4 min read
What are Common Vulnerabilities and Exposures? An introduction
Have you ever wondered where the real weak points in your IT infrastructure are? Or how attackers can exploit them? As your IT security expert, today...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
4 min read
Have you ever wondered where the real weak points in your IT infrastructure are? Or how attackers can exploit them? As your IT security expert, today...
6 min read
With the proliferation of mobile devices in the workplace, securing endpoints is becoming increasingly complex. Companies need to find ways to ensure...
7 min read
As businesses leverage interconnected technologies to drive operational efficiency and scale, they simultaneously expand their digital attack...
2 min read
Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.
4 min read
Munich, Germany. 01.07.2020 – DriveLock today unveiled its new Release 2020.1 that offers a wide range of enhancements and extensions. The new...