Springe zum Hauptinhalt
COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

Data Security

two people shaking hands

4 min read

The Access Point Name (APN): Why it is essential for your company's endpoint security

As an IT security professional, you know that mobile devices pose a major challenge to endpoint security. Smartphones, tablets and other networked...

Read More
Code on the laptop

4 min read

Why companies need an SSL proxy - opportunities and challenges

SSL proxies are playing an increasingly important role in today's digital business world. They offer companies an effective way of encrypting data...

Read More
Silhouette of a man with a sign for a digital lock

7 min read

Proxy Firewall 101: An introduction to its functions and applications

One of the most effective measures for increasing network security is the use of firewalls. While traditional firewalls offer basic protection, more...

Read More
Error graphic in red via USB input

5 min read

Indicators of Compromise (IoCs): The early warning signs of a cyber attack

Cyber threats are evolving rapidly. For organizations in healthcare, manufacturing and critical infrastructure, it is crucial to remain vigilant....

Read More
Person logging into their account on their computer

6 min read

The least privilege principle: less is more - even when it comes to security!

Cyber attacks are constantly evolving and becoming ever more sophisticated. It is therefore becoming increasingly important for companies, especially...

Read More
Cyber threat intelligence console

5 min read

How threat intelligence helps to protect your company?

The threat situation in cyberspace is constantly evolving. New attack vectors, techniques and vulnerabilities emerge every day. It is therefore...

Read More
Anzeige mit Cybersicherheitssymbolen

7 min read

Application Whitelising: Securing Data Encryption Through Controlled Execution

While data encryption forms a fundamental layer of protection, ensuring only trusted applications can access and process encrypted data is equally...

Read More
Router with various connectors

4 min read

IP addresses: The hidden risks to your company network security

An IP address is the cornerstone of digital communication in any working environment and serves as a unique identifier for devices connected to a...

Read More
Security signature on the computer

4 min read

How companies can benefit from two-factor authentication?

In a digitized world where companies and businesses are increasingly reliant on technology and online services, the security of sensitive data and...

Read More
Hacker on the laptop

6 min read

Introduction to the Deep Web: The Hidden Internet

From checking the latest news and shopping to communicating with friends and family - the internet is everywhere. But what most of us see and use is...

Read More