Blogs and Updates

Risky Business - Is the Kernel a Security Boundary?

Airlock Digital sponsored the latest episode of Risky Business podcast with Patrick Gray where they discussed the limitations of kernel driver blocklists.

Read More

Airlock Digital releases free Application Whitelisting Audit Tool

Utilize the free AppLocker Auditor tool for seamless review of policies against Australian Information Security Manual (ISM) compliance.

Read More

David Cottingham Presenting at ACSC 2017

David Cottingham, Airlock co-founder, will present at the ACSC Conference. He will cover malicious activity identification within enterprise environments.

Read More

Risky Biz Soap Box: Why Allowlisting is Ready for Prime Time

Insights on effective allowlisting, lessons from the third-party industry, Microsoft vs. specialist tools, and the effort for success.

Read More

Proactively Detect and Prevent Petya Ransomware

Petya is a ransomware outbreak that impacted organizations. Discover how Airlock's application whitelisting provides proactive protection against Petya.

Read More

Airlock Digital Add-on for Splunk released

Easily integrate Splunk with Airlock using this Add-on. It offers pre-built parsing and dashboards for streamlined application whitelisting data viewing.

Read More

Microsoft's Revocation of Verisign's G5 Root Certificate

Microsoft has rolled back the revocation of the Verisign Class 3 Public Primary Certification Authority - G5 Root Certificate.

Read More

Opinion: Why the ISM Control ‘1471’ Is Impractical for Allowlisting

Airlock's opinion about compliance with Australian Government Information Security Manual (ISM) control 1471 using the Airlock allowlisting platform.

Read More

Preventing Ransomware and Zero-Days with Basic Security Controls

The world is facing the largest ransomware attack ever. The REvil/Sodinokibi group infecting over one million systems, surpassing the 2017 WannaCry attack.

Read More

Airlock v1.2 Released with Publisher Support

Airlock version 1.2 now features publisher support for signed files, differential policies reducing network traffic, and Citrix VDI support.

Read More