Heimdal
Latest Articles

Cybersecurity Basics

Cybersecurity Basics | INTERMEDIATE READ

Man-in-the Middle (MITM) Attack

Learn What Is a Man-in-the-Middle Attack, How It Works, and How to Protect Your Company

Cybersecurity Basics | INTERMEDIATE READ

Defining Zero-Day Vulnerability

All About How You Can Protect Your Business from a Zero-Day Attack

Cybersecurity Basics | INTERMEDIATE READ

Cybercrime Explained – A Brief Guide to the Dangers of the Online World

The Internet Can Be a Very Dangerous Place Nowadays. Here’s What You Need to Know About Cybercrime.

Cybersecurity Basics | INTERMEDIATE READ

What Is a Botnet & How to Prevent Your PC From Being Enslaved

Everything You Need to Know About Botnets and Zombies. A Simplified Version of How a Botnet Is Created.

Cybersecurity Basics | SLOW READ

What Is Biometric Authentication? A Complete Overview

Advantages & Disadvantages of Biometric Authentication. Use Cases and How Popular Biometric Methods Work.

Cybersecurity Basics | INTERMEDIATE READ

Top 10 Most Dangerous Banking Malware That Can Empty Your Bank Account

“It Can’t Happen to Me” Is Not a Good Defense Strategy against Banking Malware. Learn How Banking Trojans Work and What Are the Most Dangerous Malware Families!

Cybersecurity Basics | INTERMEDIATE READ

Is Inventory Management Software Free? The Best 5 Alternatives to Consider

Free Inventory Management Software Does Not Need to Sacrifice on Quality. Here Are the Best Alternatives for Your Enterprise.

Cybersecurity Basics | QUICK READ

Heimdal Case Files: The Honda Ransomware Attack

How Did the Ransomware Attack on Honda Happen? Who Was Behind the Honda Ransomware Attack?

Cybersecurity Basics | INTERMEDIATE READ

What is Audit Failure in Event Viewer?

Most Common Event ID Failures. Ways to Remedy Common Event ID Failures

Cybersecurity Basics | QUICK READ

What Is CERT in Security and Why Do You Need It?

A Brief History of CERT. The Role of CERT in Information Security.

Cybersecurity Basics | INTERMEDIATE READ

About the Garmin Ransomware Case: Here’s What Happened

It Appears that WastedLocker Was Behind the Garmin Ransomware Attack. Here’s What We’ve Learned and How to Stay Safe!

Cybersecurity Basics | QUICK READ

Kia Ransomware 101: How It Started and How The Situation Developed

What Actually Happened? Who Was Behind the Attack?

Cybersecurity Basics | INTERMEDIATE READ

Advanced Threat Protection ATP: What It Is and How You Can Achieve It

Advanced Threat Protection Is a Complex Set of Practices That Keep Your Enterprise Safe. Here’s Everything You Need to Know About It.

Cybersecurity Basics | QUICK READ

Taking Host Intrusion Prevention System (HIPS) Apart

What Is Host Intrusion Prevention System (HIPS)? How HIPS Works and Why You Need It?

Cybersecurity Basics | QUICK READ

What Is Software Deployment: Definition, Specific Activities, Challenges and Advantages

Software Deployment: Initial Installs, Updates and Security Patches. Learn Why They’re Important for Your Company’s Cybersecurity!

Cybersecurity Basics | QUICK READ

Blackbaud Ransomware Attack 101

How the Attack Affected a Large Number of Industries. What do You need to Know About It?

Cybersecurity Basics | INTERMEDIATE READ

Threat Prevention 101: What You Need to Know to Keep Your Business Safe

Threat Prevention Is Essential to a Strong Cybersecurity Strategy. Here’s Everything You Need to Know About It.

Cybersecurity Basics | QUICK READ

What Is SSL Vulnerability In Computer Network Science?

Vulnerabilities of the SSL/TLS Protocol. Most Common SSL Attacks.

Cybersecurity Basics | INTERMEDIATE READ

What Is Bandwidth Usage and How Can You Monitor It?

Types of Bandwidth: Pros and Cons. How to Reduce Bandwidth Usage on Your Networks.

Cybersecurity Basics | QUICK READ

What Is Desktop Configuration?

The Importance of Desktop Configuration. Desktop Security Best Practices.

Cybersecurity Basics | INTERMEDIATE READ

Point Products vs Complete Cyber Security Suite: Which Strategy Is Better for Ensuring the Safety of Your Business?

How To Ensure the Safety of Your Business? What Cybersecurity Approach Is Perfect for You?

Cybersecurity Basics | QUICK READ

What Is a SCEP Server?

Defining the SCEP Server. How Does SCEP Protocol Work?

Cybersecurity Basics | QUICK READ

What Is SNMP In Computer Network Science?

Defining SNMP Components. SNMP Protocol Data Units.

Cybersecurity Basics | QUICK READ

What Is WLC in Networking and Why Is It Important?

How Does WLC Work. Benefits of Using a Wireless LAN Controller.

Cybersecurity Basics | INTERMEDIATE READ

On AI Neural Network - How It Works, History, Application, Learning Strategies

AI Neural Network Is Like a Digital Model of A Brain. Find Out How It Can Take Us Further.

Cybersecurity Basics | QUICK READ

What Is Residual Risk in Information Security?

The Importance of Residual Risk. How To Manage your Residual Risk?

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats