Heimdal
Latest Articles

Endpoint security

Cybersecurity Basics | INTERMEDIATE READ

What Is DNS Scavenging?

Learn about DNS Scavenging & Aging and their Role in DNS security.

Endpoint security | INTERMEDIATE READ

What Is Encrypted DNS Traffic?

Definition, How It Works, Types of Encryption, Why Is it Important.

Cybersecurity Basics | INTERMEDIATE READ

DNS Best Practices: A Definitive Guide for Organizations

Most cyberattacks start with DNS. Is yours protected?

Cybersecurity Basics | INTERMEDIATE READ

What Are the Main Attack Vectors in Cybersecurity?

And how to protect your business from different attack vectors

Cybersecurity Basics | INTERMEDIATE READ

What Is DNSSEC?

Definition, Benefits, and Best Practices.

Endpoint security | QUICK READ

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Access Management | SLOW READ

Application Whitelisting: Definition, Types, and Best Practices

The Smart Way to Implement Application Whitelisting into Your Defense Strategy.

Endpoint security | SLOW READ

25 Free & Open Source Cybersecurity Tools for Businesses

Check Out These Free & Open Source Cybersecurity Tools That Can Help You Stay Safe From Cybersecurity Threats.

Endpoint security | INTERMEDIATE READ

4 Examples of Data Encryption Software to Consider for Your Enterprise

Data Encryption Software Can Keep Your Confidential Information Safe. Here’s What You Need to Know About It.

Account security | INTERMEDIATE READ

How Can You Avoid Downloading Malicious Code? Security Tips to Consider

Malicious Code Hides in Plain Sight. Learn How to Keep It Out of Your Network.

Endpoint security | SLOW READ

What Is EPDR (Endpoint Prevention, Detection and Response)?

How EPDR Is the New Groundbreaking Golden Standard. Why Your Organization Should Adopt a Proactive Approach to Cybersecurity.

Endpoint security | QUICK READ

Challenges in Software Security for IoT Devices (and How to Tackle Them)

How IoT Works and Its Main Vulnerabilties. How Challenges in Software Security for IoT Can Be Circumvented

Endpoint security | INTERMEDIATE READ

5G Dangers: What are the Cybersecurity Implications?

Watch out for these 5G threats in your organization

Endpoint security | SLOW READ

Android Malware: Your Mobile Device Isn’t Safe from Hackers

How to Remove Android Malware and Protect Yourself

Account security | SLOW READ

How Every Cyber Attack Works - A Full List

Which of these cyber attacks will hack you?

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats