Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

Blog

News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.

IT Security (4)

Gesichertes Passwort auf dem Laptop

6 min read

21 Essential Steps to Take When Your Company Faces a Cyber Attack

In the current age of digitalization, companies across various sectors and sizes face a growing risk of cyberattacks. Despite implementing...

Read More
Woman writing press release

4 min read

12 tips on preventing social engineering attacks

In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...

Read More
Man sitting in front of DriveLock's laptop in the office

4 min read

5 reasons to run DriveLock in the cloud

Your organization is much safer with a good security product. That’s a fact. But think of all the work: With an on-premises solution you’ll have to...

Read More
Zero Trust icons

4 min read

How to implement Zero Trust Strategy in 3 easy steps

The major strategic objective of cyber security in the digital age is to combat and contain privacy violations. A company's data is its most valuable...

Read More
Two experts sitting in front of computer which displays a code

4 min read

This is how IT security works with Zero Trust today

TABLE OF CONTENT WHY TODAY'S IT SECURITY ARCHITECTURES SHOULD BE DESIGNED ACCORDING TO THE ZERO TRUST MODEL WHAT USED TO WORK DOES NOT WORK ANYMORE:...

Read More
Digitaler Chip

2 min read

Is it really Artificial Intelligence?

by Alfred Ortiz, CEO of CyberSoftwareDistributors LLC and Doctoral Candidate in Information Systems at IE University in Madrid, Spain.

Read More