Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner  Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT SecurityTo the Blog

DriveLock

Ingenieur in der Fabrik

3 min read

DriveLock support to achieve mandated CMMC and NIST certifications

U.S. companies seeking contracts from the U.S. Department of Defense (DoD) and other federal agencies are required to demonstrate strict IT security controls. The DoD imposes strict requirements on the data shared between it and contractors and...

Read More
Infected laptop

2 min read

Log4j Zero-Day Exploit: Vulnerability Scanner Shows Need for Attention

Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.

Read More
Loading time of cyber attack

4 min read

Log4j Hack – the Patch Came Too Late

"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security...

Read More
Digitales Schloss über dem Laptop

1 min read

PUR-S 2022: DriveLock Stays as the Endpoint Protection Champion

DriveLock has been voted one of the Champions in Endpoint Protection in the "Professional User Rating - Security Solutions (PUR-S)" survey conducted...

Read More
Cyber attack loading time

DriveLock Products Not Affected by Log4j Vulnerability

National information security authorities are warning: A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected...

Read More
Holzwürfel mit Buchstaben

1 min read

Release 2021.2 – DriveLock Operations Center is the Central Console

The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...

Read More
Secutiry written in numerical code

4 min read

Could Kaseya VSA supply chain ransomware attack have been prevented?

The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...

Read More
Checklist marked in red

2 min read

Are you compliant for essential 8 in cyber security?

“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

Read More
Digitales Schloss über dem Laptop

1 min read

DriveLock received Common Criteria EAL3+ certification

Munich, Germany – DriveLock's Device Control and Application Control solutions received Common Criteria certification from the independent Swedish...

Read More
Cyberattack loading time

2 min read

Textbook cyberattack on US pipeline operator

Recently, the attack by the "Darkside” hacker group on the pipeline operator Colonial in the USA has once again brought the topic of IT security into...

Read More