7 min read
DriveLock
6 min read
Hackers vs. companies: 12 strategies for defence against hacking
In an era where technology is ubiquitous and data has become a valuable resource, the concept of hacking has taken on a prominent role. From hacking...
2 min read
What Did We Learn from the CrowdStrike Incident: A Question of Philosophy, Not Sovereignty?
The recent CrowdStrike incident has often been framed as an issue of digital sovereignty. While this is not entirely wrong, we believe it represents...
6 min read
DriveLock's Impressive Performance in the ISG Assessment
The digital landscape is rapidly evolving, and with it, the threats that companies face daily. Data leaks and losses can have serious consequences...
3 min read
Addressing Cybersecurity Strategically: A Board-Level Conversation
June 2024 marked the 11th anniversary of the Harvard Faculty Club's Maximize Your Board's Potential program. It was the second time I've had the...
2 min read
Human Risk & Awareness: Effective measures against cyber threats
The human firewall is the first and most important line of defence in the fight against cyberattacks. With the DriveLock Human Risk & Awareness...
6 min read
Why is TÜV certification essential for your company?
In a world in which the safety, quality and reliability of products and services are becoming increasingly important, TÜV certification plays a...
4 min read
How packet filtering works explained
Cyber threats are constantly on the rise and organisations are faced with the challenge of protecting their networks from a wide range of attacks and...
5 min read
Safe and secure: The most important facts about content filtering
In the age of digital communication and internet access, content filtering has become an indispensable part of cyber security. The ability to control...
2 min read
DriveLock Named Winner of the Coveted Global InfoSec Awards
DriveLock is proud to announce we have won the following award from Cyber Defense Magazine (CDM), the industry’s leading electronic information...