![image](https://locaterisk.com/wp-content/uploads/2024/07/GDPR-DORA-NIS2-CRA-632px.png)
Cybersecurity in the digital supply chain
This article provides you with an overview of the current status regarding GDPR, NIS2, DORA and CRA.
![](https://locaterisk.com/wp-content/uploads/2024/07/Kettenglieder_Generisch_03-1-Kopie.jpg)
Cyberattacks on the supply chain
Cyberattacks on the supply chain can develop into avalanche-like damage scenarios. An overview of significant attacks and their effects.
![](https://locaterisk.com/wp-content/uploads/2024/06/DORA-2.png)
DORA: Digital Operational Resilience Act
What DORA means, who it affects and where exactly LocateRisk can provide support.
![](https://locaterisk.com/wp-content/uploads/2022/11/News3_shutterstock_1508286737.png)
New partner DATAGROUP on board
New in the LocateRisk partner network: We are very pleased about the partnership with DATAGROUP, one of the leading IT service providers in Germany.
![](https://locaterisk.com/wp-content/uploads/2023/09/Distr@l-Foerderung-Hessen-1.png)
Distr@l funding accelerates development of new security technology
Thanks to Distr@l funding from the state of Hesse, we are able to develop our new LR-Cont security technology. An accessible cyber security solution for companies of all kinds.
![](https://locaterisk.com/wp-content/uploads/2023/08/Digital-X-2023.png)
DIGITAL X 2023 - Be digital. Stay human.
We are at the start when Europe's leading digitization initiative brings together society, business and politics.
![](https://locaterisk.com/wp-content/uploads/2023/06/News4_shutterstock_1508286737-Kopie.png)
Funding Priority: Analysis of the Current State of IT Security
The NRW program "MID-Digitale Sicherheit" (MID Digital Security) subsidizes IST analyses that enable you to identify and close security gaps in your company.
![image](https://locaterisk.com/wp-content/uploads/2023/04/LocateRisk_IT-Lieferanten-Risikomanagement.png)
More security in the supply chain
For prevention in global supply chains: LocateRisk has automated supplier IT risk management.
![](https://locaterisk.com/wp-content/uploads/2023/03/IT-Sicherheitsgesetz-2.0-und-NIS2-–-Die-Zeit-laeuft.png)
IT Security Act 2.0 and NIS 2
Learn what's already in place today, what's coming in the future, and why your implementation status needs to be put to the test now.
![](https://locaterisk.com/wp-content/uploads/2023/02/shutterstock_2015739191-scaled.jpg)
Lay the Foundation for Your IT Protection - with These 5 Tips
New cyber attacks every day and no end in sight. Learn here how you can fundamentally protect your company in 5 steps.
![](https://locaterisk.com/wp-content/uploads/2023/01/EU-Richtlinie-NIS2.png)
EU Directive NIS2 Now Official
Learn who is affected, what's changing, and how we're helping you meet the requirements today.
![](https://locaterisk.com/wp-content/uploads/2022/12/Ransomware-Angriffe.png)
How to Minimize the Ransomware Attack Risk
Ransomware attacks are a threat to business and society. All the more important to be able to minimize the risks continuously.
![](https://locaterisk.com/wp-content/uploads/2022/11/News3_shutterstock_1508286737.png)
New Partnership with Aphos
NEWS UPDATE! We are happy to have a new, strong partner at our side with Aphos - Gesellschaft für IT-Sicherheit.
![](https://locaterisk.com/wp-content/uploads/2022/10/Cloud_Visual_quer.png)
How Secure Is Your Cloud Environment?
Good to know: Cloud services are not a standard model for IT security. Because, as is so often the case in life, the same applies here: It all depends ...