2 min read
Are you compliant for essential 8 in cyber security?
“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
2 min read
“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...
1 min read
Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...
3 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...
2 min read
The importance of endpoint security continues to be prevalent in today's threat landscape as 70% of all breaches are found to have originated from...
4 min read
Entering into a new decade requires businesses and professionals to rethink, reconsider and update their approach to IT security and ensuring the...
5 min read
The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...
6 min read
The major strategic goal of cyber security in the digital age is to combat and mitigate data breaches. A company's data is its most valuable asset to...
4 min read
TABLE OF CONTENT WHY TODAY'S IT SECURITY ARCHITECTURES SHOULD BE DESIGNED ACCORDING TO THE ZERO TRUST MODEL WHAT USED TO WORK DOES NOT WORK ANYMORE:...
3 min read
The German IT security specialist supports the paradigm shift in IT security with its fully integrated Zero Trust Platform Munich, Germany. 28...
3 min read
Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...