4 min read
What are Common Vulnerabilities and Exposures? An introduction
Have you ever wondered where the real weak points in your IT infrastructure are? Or how attackers can exploit them? As your IT security expert, today...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
4 min read
Have you ever wondered where the real weak points in your IT infrastructure are? Or how attackers can exploit them? As your IT security expert, today...
7 min read
Protecting sensitive information is no longer optional for organizations managing our critical infrastructure. Whether you are overseeing patient...
5 min read
The legal framework surrounding data protection is no longer just for lawyers. IT professionals are on the front lines of ensuring that your...
7 min read
A security breach is more than a technical headache; it represents a direct threat to patient safety and production continuity. When a hospital...
5 min read
We all leave behind digital traces - whether at work, when banking online or on social networks. These traces are valuable and in need of protection....
6 min read
Recent headlines about massive data breaches have once again reminded us how vulnerable our personal information is in the digital world. Whether...
4 min read
In the dynamic world of IT security, a reactive approach is no longer sufficient. Relying solely on cleaning up after a breach leaves your...
6 min read
The IT security landscape is constantly evolving, and with it the methods of authentication. One of the most promising developments is passwordless...
7 min read
The threat situation in cyberspace is constantly evolving. New attack vectors, techniques and vulnerabilities emerge every day. It is therefore...
8 min read
Anyone with an online account - be it for email, social media, banking or accessing corporate networks - is potentially at risk. While we focus on...