Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Person, die auf einer schwarzen Tastatur tippt

4 min read

Top Penetration Testing Tools for Ethical Hackers

In the ever-evolving landscape of cybersecurity, penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled professionals who use their knowledge of hacking...

Read More
Page layout of login page

4 min read

How does password manager simplify corporate security?

In the digital business world, where the number of online accounts and IT systems used is constantly growing, the protection of sensitive information...

Read More
Person writing on a browser

5 min read

Understanding SEO Poisoning: A Growing Online Threat

Search engines like Google and Bing are our go-to tools for finding information quickly and easily. However, as helpful as these search engines are,...

Read More
Woman sitting in front of hacked computer

3 min read

Man in the Middle Attack Example: How It Works

An increased reliance on technology comes the growing risk of cyber threats, one of the most dangerous being Man-in-the-Middle (MITM) attacks. A MITM...

Read More
Hacker sitting in the dark room at the desk with a computer

3 min read

Code Injection Cyberattacks: What Every Business Needs to Know

Code injection attacks are a growing cybersecurity threat that can severely compromise system integrity. Discover how these attacks work and what you...

Read More
Gesperrte Computersoftware

6 min read

Hackers vs. companies: 12 strategies for defence against hacking

In an era where technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking...

Read More
Person updating software on the computer

2 min read

What Did We Learn from the CrowdStrike Incident: A Question of Philosophy, Not Sovereignty?

The recent CrowdStrike incident has often been framed as an issue of digital sovereignty. While this is not entirely wrong, we believe it represents...

Read More
ISG 2024 Badge

6 min read

DriveLock's Impressive Performance in the ISG Assessment

The digital landscape is rapidly evolving, and with it, the threats that companies face daily. Data leaks and losses can have serious consequences...

Read More
Dr. Phillip Mueller during Harvard Faculty Club's Maximize Your Board's Potential program

3 min read

Addressing Cybersecurity Strategically: A Board-Level Conversation

June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...

Read More