4 min read
Top Penetration Testing Tools for Ethical Hackers
In the ever-evolving landscape of cybersecurity, penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to...
News, information and tips on IT security. Protect your endpoints with DriveLock's effective security solution.
4 min read
In the ever-evolving landscape of cybersecurity, penetration testing tools are the ethical hacker's best friend. Ethical hacking is often referred to...
4 min read
Our series of articles examines the risks of sharing files through OneDrive or Teams and offers advice on how to ensure information security without...
3 min read
Have you ever stopped thinking about who has access to the files you've shared via OneDrive or Teams? With so much collaboration happening online...
4 min read
In this blog post, we will clrify to you what is a social engineering, how do hackers proceed in order to get confidential data from you and, we will...
3 min read
In our article "Security Awareness Programs: IT Security Starts with the Users." we discussed that the users need to feel involved with the awareness...
1 min read
The second major release of this year is notably not only for extensive improvements but also for the unification of management and configuration...
4 min read
The background story is that despite the existence of the Kaseya vulnerability, a decent endpoint security solution could have provided better...
2 min read
“There are only two types of companies: those that have been hacked, and those that will be." Former FBI Director Robert Mueller No one can escape...
1 min read
Prevention Solutions ISG Provider Lens™ lauds zero-trust approach, solution features and lack of backdoor in a country with extremely demanding data...
2 min read
The Australian Cyber Security Centre (ACSC) is an Australian Government intelligence and security agency who provides advice and assistance on...