Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

IT Security

Stadtsilhouette

5 min read

Mega Darknet Explained

In the shadowy corners of the Internet lies a vast, complex and often misunderstood area known as the mega-darknet. Unlike the standard darknet,...

Read More
Woman working on a code

4 min read

Sandbox in cyber security: what is it and why is it important?

Cybersecurity is a constantly evolving field in which new threats and security solutions are constantly emerging. One of the most effective...

Read More
Person writing on a browser

5 min read

Understanding SEO Poisoning: A Growing Online Threat

Search engines like Google and Bing are our go-to tools for finding information quickly and easily. However, as helpful as these search engines are,...

Read More
Person updating software on the computer

2 min read

What Did We Learn from the CrowdStrike Incident: A Question of Philosophy, Not Sovereignty?

The recent CrowdStrike incident has often been framed as an issue of digital sovereignty. While this is not entirely wrong, we believe it represents...

Read More
Dr. Phillip Mueller during Harvard Faculty Club's Maximize Your Board's Potential program

3 min read

Addressing Cybersecurity Strategically: A Board-Level Conversation

June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...

Read More

6 min read

Why is TÜV certification essential for your company?

In a world in which the safety, quality and reliability of products and services are becoming increasingly important, TÜV certification plays a...

Read More
Woman typing on the laptop

4 min read

Safe and secure: The most important facts about content filtering

In the age of digital communication and internet access, content filtering has become an indispensable part of cyber security. The ability to control...

Read More
SIEM on a logo

2 min read

What is SIEM and Why Your Business Needs It?

Today more than ever, the digital landscape requires powerful security measures to effectively counter the numerous cyber security threats. In view...

Read More
A project of a digital car

1 min read

TISAX®: More information security for the automotive industry

With networking and globalisation in the automotive industry, internal and external risks for companies are growing. The TISAX® (Trusted Information...

Read More
Servers

6 min read

A beginner's guide to understanding proxy servers

A proxy server acts as an intermediary between a client and a server. It allows clients to establish indirect network connections to other servers...

Read More