Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Cyber Security

Dr. Phillip Mueller during Harvard Faculty Club's Maximize Your Board's Potential program

3 min read

Addressing Cybersecurity Strategically: A Board-Level Conversation

June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...

Read More
Human Risk & Awareness Banner

2 min read

Human Risk & Awareness: Effective measures against cyber threats

The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...

Read More
SIEM on a logo

2 min read

What is SIEM and Why Your Business Needs It?

Today more than ever, the digital landscape requires powerful security measures to effectively counter the numerous cyber security threats. In view...

Read More
A project of a digital car

1 min read

TISAX®: More information security for the automotive industry

With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information...

Read More
Person browsing a dark net

5 min read

The Dangers and Benefits of Using the Dark Web

The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....

Read More
Servers

6 min read

A beginner's guide to understanding proxy servers

A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...

Read More
Secured disc with a red lock

6 min read

Why is BitLocker activation alone not enough?

Against the backdrop of growing threats to corporate data, hard drive encryption is no longer an option, but a necessity. BitLocker, Windows'...

Read More
digitales Schloss

3 min read

Application Control: Robust Security Solution for Your Company

The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...

Read More

5 min read

Five Steps to CMMC 2.0 Compliance

The Cybersecurity Maturity Model Certification (CMMC) 2.0 is more than just a compliance requirement for defense contractors—it's a strategic...

Read More
Coded detection system

4 min read

Beyond Firewalls: How an Intrusion Detection System Safeguards Your Business?

An Intrusion Detection System (IDS) emerges as a stalwart defender, standing vigilant to detect and thwart potential threats within computer...

Read More