybersecurity Basics | INTERMEDIATE READ

Point Products vs Complete Cyber Security Suite: Which Strategy Is Better for Ensuring the Safety of Your Business?

How To Ensure the Safety of Your Business? What Cybersecurity Approach Is Perfect for You?

Cybersecurity Basics | QUICK READ

What Is a SCEP Server?

Defining the SCEP Server. How Does SCEP Protocol Work?

Cybersecurity Basics | QUICK READ

What Is SNMP In Computer Network Science?

Defining SNMP Components. SNMP Protocol Data Units.

Cybersecurity Basics | QUICK READ

What Is WLC in Networking and Why Is It Important?

How Does WLC Work. Benefits of Using a Wireless LAN Controller.

Cybersecurity Basics | INTERMEDIATE READ

On AI Neural Network - How It Works, History, Application, Learning Strategies

AI Neural Network Is Like a Digital Model of A Brain. Find Out How It Can Take Us Further.

Cybersecurity Basics | QUICK READ

What Is Residual Risk in Information Security?

The Importance of Residual Risk. How To Manage your Residual Risk?

Cybersecurity Basics | QUICK READ

What Is A Packet Sniffer and How Does It Work?

Benefits of Using A Packet Sniffer. Packet Sniffing Best Practices.

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats