5 min read
Top Penetration Testing Tools for Ethical Hackers
Penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
5 min read
Penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to as "white-hat hacking," and it involves skilled...
4 min read
Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...
3 min read
Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
4 min read
Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness programs in...
1 min read
The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...
4 min read
The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...
2 min read
“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...
1 min read
Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...
3 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...