Heimdal
Latest Articles

Endpoint security

Endpoint security | QUICK READ

What Is DNS Propagation and How to Keep Safe from DNS Attacks

Find Out What Impacts Your DNS Propagation and How to Mitigate DNS Attacks.

Endpoint security | INTERMEDIATE READ

What Is Digital Forensics and Incident Response (DFIR)?

Find Out What Digital Forensics & Incident Response Is and How to Use Them In Your Favor.

Cybersecurity Basics | INTERMEDIATE READ

What Is DNS Scavenging?

Learn about DNS Scavenging & Aging and their Role in DNS security.

Endpoint security | INTERMEDIATE READ

What Is Encrypted DNS Traffic?

Definition, How It Works, Types of Encryption, Why Is it Important.

Cybersecurity Basics | INTERMEDIATE READ

What Are the Main Attack Vectors in Cybersecurity?

And how to protect your business from different attack vectors

Endpoint security | QUICK READ

Microsoft Enforces Brute Force Attacks Blocking Policies for All Windows Builds

Heimdal®’s Journey Into Leading the Anti-Brute-Force Tech Innovation

Cybersecurity Basics | INTERMEDIATE READ

What Is DNSSEC?

Definition, Benefits, and Best Practices.

Endpoint security | QUICK READ

What Is RMM Software?

All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.

Access Management | SLOW READ

Application Whitelisting Concepts: Definition, Types, Implementation and Best Practices

Application Whitelisting Is a Fundamental Cybersecurity Practice. Learn How to Add It to Your Corporate Network.

Endpoint security | SLOW READ

25 Free & Open Source Cybersecurity Tools for Businesses

Check Out These Free & Open Source Cybersecurity Tools That Can Help You Stay Safe From Cybersecurity Threats.

Endpoint security | INTERMEDIATE READ

4 Examples of Data Encryption Software to Consider for Your Enterprise

Data Encryption Software Can Keep Your Confidential Information Safe. Here’s What You Need to Know About It.

All things Heimdal | INTERMEDIATE READ

In contrast to the NSA's Recommendations, Heimdal™ Is Confident about the Use of DNS over HTTPs (DoH)

Why DNS-over-HTTPS (DoH) Is Actually a Good Idea. Best Practices for Securing Your Organization’s DNS.

Account security | INTERMEDIATE READ

How Can You Avoid Downloading Malicious Code? Security Tips to Consider

Malicious Code Hides in Plain Sight. Learn How to Keep It Out of Your Network.

Endpoint security | SLOW READ

What Is EPDR (Endpoint Prevention, Detection and Response)?

How EPDR Is the New Groundbreaking Golden Standard. Why Your Organization Should Adopt a Proactive Approach to Cybersecurity.

Endpoint security | QUICK READ

Challenges in Software Security for IoT Devices (and How to Tackle Them)

How IoT Works and Its Main Vulnerabilties. How Challenges in Software Security for IoT Can Be Circumvented

Endpoint security | INTERMEDIATE READ

5G Dangers: What are the Cybersecurity Implications?

Watch out for these 5G threats in your organization

Endpoint security | SLOW READ

Android Malware: Your Mobile Device Isn’t Safe from Hackers

How to Remove Android Malware and Protect Yourself

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats