
LocateRisk is Best Cybersecurity Startup 2024 DACH
LocateRisk wins ATHENE Startup Award UP24@it-sa as Best Cybersecurity Startup 2024 DACH.

Excellent supplier risk management
LocateRisk awarded second place in WirtschaftsWoche's "Best of Technology Award 2024".

Supplier risk management made easy
Increase the efficiency of your supplier evaluations with automated workflows and processes.

Cybersecurity in the digital supply chain
This article provides you with an overview of the current status regarding GDPR, NIS2, DORA and CRA.

Cyberattacks on the supply chain
Cyberattacks on the supply chain can develop into avalanche-like damage scenarios. An overview of significant attacks and their effects.

DORA: Digital Operational Resilience Act
What DORA means, who it affects and where exactly LocateRisk can provide support.

New partner DATAGROUP on board
New in the LocateRisk partner network: We are very pleased about the partnership with DATAGROUP, one of the leading IT service providers in Germany.

Distr@l funding accelerates development of new security technology
Thanks to Distr@l funding from the state of Hesse, we are able to develop our new LR-Cont security technology. An accessible cyber security solution for companies of all kinds.

DIGITAL X 2023 - Be digital. Stay human.
We are at the start when Europe's leading digitization initiative brings together society, business and politics.

Funding Priority: Analysis of the Current State of IT Security
The NRW program "MID-Digitale Sicherheit" (MID Digital Security) subsidizes IST analyses that enable you to identify and close security gaps in your company.

More security in the supply chain
For prevention in global supply chains: LocateRisk has automated supplier IT risk management.

IT Security Act 2.0 and NIS 2
Learn what's already in place today, what's coming in the future, and why your implementation status needs to be put to the test now.

Lay the Foundation for Your IT Protection - with These 5 Tips
New cyber attacks every day and no end in sight. Learn here how you can fundamentally protect your company in 5 steps.

EU Directive NIS2 Now Official
Learn who is affected, what's changing, and how we're helping you meet the requirements today.