IT Security Act 2.0 and NIS 2
Learn what's already in place today, what's coming in the future, and why your implementation status needs to be put to the test now.
Lay the Foundation for Your IT Protection - with These 5 Tips
New cyber attacks every day and no end in sight. Learn here how you can fundamentally protect your company in 5 steps.
EU Directive NIS2 Now Official
Learn who is affected, what's changing, and how we're helping you meet the requirements today.
How to Minimize the Ransomware Attack Risk
Ransomware attacks are a threat to business and society. All the more important to be able to minimize the risks continuously.
New Partnership with Aphos
NEWS UPDATE! We are happy to have a new, strong partner at our side with Aphos - Gesellschaft für IT-Sicherheit.
How Secure Is Your Cloud Environment?
Good to know: Cloud services are not a standard model for IT security. Because, as is so often the case in life, the same applies here: It all depends ...
IT Security and the Supply Chain Act: What to Do Now
The focus of the Supply Chain Act is on sustainability and human rights. But the topic of cybersecurity is also becoming relevant. Find out what you can already do today.
Shadow IT: How to Track Hidden Systems
Forgotten systems in the corporate network quickly become a gateway for attackers. Learn what shadow IT is and how to easily detect the systems.
E-Mail Security with SPF, DKIM and DMARC
SPF, DKIM and DMARC are standards to contain spoofing and pishing attacks. The record is quickly made. We show you how to do it.
Meet us at Cloud Expo 2022 to improve the security of your IT environment
Protection against cyber attacks - LocateRisk helps. For quick support, we provide all organisations with an IT security assessment of their external IT attack surface - free of charge. Talk to us directly about it at the booth.
Log4j Vulnerability - Find out Which of Your Servers Are Affected
Security vulnerability in Log4j - attacks are already underway. Do not waste time and check the security of your systems.
Statistic on IT Security: Hessian Municipalities
IT security experts have long warned about the cyber risks in public administrations. The problems are well known. The results are still lacking.
IT Security Statistics: The Parties
What is the state of cybersecurity in Germany? What is the situation like among the parties? Our survey shows that there is still a lot of room for improvement.
How You Can Increase Your IT Security with Automated Monitoring
Increasingly sophisticated, automated cyberattacks are driving up the resource and cost expenditures for IT security. This makes it all the more important for IT managers to be able to prove the effectiveness and profitability of their investments in attack prevention. This requires that they are able to efficiently assess the company-wide IT security status and communicate the result to the management level in a comprehensible manner.