Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

A project of a digital car

1 min read

TISAX®: More information security for the automotive industry

With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information Security Assessment Exchange) standard defined by the German Association of the Automotive Industry...

Read More
Man sitting in front of a laptop

4 min read

How ISO 27001 helps secure personal data and confidential information?

In today's digital age, information security is more important than ever before. Organisations need to protect their sensitive data from a range of...

Read More
Online threats for businesses

6 min read

The Anatomy of a DDoS Attack: Understanding the Techniques Used by Hackers

In today's digital age, businesses are more reliant than ever on their online presence. Unfortunately, this reliance has also made them vulnerable to...

Read More
Person browsing a dark net

5 min read

The Dangers and Benefits of Using the Dark Web

The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....

Read More
Servers

6 min read

A beginner's guide to understanding proxy servers

A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...

Read More
Person writing on the laptop

3 min read

BYOD: Balancing Convenience with Data Protection in the Workplace

In today's interconnected world, the concept of "Bring Your Own Device" (BYOD) has emerged as a popular trend in workplace culture. Empowering...

Read More
PUR-S 2024 DriveLock winner banner

2 min read

PUR-S 2024: DriveLock once again named Endpoint Protection Champion

The manufacturer of products for IT and data security achieves top results in user surveys for the third time.

Read More
Hands on the laptop's keyboard

4 min read

How Encryption Safeguards Confidential Information

In a time characterized by growing online dangers and strict regulations surrounding data privacy, the significance of encryption in safeguarding...

Read More
Secured disc with a red lock

6 min read

Why is BitLocker activation alone not enough?

Against the backdrop of growing threats to corporate data, hard drive encryption is no longer an option, but a necessity. BitLocker, Windows'...

Read More
digitales Schloss

3 min read

Application Control: Robust Security Solution for Your Company

The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...

Read More

5 min read

Five Steps to CMMC 2.0 Compliance

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is more than just a compliance requirement for defense contractors—it's a strategic...

Read More
Coded detection system

4 min read

Beyond Firewalls: How an Intrusion Detection System Safeguards Your Business?

An Intrusion Detection System (IDS) emerges as a stalwart defender, standing vigilant to detect and thwart potential threats within computer...

Read More
 4 paragraph markings

2 min read

What you can expect from NIS2

Do you have more than 50 employees or more than 10 million euros in turnover? Or are you classified as a critical organization by the government?...

Read More
Lock icon on the dark blue background

4 min read

5 IT Security Trends for 2024

As we step into the digital frontier of 2024, the landscape of cybersecurity continues to evolve at an unprecedented pace. With each passing year,...

Read More
Mann vor einem Computer

4 min read

The Guide to Effective Vulnerability Management

As businesses harness the power of technology to drive efficiency and growth, they also become prime targets for cyber threats. It is within this...

Read More
DriveLock announces partnership with Safetech Innovations Global Services

2 min read

DriveLock Announces First Intercontinental Partnership with Safetech Innovations Global Services

DriveLock SE, the leading specialist for preventive IT security solutions from Germany, today announces a new global partnership in the field of...

Read More

3 min read

Cybersecurity Risk Assessment from A to Z

In our increasingly interconnected world, where data flows freely and digital landscapes expand at a breakneck pace, the need for robust...

Read More
Supply chain management process on the tablet

3 min read

Guarding Your Business: How to Defend Against Supply Chain Attacks

In an age of increasing digital interconnectedness, businesses find themselves constantly on guard against a wide array of cyber threats. Among...

Read More
Woman doing Christmas online shopping by usage of credit card

3 min read

Protect Yourself from Holiday Phishing Attacks with our 6 Tips

The holiday season is a time of joy, giving, and unfortunately, increased cyber threats. As we gear up for festive celebrations, cybercriminals are...

Read More
Two female legal advisors in the office

5 min read

13 tips on Ensuring Cyber Safety in Legal Offices

In the digital age, the legal landscape is rapidly evolving, and with it comes a critical imperative: cyber safety. As the legal profession...

Read More
Hypersecure Logo on the blue background

1 min read

DriveLock introduces their new HYPERSECURE Platform

When it comes to crafting proactive Endpoint IT security solutions originating from Germany, DriveLock is the standout expert. Today DriveLock...

Read More
A code blocked by a lock

9 min read

From Myth to Malware: The Evolution of Trojan Horse Viruses

In the vast landscape of cybersecurity threats, few adversaries have proven as cunning and adaptable as the Trojan horse virus. Like its namesake...

Read More
Virus danger on the computer

6 min read

Understanding Keyloggers: How to Defend Against Them

From confidential client information to sensitive business strategies, protecting this data is essential for maintaining trust, compliance, and...

Read More
Hacker in front of a computer

3 min read

Everything you need to know about spear phishing attacks

Among the many tactics employed by cybercriminals, one particularly insidious and targeted form of attack stands out: spear phishing. Spear phishing...

Read More
Green caption You got hacked on the computer screen

7 min read

The Anatomy Of A Phishing Attack

Among the numerous cyber threats lurking on the horizon, phishing attacks have emerged as a formidable adversary. Like a stealthy predator, these...

Read More
Woman writing on a keyboard

10 min read

Unseen Invaders: Exploring the World of Computer Worms

In our increasingly digital landscape, the importance of understanding and defending against computer worms cannot be overstated. Whether you're a...

Read More
Man touching on a email icon

9 min read

An In-Depth Handbook on Preventing Email Phishing Attacks

In the age of digital connectivity, organizations and businesses are more reliant on email communication than ever before. While email serves as a...

Read More
Person writing on a keyword

7 min read

Understanding Different Types of Computer Viruses in Organizations

In today's hyper-connected digital landscape, where businesses and organizations rely on technology for everything from communication and data...

Read More
Green computer code

6 min read

10 Strategies to Protect Against Malware Attacks

In today's interconnected digital landscape, the threat of malware looms large. From viruses and worms to ransomware and spyware, malicious software...

Read More
Computer in CERN

5 min read

Protecting Your Business: The Power of Next-Generation Firewalls

Welcome to a deep dive into the world of cybersecurity and network defence. In an era where the digital landscape is as dynamic as it is...

Read More
Hacker in front of the computer

11 min read

15 different types of cyberattacks

In this relentless digital battlefield, businesses and organizations are pitted against a multitude of adversaries ranging from individual hackers...

Read More
Hacker in front of computer

6 min read

Ransomware 101: A Comprehensive Guide to Defend Your Data and Systems

In today's rapidly evolving digital landscape, the menace of cyber threats looms larger than ever, with one particularly notorious adversary leading...

Read More
Two teammates in front of DriveLocks' laptop

6 min read

Best Practices for Endpoint Security for your Business

In today's rapidly evolving digital landscape, endpoint security stands as the frontline defense against a myriad of cyber threats. As organizations...

Read More
Laptop on the desk displaying a code

7 min read

Incident Response 101: A Guide to Handling Cybersecurity Threats

In today's hyper-connected digital landscape, cybersecurity incidents have become an inevitable reality for businesses of all sizes. From data...

Read More
Gesichertes Passwort auf dem Laptop

6 min read

21 Essential Steps to Take When Your Company Faces a Cyber Attack

In the current age of digitalization, companies across various sectors and sizes face a growing risk of cyberattacks. Despite implementing...

Read More
How to keep track of your OneDrive and Teams data sharing links

4 min read

How to keep track of your OneDrive and Teams data sharing links part 2

Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...

Read More
How to keep track of your OneDrive and Teams data sharing links

3 min read

How to keep track of your OneDrive and Teams data sharing links part 1

Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...

Read More
Icon of a computer with a firewall

5 min read

The Ultimate Guide to IT Firewalls

Are you ready to fortify your digital defenses and safeguard your network from cyberattacks? Look no further than the network firewall. A formidable...

Read More
DriveLock announces partnership with Torsion Information Security, a London-based SaaS software provider

2 min read

DriveLock expands its product portfolio with Torsion

With a new cloud-based access control solution for Microsoft 365, documents are securely shared within the company and unauthorized access is avoided...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Man sitting in front of DriveLock's laptop in the office

4 min read

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...

Read More
DriveLock and DataStore enter into distribution partnership

2 min read

DriveLock and DataStore enter into distribution partnership

DataStore is integrating German vendor DriveLock into its enhanced IT security portfolio

Read More
Picture of Arved Graf von Stackelberg

1 min read

Arved Graf von Stackelberg is the new CEO of DriveLock

Strategic change in the top management at DriveLock Munich, March 14, 2023 - Effective January 1, 2023, Arved Graf von Stackelberg will assume the...

Read More
DriveLocks Stand auf der Messe

1 min read

DriveLock's new brand identity

DriveLock with a new look & feel DriveLock has enhanced its brand identity as part of the strategic focus to position its endpoint protection...

Read More
Digital lock above laptop

2 min read

PUR-S 2021: DriveLock is the Endpoint Protection Champion

Munich - With its first participation in the Professional User Rating - Security Solutions (PUR-S) by techconsult, DriveLock SE has secured a...

Read More
A woman in front of the computer during work

4 min read

Cyber Hygiene: 6 Useful Tipps

Cyber hygiene - these are simple security principles that every organisation should know and implement to keep all sensitive data under control and...

Read More
Two people pointing at the digital lock logo

3 min read

Security Awareness Campaigns And Zero Trust

In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...

Read More
Man in front of DriveLock laptop

4 min read

Security Awareness Programs: IT Security Starts with the Users

Cybersecurity is a hot topic that has penetrated the corners of our society. Regional newspapers regularly write about cyber attacks on local...

Read More
Two team mates sitting in fornt of DriveLock laptop

3 min read

Cyber Security Awareness Training - How It Works

More and more new malware variants and so-called fileless attack vectors threaten corporate networks. The AV-TEST Institute registers more than...

Read More
Shocked man in front of computer

6 min read

Desperately Seeking a BitLocker Recovery Key!

National Security authorities recommend hard disk encryption as an effective measure for protecting data on desktop clients and notebooks in a...

Read More
Ingenieur in der Fabrik

3 min read

DriveLock support to achieve mandated CMMC and NIST certifications

U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security...

Read More
Infected laptop

2 min read

Log4j Zero-Day Exploit: Vulnerability Scanner Shows Need for Attention

Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.

Read More
Loading time of cyber attack

4 min read

Log4j Hack – the Patch Came Too Late

"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security...

Read More
Digitales Schloss über dem Laptop

1 min read

PUR-S 2022: DriveLock Stays as the Endpoint Protection Champion

DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted...

Read More
Cyber attack loading time

DriveLock Products Not Affected by Log4j Vulnerability

National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...

Read More
Holzwürfel mit Buchstaben

1 min read

Release 2021.2 – DriveLock Operations Center is the Central Console

The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...

Read More
Secutiry written in numerical code

4 min read

Could Kaseya VSA supply chain ransomware attack have been prevented?

The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...

Read More
Checklist marked in red

2 min read

Are you compliant for essential 8 in cyber security?

“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

Read More
Digitales Schloss über dem Laptop

1 min read

DriveLock received Common Criteria EAL3+ certification

Munich, Germany – DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish...

Read More
Cyberattack loading time

2 min read

Textbook cyberattack on US pipeline operator

Recently, the attack by the "Darkside” hacker group on the pipeline operator Colonial in the USA has once again brought the topic of IT security into...

Read More
Wooden dices with news sign on them

2 min read

2021.1 DriveLock release offers many improvements and enhancements

Our first release in 2021 introduces many new features and gives our customers and interested parties an outlook on where we are heading with...

Read More
Digital lock above the laptop

1 min read

DriveLock received Common Criteria EAL 3+ certification

Munich 07/04/2021 - DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish...

Read More
Cyber attack loading time

5 min read

Microsoft Exchange hack - when the patch came, it was already too late

Among a high-profile wave of cyberattacks in March 2021, tens of thousands of email servers worldwide fell victim due to a vulnerability in the...

Read More
Wooden dices with letters on them

1 min read

New functions and enhancements in DriveLock Release 2020.2

Updated features include early threat detection, application control, the DriveLock Operations Center and more Munich, Germany. February 19th 2021 –...

Read More
Logo of ISG Lens

1 min read

DriveLock Named as Leader for Data Leakage/Loss

Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...

Read More
Wooden dices with a letters on them

4 min read

New DriveLock 2020.1 release includes multiple enhancements

Munich, Germany. 01.07.2020 – DriveLock today unveiled its new Release 2020.1 that offers a wide range of enhancements and extensions. The new...

Read More
Cyber Security Cloud

2 min read

Australian Businesses Under Attack - How To Protect Yourself

On June 19, Australian Prime Minister Scott Morrison reported that businesses are targeted by a sophisticated, state-based cyber actor. In recent...

Read More
Woman in glasses looking at the code

3 min read

EDR - the Sherlock Holmes of cyber security

In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...

Read More
Woman wearing glasses

3 min read

Silent hacker attacks and the need for detection mechanisms

Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...

Read More
3 red lock and 1 blue lock within numeric code

2 min read

4 Essential Strategies for IT Security

The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...

Read More
Gedruckte Diagramme

1 min read

DriveLock Expands Operations in ANZ

The leading German Endpoint Protection provider expands in ANZ with a new Channel Sales Manager DriveLock has appointed David Weinstein as the...

Read More
Safety first banner

6 min read

13 tips to improve IT security while working from home

From one of our previous post, "Coronavirus calls hackers to the scene", we are already informed about basic precautions and protection measures we...

Read More
Back view of a programmer sitting and writing code in a dark room

1 min read

Protection in your home office

As we brace ourselves to contain the spread of Covid-19 globally, it is of utmost importance for companies and enterprises to upkeep their business...

Read More
Banner of RSA Conference in San Francisco

1 min read

DriveLock - perfectly positioned for RSA 2020

With over 36,000 attendees, 700 speakers, and 650 exhibitors, the RSA conference in San Francisco was a successful and rewarding event. The...

Read More
Hacker in front of computer after breaking in

2 min read

The Coronavirus gives hackers more freedom to infiltrate your network

In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...

Read More
Graphic of investigation

2 min read

Modern Endpoint Security & EDR

The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...

Read More
INFOSEC Award Winner banner

2 min read

RSA Conference 2020: DriveLock named winner of the InfoSec Award.

DriveLock Wins in Next Gen Data Leakage Protection category at 8th Annual InfoSec Awards at #RSAC 2020 SAN FRANCISCO (PRWEB) FEBRUARY 25, 2020 –...

Read More
Trends written in the search bar

3 min read

3 Cybersecurity Trends For 2020

Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...

Read More
Filled boxes on the checklist

2 min read

How to implement Zero Trust Strategy in 3 easy steps

The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...

Read More
Checklist

3 min read

Risk Assessment with the SPE model

Risk lies around every corner and should be expected at any time. In the world of IT, risk is inherently everywhere and comes in many shapes and...

Read More
Woman writing press release

1 min read

The new DriveLock Release 2019.2 is now available

Updates to application control, usability, DriveLock Operations Center, Microsoft BitLocker, EDR and much more DriveLock, a leading global provider...

Read More
The Zero Trust security architecture as a pillar model

3 min read

7 principal pillars of Zero Trust Model

The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to...

Read More
Two experts sitting in front of computer which displays a code

4 min read

This is how IT security works with Zero Trust today

TABLE OF CONTENT WHY TODAY'S IT SECURITY ARCHITECTURES SHOULD BE DESIGNED ACCORDING TO THE ZERO TRUST MODEL WHAT USED TO WORK DOES NOT WORK ANYMORE:...

Read More
DriveLock - News Header 600x350

3 min read

DriveLock Delivers Zero Trust Platform to the Endpoint

The German IT security specialist supports the paradigm shift in IT security with its fully integrated Zero Trust Platform Munich, Germany. 28...

Read More
DriveLock stand at GITEX in Dubai

Successful presentation at GITEX, Dubai

GITEX is one of the largest regional IT Exhibitions and conferences in the MENA and South Asia region that takes place annually in Dubai, United Arab...

Read More
Wooden dices with letters on them

1 min read

Innovix is now the authorised distributor for DriveLock SE

Singapore, 2 September 2019 - Innovix is now the authorised distributor for DriveLock SE. DriveLock is one of the leading international specialists...

Read More
DriveLocks experts at RSAC Singapore Conference

1 min read

A Successful Week for DriveLock SE At RSAC Singapore

Singapore, August 2019 - DriveLock, as an active member of the cybersecurity community and an endpoint protection provider, exhibited at the RSA...

Read More
Screen Shot 2019-07-31 at 1.01.50 pm

4 min read

Strong passwords with Multi-Factor Authentication

TABLE OF CONTENT WHAT IS MULTI FACTOR AUTHENTICATION? MULTI-FACTOR AUTHENTICATION: WHY YOU SHOULD CHANGE YOUR SIMPLE PASSWORD? HOW DOES MULTI-FACTOR...

Read More
Digitaler Chip

2 min read

Is it really Artificial Intelligence?

by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.

Read More
A woman writing a press release

1 min read

The new DriveLock 2019.1 release is now available

Updates concern: Security, ease of use, DriveLock Operations Center, Microsoft BitLocker and more

Read More
Cyber secutiry cloud above 4 pairs of hands

1 min read

DriveLock SE Accelerates Growth Plans In Asia

German cyber security leader strengthens Endpoint Protection products through advancement of its Zero Trust platform Singapore, July 15, 2019 -...

Read More
A man in front of numeric code

3 min read

Zero Trust - The Blueprint To Safeguard Your Digital Business

Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...

Read More
Two it engineers in network server room

2 min read

Managed Security Service Providers: Why Businesses Need It?

We hear news headlines of data breaches on large companies like Yahoo, eBay and Uber among many others, but smaller and middle-sized business tend to...

Read More
Service button on the keyword

2 min read

3 Benefits of a Managed Security Service

TABLE OF CONTENT COMPLEX SECURITY ISSUES BENEFITS OF MANAGED SECURITY SERVICES FOR YOUR BUSINESS DRIVELOCK'S SOLUTION FOR YOU

Read More
Cyber Secutiry cloud above 4 pair of hands

4 min read

11 reasons why patch management is not sufficient

In today's rapidly evolving digital landscape, prioritizing the safety and stability of your systems is crucial. Given the increasing sophistication...

Read More
Cloud cyber security

2 min read

DriveLock takes over the business operations of charismathics GmbH

German security expert acquires smart card specialists from Munich Munich, December 20, 2018 - The Nordwind Capital portfolio company DriveLock SE,...

Read More
Person in front of laptop with open DriveLock software

4 min read

Enforcing The Human Firewall

TABLE OF CONTENT WHAT IS A FIREWALL? WHAT IS A HUMAN FIREWALL? STRENGTHEN YOUR FIREWALL'S WEAKEST LINK AVOID PREVENTABLE INCIDENTS HOW DRIVELOCK CAN...

Read More
Blue cyber security cloud

2 min read

DriveLock SE secures €3.0 million capital raise

Munich, November 19th, 2018 – DriveLock SE, the industrial Internet-of-Things (“IIoT”) endpoint protection specialist headquarted in Munich (Germany)...

Read More
A smart phone in front of a laptop

3 min read

3 Data Encryption Facts Your Business Needs To Know

Data breaches and cyber threats loom like shadows in the digital landscape, underscoring the importance of encryption as a fundamental safeguard for...

Read More
Wall covered with numerical code shaped as a key hole

4 min read

Don’t avoid FDE adoption anymore!

Picture by anyaberkut | iStock

Read More
A woman inserting USB device into laptop

4 min read

USB Security: Protect your devices with our 8 tips

Are you worried about security of your USB device? In this blog post we will share our 8 tips for USB security and we will show how DriveLock...

Read More
Wooden dices with letters

1 min read

DriveLock announces distributorship with CyberSoftwareDistributors

CSD will manage the distribution of DriveLock security software to North America Munich, Germany & Monument, Colo., June 28, 2018 – DriveLock SE, a...

Read More
Frau schreibt Pressemitteilung

2 min read

TOP 100: DriveLock is among the innovation leaders in 2018

Überlingen - For the 25th time, the TOP 100 Competition is honoring Germany’s most innovative medium-sized companies. This year, one of these...

Read More
Woman writing press release

1 min read

Commentary on Linux Attacks

Munich, 30 October 2017

Read More
Zwei Männer schütteln sich die Hände

2 min read

DriveLock SE signs partnership with Romsym Data S. R. L.

First joint event with the new distributor is the Romsym Data Day 2017 Munich, Germany. 26 October 2017 – DriveLock SE, the endpoint protection...

Read More
Man writing on the secured laptop

1 min read

Comment on Bluetooth vulnerability Blueborne

Dear readers, News of a security vulnerability in Bluetooth connections caused a furore last week among manufacturers and users of Bluetooth-enabled...

Read More
Woman writing press release

1 min read

DriveLock SE expands in USA and APAC

Endpoint Protection Platform now available in EMEA, USA and Asia-Pacific region

Read More
Woman writing a press release

1 min read

DriveLock announces new product updates

Munich, Germany. 20 July 2017 – DriveLock SE has announced two new product releases, both of which are available immediately to customers.

Read More
Woman writing press release

2 min read

DriveLock honoured as innovation leader

Überlingen, Germany. – DriveLock SE has been confirmed as one of the innovation leaders among Germany’s midsized firms.

Read More