Resources

Airlock Digital Blog

The Future of Application Control with CEO David Cottingham

Customers provide feedback and gain priceless insights into the future of precision application control at the recent Airlock Digital Summit in Sydney.

Read More

Setting Security and Technology Strategic Objectives

Airlock Digital CTO and CSO, Peter Baussmann, on setting strategic security and technology objectives, building out teams, and getting fundamentals right.

Read More

SAML Support, Native Slack Integration Highlights of Airlock Digital v6.0.2

Announcing v6.0.2 of Airlock Digital which includes native Slack integration, SAML support, interoperability path rules and Ubuntu server support.

Read More

Building Momentum for Precision Application Control at RSAC2025

At RSAC2025, our team met with podcasters, analysts and journalists to discuss how our solution aligns with customer priorities and cybersecurity trends.

Read More

Improved Effectiveness, Broader Platform Support in Airlock Digital v6.0

Announcing v6.0 of the Airlock Digital solution, a release packed with features that make allowlisting at scale a reality.

Read More

Western Australian Organizations Hear Latest Application Control News

Western Australian organizations hear latest application control news and insights into short, medium and long-term roadmap from Airlock Digital in Perth.

Read More

SA Power Networks: Reducing Attack Surface and Minimising Risk

Read how SA Power Networks is securing energy and utilities while reducing their attack surface and minimising risk with Airlock Digital.

Read More

Protect Against Browser Extension Attacks with Modern Application Control

Exploitation of browser extensions represent a growing threat; See how application Control is essential to defending against these risks.

Read More

Perspectives From the Allowlisting Trenches

Airlock Digital's allowlisting solution enhances cybersecurity and meets industry standards, as shared by satisfied customers across various sectors.

Read More

How to Reduce Your Attack Surface by Removing Unused OS Features

Mitigate risks such as LOLBin exploits by using allowlisting to control, monitor, and block unnecessary binaries and features.

Read More