Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock

A distressed healthcare professional staring at a infected computer

5 min read

Impact Of Ransomware On Healthcare Systems

Cybersecurity is as essential as medical expertise. Ransomware attacks on healthcare systems are increasingly putting patient lives and sensitive data at risk. However, the rise of ransomware attacks has exposed vulnerabilities in healthcare...

Read More
Drivelocks stand at the it-sa trade fair 2024

3 min read

DriveLock at it-sa 2024: A review of exciting days in Nuremberg

The it-sa trade fair in Nuremberg, Europe's largest trade fair for IT security, took place from October 22 to 24, 2024 and once again provided a...

Read More
Blue banner Proxy server via laptop

3 min read

Facts and myths about proxy servers

Proxy servers are an indispensable tool in the digital age, but many misconceptions surround them. Proxy servers that often lead to...

Read More
Digital lock

5 min read

IPS 101: Basics and benefits of intrusion prevention systems

The security of digital infrastructures is now more of a focus than ever as the threat of cyber attacks continues to increase. In this context , the...

Read More
digital encryption

5 min read

Basics of end to end encryption

Digital communication has become an integral part of our everyday lives, and with it comes a growing need for security and privacy. In a world where...

Read More
Banner for 2024.2 Drivelock Update

2 min read

New DriveLock version 2024.2 is already available

We are pleased to announce the latest version of DriveLock - version 2024.2 is now available to all customers. With this release, you can expect...

Read More
Stadtsilhouette

5 min read

Mega Darknet Explained

In the shadowy corners of the Internet lies a vast, complex and often misunderstood area known as the mega-darknet. Unlike the standard darknet,...

Read More
Woman working on a code

4 min read

Sandbox in cyber security: what is it and why is it important?

Cybersecurity is a constantly evolving field in which new threats and security solutions are constantly emerging. One of the most effective...

Read More
Person, die auf einer schwarzen Tastatur tippt

4 min read

Top Penetration Testing Tools for Ethical Hackers

In the ever-evolving landscape of cybersecurity, penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to...

Read More
Page layout of login page

4 min read

How does password manager simplify corporate security?

In the digital business world, where the number of online accounts and IT systems used is constantly growing, the protection of sensitive information...

Read More