DataLocker, Inc. logo
  • Tech Support
  • Where to Buy
  • Contact Us
  • Partner Login
  • Software
    • SafeConsole Platform
    • Secure USB Device Management
    • PortBlocker
    • Anti-Malware
    • SafeCrypt
    • EncryptDisc
    • Professional Services
  • Hardware
    • Encrypted Hard Drives
      • DL4 FE
      • H300
      • H350
    • Encrypted USB Flash Drives
      • K350
      • Sentry 5
      • Sentry ONE
    • Alpha Series
      • AlphaCam H
      • AlphaCam H2
      • AlphaTalk
  • Solutions
    • Solutions By Industry
      • Government and Defense
      • Healthcare
      • Manufacturing
      • Legal
      • Finance
      • Education
      • Energy
    • Solutions By Use Case
      • Compliance
      • Data in Motion and Data at Rest
      • Endpoint Security and Control
      • Local Backup Strategy
  • Insights
    • Blog
    • Resources
    • News and Events
  • About
    • Our Company
    • DataLocker Cares
    • Careers
    • Legal
  • Free Trial
DataLocker logo icon
  • Home
  • Software
    • SafeConsole Platform
    • Secure USB Device Management
    • PortBlocker
    • Anti-Malware
    • SafeCrypt
    • EncryptDisc
    • Professional Services
  • Hardware
    • Encrypted Hard Drives
      • DL4 FE
      • H300
      • H350
    • Encrypted USB Flash Drives
      • K350
      • Sentry 5
      • Sentry ONE
    • Alpha Series
      • AlphaCam H
      • AlphaCam H2
      • AlphaTalk
  • Solutions
    • Solutions By Industry
      • Government and Defense
      • Healthcare
      • Manufacturing
      • Legal
      • Finance
      • Education
      • Energy
    • Solutions By Use Case
      • Compliance
      • Data in Motion and Data at Rest
      • Endpoint Security and Control
      • Local Backup Strategy
  • Insights
    • Blog
    • Resources
    • News and Events
  • About
    • Our Company
    • DataLocker Cares
    • Careers
    • Legal
  • Free Trial
  • Tech Support
  • Where to Buy
  • Contact Us
  • Partner Login
Why Country of Origin and Supply Chain Transparency Matters for Secure USB Storage

Why Country of Origin and Supply Chain Transparency Matters for Secure USB Storage

by Annie Wacker | Apr 4, 2025 | Blog

In today’s cybersecurity landscape, ensuring end-to-end security is not just about encryption standards—it is about understanding where your secure USB storage devices come from, how they’re built, and whether they comply with the security standards your organization...
Why Webcams Could Be the Weakest Link, Uncovering Webcam Security Risks

Why Webcams Could Be the Weakest Link, Uncovering Webcam Security Risks

by Annie Wacker | Mar 18, 2025 | Blog

A New Attack Vector: Ransomware from a Webcam? A recent attack by the Akira ransomware gang has revealed a serious security oversight in many organizations: the vulnerability of networked IoT devices like webcams and fingerprint scanners.  This vulnerability uncovers...
Questions to Ask When Evaluating Encrypted Storage Devices with Chinese Encryption Chips

Questions to Ask When Evaluating Encrypted Storage Devices with Chinese Encryption Chips

by Jason Niemoth | Oct 3, 2024 | Blog

Use this handy guide to know the key questions to ask vendors who claim to have encrypted storage devices but use Chinese encryption...
Hezbollah Pager Explosions: A Stark Reminder of the Dangers in the Tech Supply Chain

Hezbollah Pager Explosions: A Stark Reminder of the Dangers in the Tech Supply Chain

by Jason Niemoth | Oct 3, 2024 | Blog

Hezbollah, designated a terrorist organization by the United States and many other countries due to its history of carrying out international terrorist attacks, recently experienced a highly sophisticated attack where thousands of its pagers exploded simultaneously...
The Impact of China’s National and Cyber Security Laws on Global Encryption

The Impact of China’s National and Cyber Security Laws on Global Encryption

by Jason Niemoth | Oct 3, 2024 | Blog

China’s aggressive stance on national and cyber security has raised significant concerns worldwide, particularly regarding the implications for technology products manufactured by Chinese companies. Central to these concerns are encryption chips produced by...
Defense-in-Depth: Top 5 Layers of Security Against USB-Related Threats

Defense-in-Depth: Top 5 Layers of Security Against USB-Related Threats

by Jason Niemoth | Aug 13, 2024 | Blog

In the fight against USB-related threats, IT security professionals are increasingly adopting a defense-in-depth approach. This strategy involves multiple layers of security to protect sensitive data and systems from potential breaches. Based on the research findings...
Page 1 of 2812345...Next →Last Page
DataLocker logo
U.S. Headquarters
+1 913-310-9088
International
+31 467 111 205
 
sales@datalocker.com
AICPA -SOC Compliance
© Copyright 2007 – 2024 DataLocker, Inc. All Rights Reserved.
  • Facebook Logo
  • YouTube Logo
  • LinkedIn Logo