Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT Security

Drivelock_Service_Blog_CTA_EN

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
Drivelock_Service_Newsletter_CTA

Drivelock_Service_Blog_CTA_EN

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Man sitting in front of a computer at work

9 min read

12 onion websites: A look at the dark web

In the depths of the internet, there is an area that is not accessible via conventional search engines: the dark web. This part of the internet is often portrayed as mysterious and secretive, and for good reason. It offers an anonymity that has both...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More
VPN graphic with lock, computer, network

8 min read

The importance of VPNs for secure business

One of the key technologies that plays a decisive role in this is the Virtual Private Network (VPN). VPNs have become an indispensable tool in...

Read More
Router with various connectors

5 min read

IP addresses: The hidden risks to your company network security

An IP address is the cornerstone of digital communication in any working environment and serves as a unique identifier for devices connected to a...

Read More
Security signature on the computer

5 min read

How companies can benefit from two-factor authentication?

Cyber risk is a primary concern for every organization leveraging technology and online services. The constant threat of sophisticated attacks...

Read More
Keyboard with a fingerprint on it

7 min read

Your enterprise Single Sign-On security guide

Efficient identity and access management is crucial for modern organizations to ensure both the security and user-friendliness of their digital...

Read More
Hacker on the laptop

6 min read

Introduction to the Deep Web: The Hidden Internet

From checking the latest news and shopping to communicating with friends and family - the internet is everywhere. But what most of us see and use is...

Read More
Military equipment

5 min read

Cybersecurity measures in the defense sector in Germany

The classic concept of defense - tanks, planes, troops - is now supplemented by a battlefield that is invisible to the naked eye: cyberspace. For the...

Read More
DNS meaning in a graphic

8 min read

The invisible threat: understanding DNS leaks and their impact

Data protection and online security are of paramount importance. From encrypting your connection to using VPNs (Virtual Private Networks), there are...

Read More
How is an IT security concept for the healthcare sector structured?

5 min read

IT security concept for the healthcare sector - the most important information

Digitalization in the healthcare sector is in full swing: hospitals are becoming "intelligent" and are increasingly networked, patient records are...

Read More