
Distr@l funding accelerates development of new security technology
Thanks to Distr@l funding from the state of Hesse, we are able to develop our new LR-Cont security technology. An accessible cyber security solution for companies of all kinds.

DIGITAL X 2023 - Be digital. Stay human.
We are at the start when Europe's leading digitization initiative brings together society, business and politics.

Funding Priority: Analysis of the Current State of IT Security
The NRW program "MID-Digitale Sicherheit" (MID Digital Security) subsidizes IST analyses that enable you to identify and close security gaps in your company.

More security in the supply chain
For prevention in global supply chains: LocateRisk has automated supplier IT risk management.

IT Security Act 2.0 and NIS 2
Learn what's already in place today, what's coming in the future, and why your implementation status needs to be put to the test now.

Lay the Foundation for Your IT Protection - with These 5 Tips
New cyber attacks every day and no end in sight. Learn here how you can fundamentally protect your company in 5 steps.

EU Directive NIS2 Now Official
Learn who is affected, what's changing, and how we're helping you meet the requirements today.

How to Minimize the Ransomware Attack Risk
Ransomware attacks are a threat to business and society. All the more important to be able to minimize the risks continuously.

New Partnership with Aphos
NEWS UPDATE! We are happy to have a new, strong partner at our side with Aphos - Gesellschaft für IT-Sicherheit.

How Secure Is Your Cloud Environment?
Good to know: Cloud services are not a standard model for IT security. Because, as is so often the case in life, the same applies here: It all depends ...

IT Security and the Supply Chain Act: What to Do Now
The focus of the Supply Chain Act is on sustainability and human rights. But the topic of cybersecurity is also becoming relevant. Find out what you can already do today.

Shadow IT: How to Track Hidden Systems
Forgotten systems in the corporate network quickly become a gateway for attackers. Learn what shadow IT is and how to easily detect the systems.

E-Mail Security with SPF, DKIM and DMARC
SPF, DKIM and DMARC are standards to contain spoofing and pishing attacks. The record is quickly made. We show you how to do it.

Meet us at Cloud Expo 2022 to improve the security of your IT environment
Protection against cyber attacks - LocateRisk helps. For quick support, we provide all organisations with an IT security assessment of their external IT attack surface - free of charge. Talk to us directly about it at the booth.