Springe zum Hauptinhalt

HUMAN RISK &
AWARENESS


Security Awareness

Human Risk Assessment



HYPERSECURE Platform

DriveLock_Capterra_Badge

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Blue banner Proxy server via laptop

3 min read

Facts and myths about proxy servers

Proxy servers are an indispensable tool in the digital age, but many misconceptions surround them. Proxy servers that often lead to misunderstandings. In this article, we clarify the most common facts and myths surrounding proxy servers and shed...

Read More
Digital lock

6 min read

IPS 101: Basics and benefits of intrusion prevention systems

The security of digital infrastructures is now more of a focus than ever as the threat of cyber attacks continues to increase. In this context , the...

Read More
digital encryption

7 min read

Basics of end-to-end encryption

Digital communication has become an integral part of our everyday lives, and with it comes a growing need for security and privacy. In a world where...

Read More
Banner for 2024.2 Drivelock Update

2 min read

New DriveLock version 2024.2 is already available

We are pleased to announce the latest version of DriveLock - version 2024.2 is now available to all customers. With this release, you can expect...

Read More
Stadtsilhouette

5 min read

Mega Darknet Explained

In the shadowy corners of the Internet lies a vast, complex and often misunderstood area known as the mega-darknet. Unlike the standard darknet,...

Read More
Woman working on a code

4 min read

Sandbox in cyber security: what is it and why is it important?

Cybersecurity is a constantly evolving field in which new threats and security solutions are constantly emerging. One of the most effective...

Read More
Person, die auf einer schwarzen Tastatur tippt

5 min read

Top Penetration Testing Tools for Ethical Hackers

Penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled...

Read More
Page layout of login page

5 min read

How does password manager simplify corporate security?

In the digital business world, where the number of online accounts and IT systems used is constantly growing, the protection of sensitive information...

Read More
Person writing on a browser

5 min read

Understanding SEO Poisoning: A Growing Online Threat

Search engines like Google and Bing are our go-to tools for finding information quickly and easily. However, as helpful as these search engines are,...

Read More
Woman sitting in front of hacked computer

4 min read

Man in the Middle Attack Example: How It Works

An increased reliance on technology comes the growing risk of cyber threats, one of the most dangerous being Man-in-the-Middle (MITM) attacks. A MITM...

Read More