Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

Laptop with open web meeting

4 min read

The BSI: The protective shield of the digital world in Germany

The digital world offers us enormous opportunities: increased efficiency, networking and innovations that make our lives easier. But as digitalization increases, so do the risks. Cyberattacks, data misuse and digital espionage threaten not only...

Read More

1 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards 2025

DriveLock Wins Market Innovator Endpoint Security Award in 13th Annual Global InfoSec Awards at #RSAC 2025. DriveLock is proud to announce we have...

Read More
A distressed healthcare professional staring at a infected computer

6 min read

Impact Of Ransomware On Healthcare Systems

Cybersecurity is as essential as medical expertise. Ransomware attacks on healthcare systems are increasingly putting patient lives and sensitive...

Read More

2 min read

DriveLock SE expands HYPERSECURE platform with strategic acquisition of idgard

With the integration of Sealed Cloud technology, DriveLock strengthens its security platform and sets another milestone for digital sovereignty and...

Read More
Wifi-Kabel zum Computer auf dunkelblauem Hintergrund

8 min read

Introduction to the Tor Network: security and privacy

The Tor network provides powerful tools for enhancing online privacy and anonymity, but these benefits come with certain trade-offs. While many users...

Read More
Cloud with a title for cyber security

7 min read

10 protection tips against denial-of-service attacks for companies

The booming online market presents companies with vast opportunities for growth. However, this reliance on digital infrastructure and online services...

Read More
Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

Cyberattacks are a persistent hazard, and adware is among the most frequent types of malware devices encounter. Adware isn't just an annoyance that...

Read More
Man sitting in front of a computer at work

8 min read

12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More
VPN graphic with lock, computer, network

8 min read

The importance of VPNs for secure business

One of the key technologies that plays a decisive role in this is the Virtual Private Network (VPN). VPNs have become an indispensable tool in...

Read More