Aug 5, 20254 min read
Password spraying is a method used by hackers to gain access to a large number of user accounts using a few simple but frequently used passwords.
Jul 15, 202517 min read
Engity's overview of the most important challenges in data protection and cybersecurity for the second quarter of 2025.
Jul 11, 202513 min read
A middleman unrecognizably interrupts, intercepts, decodes, monitors, reads or modifies communication between two entities.
Jul 1, 202512 min read
Exploitation of compromised and stolen login data to gain access to other user accounts.
Jun 13, 20258 min read
Comparison of open source Keycloak software and the best fully integrated and managed Keycloak alternatives.
May 13, 20255 min read
Keylogger are malicious monitoring programs that collect sensitive data.
May 6, 202511 min read
Easy-to-use checklist and tricks for managers to check the security standard of their own company login system.
May 2, 20257 min read
No more hassle with countless login credentials – We present the secure use of password managers and passphrases.
Apr 30, 20258 min read
Helping with best practices how to best manage hundreds of different passwords and various account accesses.
Apr 29, 20255 min read
Multi-Tenancy Architecture as a cost-effective, fully scalable alternative to Single-Tenancy Architecture.
Apr 22, 20259 min read
On our blog and on our website, we discuss all aspects of IAM - Identity and Access Management. Let's clarify some terms and highlight some important aspects.
Apr 8, 202517 min read
Engity's overview of the data protection and cybersecurity challenges that dominated the news headlines in the first quarter of 2025.