4 min read
Silent hacker attacks and the need for detection mechanisms
Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
4 min read
Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...
3 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...
2 min read
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...
3 min read
Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...
8 min read
Prioritizing the safety and stability of your systems is crucial. Given the increasing sophistication of cyber threats, patch management emerges as a...
5 min read
The Internet of Things (IoT) and its industrial counterpart, the Industrial Internet of Things (IIoT), have revolutionized the way we live and work....
8 min read
While firewalls, antivirus software, and intrusion detection systems serve as essential security layers, human error remains the weakest link in...
4 min read
Managing endpoint security can feel like a constant uphill battle. Keeping up with the latest threats, ensuring all devices are patched and...
7 min read
USB ports are ubiquitous – found on laptops, desktop computers, and even on devices in manufacturing environments or healthcare settings. They enable...