Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

Gesperrte Computersoftware

6 min read

Hackers vs. companies: 12 strategies for defence against hacking

In an era where technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking into systems for ethical reasons to malicious attacks on confidential information, hacking has many...

Read More
Person updating software on the computer

2 min read

What Did We Learn from the CrowdStrike Incident: A Question of Philosophy, Not Sovereignty?

The recent CrowdStrike incident has often been framed as an issue of digital sovereignty. While this is not entirely wrong, we believe it represents...

Read More
ISG 2024 Badge

6 min read

DriveLock's Impressive Performance in the ISG Assessment

The digital landscape is rapidly evolving, and with it, the threats that companies face daily. Data leaks and losses can have serious consequences...

Read More
Dr. Phillip Mueller during Harvard Faculty Club's Maximize Your Board's Potential program

3 min read

Addressing Cybersecurity Strategically: A Board-Level Conversation

June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...

Read More
Human Risk & Awareness Banner

2 min read

Human Risk & Awareness: Effective measures against cyber threats

The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...

Read More

6 min read

Why is TÜV certification essential for your company?

In a world in which the safety, quality and reliability of products and services are becoming increasingly important, TÜV certification plays a...

Read More
Digital lock above laptopn on which a person is working on

3 min read

How packet filtering works explained

Cyber threats are constantly on the rise and organisations are faced with the challenge of protecting their networks from a wide range of attacks and...

Read More
Woman typing on the laptop

4 min read

Safe and secure: The most important facts about content filtering

In the age of digital communication and internet access, content filtering has become an indispensable part of cyber security. The ability to control...

Read More
DriveLock named Winner of the Global InfoSec Awards

2 min read

DriveLock Named Winner of the Coveted Global InfoSec Awards during RSA Conference 2024

DriveLock is proud to announce we have won the following award from Cyber Defense Magazine (CDM), the industry’s leading electronic information...

Read More
SIEM on a logo

2 min read

What is SIEM and Why Your Business Needs It?

Today more than ever, the digital landscape requires powerful security measures to effectively counter the numerous cyber security threats. In view...

Read More