Springe zum Hauptinhalt

HUMAN RISK &
AWARENESS


Security Awareness

Human Risk Assessment



HYPERSECURE Platform

DriveLock_Capterra_Badge

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

DriveLocks booth at GITEX in Berlin

2 min read

DriveLock at GITEX Europe: A Premiere for Innovation and Cybersecurity

What a start! The conversations were insightful, and the connections invaluable as DriveLock proudly celebrated its premiere at GITEX Europe in Berlin this May 2025! This occasion not only marked our official introduction to a vibrant new audience...

Read More
Man holding a protective shield

7 min read

Your protective shield with web application firewall

Web applications are the open gateway to your critical data. Anyone who does business online knows how important these applications are for...

Read More
Laptop with open web meeting

4 min read

The BSI: The protective shield of the digital world in Germany

The digital world offers us enormous opportunities: increased efficiency, networking and innovations that make our lives easier. But as...

Read More

1 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards 2025

DriveLock Wins Market Innovator Endpoint Security Award in 13th Annual Global InfoSec Awards at #RSAC 2025. DriveLock is proud to announce we have...

Read More
A distressed healthcare professional staring at a infected computer

5 min read

Impact Of Ransomware On Healthcare Systems

Cybersecurity is as essential as medical expertise. Ransomware attacks on healthcare systems are increasingly putting patient lives and sensitive...

Read More

2 min read

DriveLock SE expands HYPERSECURE platform with strategic acquisition of idgard

With the integration of Sealed Cloud technology, DriveLock strengthens its security platform and sets another milestone for digital sovereignty and...

Read More
Wifi-Kabel zum Computer auf dunkelblauem Hintergrund

6 min read

Introduction to the Tor Network: security and privacy

The Tor network provides powerful tools for enhancing online privacy and anonymity, but these benefits come with certain trade-offs. While many users...

Read More
Cloud with a title for cyber security

6 min read

10 protection tips against denial-of-service attacks for companies

A constantly growing online market offers companies numerous opportunities for growth and success. But with increasing reliance on online services...

Read More
Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

In today's digital world, cyberattacks are a constant threat, and adware attacks are one of the most common forms of malware. Adware can not only...

Read More
Man sitting in front of a computer at work

3 min read

Top 12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More
VPN graphic with lock, computer, network

6 min read

The importance of VPNs for secure business

One of the key technologies that plays a decisive role in this is the Virtual Private Network (VPN). VPNs have become an indispensable tool in...

Read More
Router with various connectors

4 min read

IP addresses: The hidden risks to your company network security

An IP address is the cornerstone of digital communication in any working environment and serves as a unique identifier for devices connected to a...

Read More
Security signature on the computer

4 min read

How companies can benefit from two-factor authentication?

In a digitized world where companies and businesses are increasingly reliant on technology and online services, the security of sensitive data and...

Read More
Keyboard with a fingerprint on it

7 min read

Your enterprise Single Sign-On security guide

Efficient identity and access management is crucial for modern organizations to ensure both the security and user-friendliness of their digital...

Read More
Hacker on the laptop

4 min read

Introduction to the Deep Web: The Hidden Internet

From checking the latest news and shopping to communicating with friends and family - the internet is everywhere. But what most of us see and use is...

Read More
Military equipment

5 min read

Cybersecurity measures in the defense sector in Germany

The classic concept of defense - tanks, planes, troops - is now supplemented by a battlefield that is invisible to the naked eye: cyberspace. For the...

Read More
DNS meaning in a graphic

6 min read

The invisible threat: understanding DNS leaks and their impact

In the increasingly connected world of the internet, data protection and online security are of paramount importance. From encrypting your connection...

Read More
How is an IT security concept for the healthcare sector structured?

5 min read

IT security concept for the healthcare sector - the most important information

Digitalization in the healthcare sector is in full swing: hospitals are becoming "intelligent" and are increasingly networked, patient records are...

Read More
Lock on a computer part

6 min read

Why Firewall as a Service is the Future of Cybersecurity?

Traditional methods of protecting network perimeters are increasingly being eclipsed by sophisticated threats and the dynamic nature of modern IT...

Read More
Man working on a laptop with a threat inside

4 min read

What are Advanced Persistent Threats?

Imagine an invisible attacker has sneaked into your network - and remains unnoticed for months. It collects sensitive data, manipulates systems and...

Read More
Person casting their vote

4 min read

Protecting Germany’s Election Infrastructure

The basis of every democracy is a free and fair election. But in the digital age, it is no longer enough to guard ballot boxes - protection starts...

Read More

5 min read

The Role Of AI In Enhancing Cybersecurity In Various Industries

In the digital age, German enterprises are leveraging AI to bolster their cybersecurity measures, ensuring robust protection against evolving cyber...

Read More
digital cloud

12 min read

Sovereign in the Cloud: Cybersecurity and Digital Sovereignty in our Converging World

In today's volatile geopolitical climate, the call to build hardened and resilient societies has become a top concern for leaders worldwide. Cyber...

Read More
Graphic of different cybersecurity icons

5 min read

8 Upcoming Cybersecurity Trends in 2025

As we move into 2025, the digital landscape continues to evolve, bringing new opportunities and challenges for businesses, governments, and...

Read More
Drivelocks stand at the it-sa trade fair 2024

2 min read

DriveLock at it-sa 2024: A review of exciting days in Nuremberg

The it-sa trade fair in Nuremberg, Europe's largest trade fair for IT security, took place from October 22 to 24, 2024 and once again provided a...

Read More
Blue banner Proxy server via laptop

3 min read

Facts and myths about proxy servers

Proxy servers are an indispensable tool in the digital age, but many misconceptions surround them. Proxy servers that often lead to...

Read More
Digital lock

6 min read

IPS 101: Basics and benefits of intrusion prevention systems

The security of digital infrastructures is now more of a focus than ever as the threat of cyber attacks continues to increase. In this context , the...

Read More
digital encryption

7 min read

Basics of end-to-end encryption

Digital communication has become an integral part of our everyday lives, and with it comes a growing need for security and privacy. In a world where...

Read More
Banner for 2024.2 Drivelock Update

2 min read

New DriveLock version 2024.2 is already available

We are pleased to announce the latest version of DriveLock - version 2024.2 is now available to all customers. With this release, you can expect...

Read More
Stadtsilhouette

5 min read

Mega Darknet Explained

In the shadowy corners of the Internet lies a vast, complex and often misunderstood area known as the mega-darknet. Unlike the standard darknet,...

Read More
Woman working on a code

4 min read

Sandbox in cyber security: what is it and why is it important?

Cybersecurity is a constantly evolving field in which new threats and security solutions are constantly emerging. One of the most effective...

Read More
Person, die auf einer schwarzen Tastatur tippt

5 min read

Top Penetration Testing Tools for Ethical Hackers

Penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled...

Read More
Page layout of login page

5 min read

How does password manager simplify corporate security?

In the digital business world, where the number of online accounts and IT systems used is constantly growing, the protection of sensitive information...

Read More
Person writing on a browser

5 min read

Understanding SEO Poisoning: A Growing Online Threat

Search engines like Google and Bing are our go-to tools for finding information quickly and easily. However, as helpful as these search engines are,...

Read More
Woman sitting in front of hacked computer

4 min read

Man in the Middle Attack Example: How It Works

An increased reliance on technology comes the growing risk of cyber threats, one of the most dangerous being Man-in-the-Middle (MITM) attacks. A MITM...

Read More
Hacker sitting in the dark room at the desk with a computer

4 min read

Code Injection Cyberattacks: What Every Business Needs to Know

Code injection attacks are a growing cybersecurity threat that can severely compromise system integrity. Discover how these attacks work and what you...

Read More

7 min read

Elevating Endpoint Security: A Strategic Imperative for Boardrooms

As organizations embark on their digital transformation journey, endpoint security has become a defining element of business success, and its...

Read More
Gesperrte Computersoftware

6 min read

Hackers vs. companies: 12 strategies for defence against hacking

Technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking into systems for...

Read More
Person updating software on the computer

2 min read

What Did We Learn from the CrowdStrike Incident: A Question of Philosophy, Not Sovereignty?

The recent CrowdStrike incident has often been framed as an issue of digital sovereignty. While this is not entirely wrong, we believe it represents...

Read More
ISG 2024 Badge

6 min read

DriveLock's Impressive Performance in the ISG Assessment

The digital landscape is rapidly evolving, and with it, the threats that companies face daily. Data leaks and losses can have serious consequences...

Read More
Dr. Phillip Mueller during Harvard Faculty Club's Maximize Your Board's Potential program

3 min read

Addressing Cybersecurity Strategically: A Board-Level Conversation

June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...

Read More
Human Risk & Awareness Banner

2 min read

Human Risk & Awareness: Effective measures against cyber threats

The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...

Read More

6 min read

Why is TÜV certification essential for your company?

In a world in which the safety, quality and reliability of products and services are becoming increasingly important, TÜV certification plays a...

Read More
Digital lock above laptopn on which a person is working on

4 min read

How packet filtering works explained

Cyber threats are constantly on the rise and organisations are faced with the challenge of protecting their networks from a wide range of attacks and...

Read More
Woman typing on the laptop

5 min read

Safe and secure: The most important facts about content filtering

In the age of digital communication and internet access, content filtering has become an indispensable part of cyber security. The ability to control...

Read More
DriveLock named Winner of the Global InfoSec Awards

2 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards

DriveLock is proud to announce we have won the following award from Cyber Defense Magazine (CDM), the industry’s leading electronic information...

Read More
SIEM on a logo

5 min read

What is SIEM and Why Your Business Needs It?

Today more than ever, more and more companies and public offices require powerful security measures to effectively counter the numerous cyber...

Read More
A project of a digital car

1 min read

TISAX®: More information security for the automotive industry

With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information...

Read More
Man sitting in front of a laptop

5 min read

How ISO 27001 helps secure personal data and confidential information?

Information security is more important than ever before. Organisations need to protect their sensitive data from a range of threats, including...

Read More
Online threats for businesses

9 min read

The Anatomy of a Distributed Denial of Service Attack: Understanding Used Techniques

From e-commerce platforms to essential services, we depend on the internet for communication, commerce, and daily operations. However, this digital...

Read More
Person browsing a dark net

9 min read

The Dangers and Benefits of Using the Dark Web

The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....

Read More
Servers

6 min read

A beginner's guide to understanding proxy servers

A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...

Read More
Person writing on the laptop

3 min read

BYOD: Balancing Convenience with Data Protection in the Workplace

In today's interconnected world, the concept of "Bring Your Own Device" (BYOD) has emerged as a popular trend in workplace culture. Empowering...

Read More
PUR-S 2024

2 min read

PUR-S 2024: DriveLock once again named Endpoint Protection Champion

The manufacturer of products for IT and data security achieves top results in user surveys for the third time.

Read More
Hands on the laptop's keyboard

8 min read

How Encryption Safeguards Confidential Information

In a time characterized by growing online dangers and strict regulations surrounding data privacy, the significance of encryption in safeguarding...

Read More
Secured disc with a red lock

7 min read

Why is BitLocker activation alone not enough?

Against the backdrop of growing threats to corporate data, hard drive encryption is no longer an option, but a necessity. BitLocker, Windows'...

Read More
digitales Schloss

3 min read

Application Control: Robust Security Solution for Your Company

The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...

Read More
Shield with a key lock on the computer system

5 min read

Five Steps to CMMC 2.0 Compliance

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is more than just a compliance requirement for defense contractors—it's a strategic...

Read More
Coded detection system

4 min read

Beyond Firewalls: How an Intrusion Detection System Safeguards Your Business?

An Intrusion Detection System (IDS) emerges as a stalwart defender, standing vigilant to detect and thwart potential threats within computer...

Read More
 4 paragraph markings

3 min read

What you can expect from NIS2

Do you have more than 50 employees or more than 10 million euros in turnover? Or are you classified as a critical organization by the government?...

Read More
Lock icon on the dark blue background

4 min read

5 IT Security Trends for 2024

As we step into the digital frontier of 2024, the landscape of cybersecurity continues to evolve at an unprecedented pace. With each passing year,...

Read More
Mann vor einem Computer

5 min read

The Guide to Effective Vulnerability Management

As businesses harness the power of technology to drive efficiency and growth, they also become prime targets for cyber threats. It is within this...

Read More
DriveLock announces partnership with Safetech Innovations Global Services

2 min read

DriveLock Announces First Intercontinental Partnership with Safetech Innovations Global Services

DriveLock SE, the leading specialist for preventive IT security solutions from Germany, today announces a new global partnership in the field of...

Read More

4 min read

Cybersecurity Risk Assessment from A to Z

In our increasingly interconnected world, where data flows freely and digital landscapes expand at a breakneck pace, the need for robust...

Read More
Supply chain management process on the tablet

4 min read

Guarding Your Business: How to Defend Against Supply Chain Attacks

Businesses find themselves constantly on guard against a wide array of cyber threats. Among these, one formidable adversary stands out for its covert...

Read More
Woman doing Christmas online shopping by usage of credit card

3 min read

Protect Yourself from Holiday Phishing Attacks with our 6 Tips

The holiday season is a time of joy, giving, and unfortunately, increased cyber threats. As we gear up for festive celebrations, cybercriminals are...

Read More
Two female legal advisors in the office

6 min read

13 tips on Ensuring Cyber Safety in Legal Offices

In the digital age, the legal landscape is rapidly evolving, and with it comes a critical imperative: cyber safety. As the legal profession...

Read More
Hypersecure Logo on the blue background

1 min read

DriveLock introduces their new HYPERSECURE Platform

When it comes to crafting proactive Endpoint IT security solutions originating from Germany, DriveLock is the standout expert. Today DriveLock...

Read More
A code blocked by a lock

9 min read

From Myth to Malware: The Evolution of Trojan Horse Viruses

In the vast landscape of cybersecurity threats, few adversaries have proven as cunning and adaptable as the Trojan horse virus. Like its namesake...

Read More
Virus danger on the computer

7 min read

Understanding Keyloggers: How to Defend Against Them

From confidential client information to sensitive business strategies, protecting this data is essential for maintaining trust, compliance, and...

Read More
Hacker in front of a computer

4 min read

Everything you need to know about spear phishing attacks

Among the many tactics employed by cybercriminals, one particularly insidious and targeted form of attack stands out: spear phishing. Spear phishing...

Read More
Green caption You got hacked on the computer screen

9 min read

The Anatomy Of A Phishing Attack

Among the numerous cyber threats lurking on the horizon, phishing attacks have emerged as a formidable adversary. Like a stealthy predator, these...

Read More
Woman writing on a keyboard

11 min read

Unseen Invaders: Exploring the World of Computer Worms

In our increasingly digital landscape, the importance of understanding and defending against computer worms cannot be overstated. Whether you're a...

Read More
Man touching on a email icon

11 min read

An In-Depth Handbook on Preventing Email Phishing Attacks

In the age of digital connectivity, organizations and businesses are more reliant on email communication than ever before. While email serves as a...

Read More
Person writing on a keyword

10 min read

Understanding Different Types of Computer Viruses in Organizations

The reliance of modern organizations on interconnected technology has amplified the potential impact of malicious software. From disrupting daily...

Read More
Green computer code

8 min read

10 Strategies to Protect Against Malware Attacks

The threat of malware looms large. From viruses and worms to ransomware and spyware, malicious software poses a significant risk to individuals,...

Read More
Computer in CERN

7 min read

Protecting Your Business: The Power of Next-Generation Firewalls

Welcome to a deep dive into the world of cybersecurity and network defence. In an era where the digital landscape is as dynamic as it is...

Read More
Hacker in front of the computer

12 min read

15 different types of cyberattacks

In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...

Read More
Silver laptop infected with ransomware on a desk

6 min read

Ransomware 101: A Comprehensive Guide to Defend Your Data and Systems

In today's rapidly evolving digital landscape, the menace of cyber threats looms larger than ever, with one particularly notorious adversary leading...

Read More

7 min read

Best Practices for Endpoint Security for your Business

In today's rapidly evolving digital landscape, endpoint security stands as the frontline defense against a myriad of cyber threats. As organizations...

Read More
Laptop on the desk displaying a code

8 min read

Incident Response 101: A Guide to Handling Cybersecurity Threats

Cybersecurity incidents have become an inevitable reality for businesses of all sizes. From data breaches to ransomware attacks, the threats are...

Read More
Gesichertes Passwort auf dem Laptop

6 min read

21 Essential Steps to Take When Your Company Faces a Cyber Attack

In the current age of digitalization, companies across various sectors and sizes face a growing risk of cyberattacks. Despite implementing...

Read More
How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More
Icon of a computer with a firewall

9 min read

The Ultimate Guide to IT Firewalls

Are you ready to fortify your digital defenses and safeguard your network from cyberattacks? Look no further than the network firewall. A formidable...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Man sitting in front of DriveLock's laptop in the office

4 min read

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...

Read More
DriveLock and DataStore enter into distribution partnership

2 min read

DriveLock and DataStore enter into distribution partnership

DataStore is integrating German vendor DriveLock into its enhanced IT security portfolio

Read More
Picture of Arved Graf von Stackelberg

1 min read

Arved Graf von Stackelberg is the new CEO of DriveLock

Strategic change in the top management at DriveLock Munich, March 14, 2023 - Effective January 1, 2023, Arved Graf von Stackelberg will assume the...

Read More
DriveLocks Stand auf der Messe

1 min read

DriveLock's new brand identity

DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...

Read More
Digital lock above laptop

2 min read

PUR-S 2021: DriveLock is the Endpoint Protection Champion

Munich - With its first participation in the Professional User Rating - Security Solutions (PUR-S) by techconsult, DriveLock SE has secured a...

Read More
A woman in front of the computer during work

5 min read

Mastering Cyber Hygiene: Your Organisation Security Health

Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...

Read More
Two people pointing at the digital lock logo

4 min read

Security Awareness Campaigns And Zero Trust

Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...

Read More
Man in front of DriveLock laptop

5 min read

Security Awareness Programs: IT Security Starts with the Users

Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...

Read More
Two team mates sitting in fornt of DriveLock laptop

5 min read

Cybersecurity Awareness Training - How It Works

More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...

Read More
Shocked man in front of computer

7 min read

Desperately Seeking a BitLocker Recovery Key!

National Security authorities recommend hard disk encryption as an effective measure for protecting data on desktop clients and notebooks in a...

Read More
Ingenieur in der Fabrik

3 min read

DriveLock support to achieve mandated CMMC and NIST certifications

U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security...

Read More
Infected laptop

2 min read

Log4j Zero-Day Exploit: Vulnerability Scanner Shows Need for Attention

Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.

Read More
Loading time of cyber attack

4 min read

Log4j Hack – the Patch Came Too Late

"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security...

Read More
Digitales Schloss über dem Laptop

1 min read

PUR-S 2022: DriveLock Stays as the Endpoint Protection Champion

DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted...

Read More
Cyber attack loading time

DriveLock Products Not Affected by Log4j Vulnerability

National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...

Read More
Holzwürfel mit Buchstaben

1 min read

Release 2021.2 – DriveLock Operations Center is the Central Console

The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...

Read More
Secutiry written in numerical code

4 min read

Could Kaseya VSA supply chain ransomware attack have been prevented?

The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...

Read More
Checklist marked in red

2 min read

Are you compliant for essential 8 in cyber security?

“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

Read More
Digitales Schloss über dem Laptop

1 min read

DriveLock received Common Criteria EAL3+ certification

Munich, Germany – DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish...

Read More
Cyberattack loading time

2 min read

Textbook cyberattack on US pipeline operator

Recently, the attack by the "Darkside” hacker group on the pipeline operator Colonial in the USA has once again brought the topic of IT security into...

Read More
Wooden dices with news sign on them

2 min read

2021.1 DriveLock release offers many improvements and enhancements

Our first release in 2021 introduces many new features and gives our customers and interested parties an outlook on where we are heading with...

Read More
Digital lock above the laptop

1 min read

DriveLock received Common Criteria EAL 3+ certification

Munich 07/04/2021 - DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish...

Read More
Cyber attack loading time

5 min read

Microsoft Exchange hack - when the patch came, it was already too late

Among a high-profile wave of cyberattacks in March 2021, tens of thousands of email servers worldwide fell victim due to a vulnerability in the...

Read More
Wooden dices with letters on them

1 min read

New functions and enhancements in DriveLock Release 2020.2

Updated features include early threat detection, application control, the DriveLock Operations Center and more Munich, Germany. February 19th 2021 –...

Read More
Logo of ISG Lens

1 min read

DriveLock Named as Leader for Data Leakage/Loss

Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...

Read More
Wooden dices with a letters on them

4 min read

New DriveLock 2020.1 release includes multiple enhancements

Munich, Germany. 01.07.2020 – DriveLock today unveiled its new Release 2020.1 that offers a wide range of enhancements and extensions. The new...

Read More
Cyber Security Cloud

2 min read

Australian Businesses Under Attack - How To Protect Yourself

On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent...

Read More
Woman in glasses looking at the code

3 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More
Woman wearing glasses

4 min read

Silent hacker attacks and the need for detection mechanisms

Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...

Read More
3 red lock and 1 blue lock within numeric code

3 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More
Gedruckte Diagramme

1 min read

DriveLock Expands Operations in ANZ

The leading German Endpoint Protection provider expands in ANZ with a new Channel Sales Manager DriveLock has appointed David Weinstein as the...

Read More
Safety first banner

6 min read

13 tips to improve IT security while working from home

The shift to remote work has blurred the lines between our personal and professional lives, offering increased flexibility but also presenting new...

Read More
Back view of a programmer sitting and writing code in a dark room

1 min read

Protection in your home office

As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business...

Read More
Banner of RSA Conference in San Francisco

1 min read

DriveLock - perfectly positioned for RSA 2020

With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The...

Read More
Hacker in front of computer after breaking in

2 min read

The Coronavirus gives hackers more freedom to infiltrate your network

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More
INFOSEC Award Winner banner

2 min read

RSA Conference 2020: DriveLock named winner of the InfoSec Award.

DriveLock Wins in Next Gen Data Leakage Protection category at 8th Annual InfoSec Awards at #RSAC 2020 SAN FRANCISCO (PRWEB) FEBRUARY 25, 2020 –...

Read More
Trends written in the search bar

4 min read

3 Cybersecurity Trends For 2020

Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...

Read More
Zero Trust icons

5 min read

How to implement Zero Trust Strategy in 3 easy steps

The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...

Read More
Checklist

4 min read

Risk Assessment with the SPE model

Risk lies around every corner and should be expected at any time. In the world of IT, risk is inherently everywhere and comes in many shapes and...

Read More
Woman writing press release

1 min read

The new DriveLock Release 2019.2 is now available

Updates to application control, usability, DriveLock Operations Center, Microsoft BitLocker, EDR and much more DriveLock, a leading global provider...

Read More
The Zero Trust security architecture as a pillar model

6 min read

7 principal pillars of Zero Trust Model

The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to...

Read More
Two experts sitting in front of computer which displays a code

4 min read

This is how IT security works with Zero Trust today

TABLE OF CONTENT WHY TODAY'S IT SECURITY ARCHITECTURES SHOULD BE DESIGNED ACCORDING TO THE ZERO TRUST MODEL WHAT USED TO WORK DOES NOT WORK ANYMORE:...

Read More
DriveLock - News Header 600x350

3 min read

DriveLock Delivers Zero Trust Platform to the Endpoint

The German IT security specialist supports the paradigm shift in IT security with its fully integrated Zero Trust Platform Munich, Germany. 28...

Read More
DriveLock stand at GITEX in Dubai

Successful presentation at GITEX, Dubai

GITEX is one of the largest regional IT Exhibitions and conferences in the MENA and South Asia region that takes place annually in Dubai, United Arab...

Read More
Wooden dices with letters on them

1 min read

Innovix is now the authorised distributor for DriveLock SE

Singapore, 2 September 2019 - Innovix is now the authorised distributor for DriveLock SE. DriveLock is one of the leading international specialists...

Read More
DriveLocks experts at RSAC Singapore Conference

1 min read

A Successful Week for DriveLock SE At RSAC Singapore

Singapore, August 2019 - DriveLock, as an active member of the cybersecurity community and an endpoint protection provider, exhibited at the RSA...

Read More
Screen Shot 2019-07-31 at 1.01.50 pm

6 min read

Strong passwords with Multi-Factor Authentication

Data breaches, phishing attacks, and credential stuffing are just a few of the dangers lurking around every corner. A simple username and password...

Read More
Digitaler Chip

2 min read

Is it really Artificial Intelligence?

by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.

Read More
A woman writing a press release

1 min read

The new DriveLock 2019.1 release is now available

Updates concern: Security, ease of use, DriveLock Operations Center, Microsoft BitLocker and more

Read More
Cyber secutiry cloud above 4 pairs of hands

1 min read

DriveLock SE Accelerates Growth Plans In Asia

German cyber security leader strengthens Endpoint Protection products through advancement of its Zero Trust platform Singapore, July 15, 2019 -...

Read More
A man in front of numeric code

3 min read

Zero Trust - The Blueprint To Safeguard Your Digital Business

Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...

Read More
Two it engineers in network server room

2 min read

Managed Security Service Providers: Why Businesses Need It?

We hear news headlines of data breaches on large companies like Yahoo, eBay and Uber among many others, but smaller and middle-sized business tend to...

Read More
Service button on the keyword

2 min read

3 Benefits of a Managed Security Service

TABLE OF CONTENT COMPLEX SECURITY ISSUES BENEFITS OF MANAGED SECURITY SERVICES FOR YOUR BUSINESS DRIVELOCK'S SOLUTION FOR YOU

Read More
Lupe und Schloss-Symbole

8 min read

11 reasons why patch management is not sufficient

Prioritizing the safety and stability of your systems is crucial. Given the increasing sophistication of cyber threats, patch management emerges as a...

Read More
Digital lock above laptop

4 min read

Avoid Cyber Risks In IOT and IIOT Worlds

The Internet of Things (IoT) and its industrial counterpart, the Industrial Internet of Things (IIoT), have revolutionized the way we live and work....

Read More
Cloud cyber security

2 min read

DriveLock takes over the business operations of charismathics GmbH

German security expert acquires smart card specialists from Munich Munich, December 20, 2018 - The Nordwind Capital portfolio company DriveLock SE,...

Read More
Numeric code with typed security into it

3 min read

Rolling Out Microsoft BitLocker Without Headaches

Data breaches are making headlines daily, and the regulatory landscape, with mandates like the Australian Notifiable Data Breach (NBD) scheme,...

Read More
Person in front of laptop with open DriveLock software

5 min read

Enforcing The Human Firewall: The Key to Preventing Cyber Attacks

While firewalls, antivirus software, and intrusion detection systems serve as essential security layers, human error remains the weakest link in...

Read More
Elements which data protection definition covers

3 min read

How To Make Endpoint Security Easy And Effective

Managing endpoint security can feel like a constant uphill battle. Keeping up with the latest threats, ensuring all devices are patched and...

Read More
Blue cyber security cloud

2 min read

DriveLock SE secures €3.0 million capital raise

Munich, November 19th, 2018 – DriveLock SE, the industrial Internet-of-Things (“IIoT”) endpoint protection specialist headquarted in Munich (Germany)...

Read More
A smart phone in front of a laptop

3 min read

3 Data Encryption Facts Your Business Needs To Know

Data breaches and cyber threats loom like shadows in the digital landscape, underscoring the importance of encryption as a fundamental safeguard for...

Read More
Wall covered with numerical code shaped as a key hole

4 min read

Don’t avoid FDE adoption anymore!

We all know data encryption is crucial. It's been a cornerstone of data privacy for centuries, and in today's digital world, it's more critical than...

Read More
A woman inserting USB device into laptop

5 min read

USB Security: Protect your devices with our 8 tips

Are you worried about security of your USB device? In this blog post we will share our 8 tips for USB security and we will show how DriveLock...

Read More
Wooden dices with letters

1 min read

DriveLock announces distributorship with CyberSoftwareDistributors

CSD will manage the distribution of DriveLock security software to North America Munich, Germany & Monument, Colo., June 28, 2018 – DriveLock SE, a...

Read More
Frau schreibt Pressemitteilung

2 min read

TOP 100: DriveLock is among the innovation leaders in 2018

Überlingen - For the 25th time, the TOP 100 Competition is honoring Germany’s most innovative medium-sized companies. This year, one of these...

Read More
Two people having a meeting in front of a computer

4 min read

And still nothing much done to educate our end-users!

The statistics are alarming: a significant percentage of internet users can't identify a phishing email, and even fewer know how to respond to a...

Read More
Woman writing press release

1 min read

Commentary on Linux Attacks

Munich, 30 October 2017

Read More
Zwei Männer schütteln sich die Hände

2 min read

DriveLock SE signs partnership with Romsym Data S. R. L.

First joint event with the new distributor is the Romsym Data Day 2017 Munich, Germany. 26 October 2017 – DriveLock SE, the endpoint protection...

Read More
Man writing on the secured laptop

1 min read

Comment on Bluetooth vulnerability Blueborne

Dear readers, News of a security vulnerability in Bluetooth connections caused a furore last week among manufacturers and users of Bluetooth-enabled...

Read More
Woman writing press release

1 min read

DriveLock SE expands in USA and APAC

Endpoint Protection Platform now available in EMEA, USA and Asia-Pacific region

Read More
Woman writing a press release

1 min read

DriveLock announces new product updates

Munich, Germany. 20 July 2017 – DriveLock SE has announced two new product releases, both of which are available immediately to customers.

Read More
Woman writing press release

2 min read

DriveLock honoured as innovation leader

Überlingen, Germany. – DriveLock SE has been confirmed as one of the innovation leaders among Germany’s midsized firms.

Read More