Heimdal
Latest Articles

Vulnerability

Patch management | INTERMEDIATE READ

How To Break The Metrics Mirage in Vulnerability Management

A Step-by-step Guide on Breaking Free From the Metrics Mirage.

Patch management | QUICK READ

What Is a Vulnerability Management Program?

How to Build an Effective Vulnerability Management Program.

Patch management | QUICK READ

What Is Vulnerability Scanning: Definition, Types, Best Practices

Explaining Vulnerability Scanning And How It Can Help Your Business.

Patch management | QUICK READ

What Is Vulnerability Assessment?

Everything You Need to Know to Conduct an Effective Vulnerability Assessment!

Cybersecurity Basics | INTERMEDIATE READ

Cyber Threat Hunting vs Incident Response: What's the Difference?

Learn Which Approach Is Best for Your Organization.

Cybersecurity Basics | INTERMEDIATE READ

Most Popular Ethical Hacking Tools in 2026

Which Tools Are Most Used by Ethical Hackers?

Vulnerability | INTERMEDIATE READ

The Anatomy of PTaaS: What Is Penetration Testing as a Service

Learn All About PTaaS And How It Can Protect Your Security Posture.

Vulnerability | INTERMEDIATE READ

External Penetration Testing: What It Is And Why You Should Care

Learn How to Identify Vulnerabilities that Attackers May Exploit.

Vulnerability | INTERMEDIATE READ

What is a Security Content Automation Protocol (SCAP)?

Definition, Specifications, and Applicability

Networking | INTERMEDIATE READ

10 Paid and Open-Source Vulnerability Management Tools

How to Seek and Fix Security Gaps

Patch management | INTERMEDIATE READ

What Is a CVE? Common Vulnerabilities and Exposures Explained

Common Vulnerabilities and Exposures Are a Cybersecurity Standard. Here Is Everything You Need to Know About Them.

Networking | INTERMEDIATE READ

10 Common Network Vulnerabilities and How to Prevent Them

From Exposed IoT Devices and Misconfigured Firewalls to Outdated Software.

Cybersecurity Basics | INTERMEDIATE READ

What Is Risk-Based Vulnerability Management?

How It Works: Defining the RBVM Process. Find Out How It Is Different from Legacy Vulnerability Management.

Patch management | INTERMEDIATE READ

Software Patching Statistics: Common Practices and Vulnerabilities

How Often and Fast Do Companies Really Apply Updates? How Dangerous (or Not) Are the Common Software Patching Behaviors?

Vulnerability | QUICK READ

Most Dangerous Hardware Vulnerabilities in 2021

A List of the Most Harmful Hardware Weaknesses Has Been Provided by the American Not-for-profit Organization MITRE.

Data security | INTERMEDIATE READ

How Flash Vulnerabilities Expose You To Attacks

It’s time you learnt how to live without Flash and its security risks

Vulnerability | SLOW READ

Why Java Vulnerabilities Are One of Your Biggest Security Problems

This software used by millions is one of the key targets for cyber criminals

Heimdal XDR logo

One Platform. Total Security.

Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats