3 min read
EDR - the Sherlock Holmes of cyber security
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
3 min read
In our last blog post " Silent hacker attacks and the need for detection mechanisms" we talked about covert cyber attacks and the need for detection...
4 min read
Again and again, we read about hacking incidents where attackers can spy on a company, an authority or a ministry and remain unnoticed for months...
2 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...
2 min read
In recent weeks, the coronavirus has become the main topic for the global population, health authorities, politicians and organisations. For hackers,...
3 min read
Enter the concept of "Zero Trust" in cybersecurity. It's not just a buzzword; it's a paradigm shift. Zero Trust challenges conventional wisdom and...
4 min read
In today's rapidly evolving digital landscape, prioritizing the safety and stability of your systems is crucial. Given the increasing sophistication...
4 min read
TABLE OF CONTENT WHAT IS A FIREWALL? WHAT IS A HUMAN FIREWALL? STRENGTHEN YOUR FIREWALL'S WEAKEST LINK AVOID PREVENTABLE INCIDENTS HOW DRIVELOCK CAN...
5 min read
Are you worried about security of your USB device? In this blog post we will share our 8 tips for USB security and we will show how DriveLock...