Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

Locked laptop

6 min read

10 tips for preventing data breaches

Recent headlines about massive data breaches have once again reminded us how vulnerable our personal information is in the digital world. Whether it's the theft of credit card details, the misuse of personal profiles or unauthorized access to...

Read More
Photo of the DriveLock stand during it-sa 2025

3 min read

it-sa 2025: DriveLock focuses on digital sovereignty and cyber resilience

it-sa 2025, Europe's largest trade fair for IT security in Nuremberg, has closed its doors and was once again the central meeting place for everyone...

Read More
two people shaking hands

4 min read

The Access Point Name (APN): Why it is essential for your company's endpoint security

As an IT security professional, you know that mobile devices pose a major challenge to endpoint security. Smartphones, tablets and other networked...

Read More
Laptop, cell phone and tablet on the table

5 min read

The role of mobile device management (MDM) in modern endpoint protection

With the proliferation of mobile devices in the workplace, securing endpoints is becoming increasingly complex. Companies need to find ways to ensure...

Read More
Code on the laptop

4 min read

Why companies need an SSL proxy - opportunities and challenges

SSL proxies are playing an increasingly important role in today's digital business world. They offer companies an effective way of encrypting data...

Read More
Computer connected with many cables

5 min read

Understanding the basics of a forward proxy

In our hyper-connected world, the flow of data between clients and servers is constant and unstoppable. Ensuring a secure, efficient and manageable...

Read More
Silhouette of a man with a sign for a digital lock

7 min read

Proxy Firewall 101: An introduction to its functions and applications

One of the most effective measures for increasing network security is the use of firewalls. While traditional firewalls offer basic protection, more...

Read More
Graphic of a reverse proxy on a laptop

6 min read

Reverse proxy explained: How it works and why you need it

In the fast-paced digital landscape, where seamless web experiences and robust security are paramount, organizations are constantly looking for ways...

Read More

1 min read

Denmark and Germany Deepen Defense Ties:  Is Cybersecurity Being Left Behind?

The German–Danish Defense Exchange, held at the German Embassy in Copenhagen with a reception at Tender Elbe in Nyholm on Monday Augst 20th 2025,...

Read More
Laptop on the desk with a label open access

6 min read

Understanding the cornerstones of the Open Web

In an increasingly networked world, the Open Web is a crucial element for the free exchange of information and the promotion of digital innovation....

Read More