3 min read
Addressing Cybersecurity Strategically: A Board-Level Conversation
June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
3 min read
June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...
2 min read
The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...
2 min read
Today more than ever, the digital landscape requires powerful security measures to effectively counter the numerous cyber security threats. In view...
1 min read
With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information...
5 min read
The darknet, also known as the dark web, is a hidden part of the internet that cannot be accessed via normal search engines such as Google or Bing....
6 min read
A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...
6 min read
Against the backdrop of growing threats to corporate data, hard drive encryption is no longer an option, but a necessity. BitLocker, Windows'...
3 min read
The number of attacks is constantly increasing and attackers are becoming more and more targeted and tricky. They specifically exploit the human...
5 min read
The Cybersecurity Maturity Model Certification (CMMC) 2.0 is more than just a compliance requirement for defense contractors—it's a strategic...
4 min read
An Intrusion Detection System (IDS) emerges as a stalwart defender, standing vigilant to detect and thwart potential threats within computer...