Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT Security

Drivelock_Service_Blog_CTA_EN

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
Drivelock_Service_Newsletter_CTA

Drivelock_Service_Blog_CTA_EN

DriveLock

Man holding a protective shield

8 min read

Your protective shield with web application firewall

Web applications are the open gateway to your critical data. Anyone who does business online knows how important these applications are for day-to-day operations. But this open gateway also attracts unwanted attention: cybercriminals are constantly...

Read More
Laptop with open web meeting

4 min read

The BSI: The protective shield of the digital world in Germany

The digital world offers us enormous opportunities: increased efficiency, networking and innovations that make our lives easier. But as...

Read More

1 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards 2025

DriveLock Wins Market Innovator Endpoint Security Award in 13th Annual Global InfoSec Awards at #RSAC 2025. DriveLock is proud to announce we have...

Read More
A distressed healthcare professional staring at a infected computer

6 min read

Impact Of Ransomware On Healthcare Systems

Cybersecurity is as essential as medical expertise. Ransomware attacks on healthcare systems are increasingly putting patient lives and sensitive...

Read More

2 min read

DriveLock SE expands HYPERSECURE platform with strategic acquisition of idgard

With the integration of Sealed Cloud technology, DriveLock strengthens its security platform and sets another milestone for digital sovereignty and...

Read More
Wifi-Kabel zum Computer auf dunkelblauem Hintergrund

8 min read

Introduction to the Tor Network: security and privacy

The Tor network provides powerful tools for enhancing online privacy and anonymity, but these benefits come with certain trade-offs. While many users...

Read More
Cloud with a title for cyber security

7 min read

10 protection tips against denial-of-service attacks for companies

The booming online market presents companies with vast opportunities for growth. However, this reliance on digital infrastructure and online services...

Read More
Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

Cyberattacks are a persistent hazard, and adware is among the most frequent types of malware devices encounter. Adware isn't just an annoyance that...

Read More
Man sitting in front of a computer at work

9 min read

12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More