Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Man holding a protective shield

7 min read

Your protective shield with web application firewall

Web applications are the open gateway to your critical data. Anyone who does business online knows how important these applications are for day-to-day operations. But this open gateway also attracts unwanted attention: cybercriminals are constantly...

Read More
Laptop with open web meeting

4 min read

The BSI: The protective shield of the digital world in Germany

The digital world offers us enormous opportunities: increased efficiency, networking and innovations that make our lives easier. But as...

Read More

1 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards 2025

DriveLock Wins Market Innovator Endpoint Security Award in 13th Annual Global InfoSec Awards at #RSAC 2025. DriveLock is proud to announce we have...

Read More
A distressed healthcare professional staring at a infected computer

5 min read

Impact Of Ransomware On Healthcare Systems

Cybersecurity is as essential as medical expertise. Ransomware attacks on healthcare systems are increasingly putting patient lives and sensitive...

Read More

2 min read

DriveLock SE expands HYPERSECURE platform with strategic acquisition of idgard

With the integration of Sealed Cloud technology, DriveLock strengthens its security platform and sets another milestone for digital sovereignty and...

Read More
Wifi-Kabel zum Computer auf dunkelblauem Hintergrund

7 min read

Introduction to the Tor Network: security and privacy

The Tor network provides powerful tools for enhancing online privacy and anonymity, but these benefits come with certain trade-offs. While many users...

Read More
Cloud with a title for cyber security

6 min read

10 protection tips against denial-of-service attacks for companies

A constantly growing online market offers companies numerous opportunities for growth and success. But with increasing reliance on online services...

Read More
Digital lock over the laptop

6 min read

Adware is not malware, but still a threat

In today's digital world, cyberattacks are a constant threat, and adware attacks are one of the most common forms of malware. Adware can not only...

Read More
Man sitting in front of a computer at work

7 min read

12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More