Jan 21, 202514 min read
Engity's overview of the top cybersecurity and privacy issues that dominated the headlines in the final quarter of 2024.
Jan 7, 20254 min read
Brute force attacks are based on the trial-and-error method of obtaining passwords or access credentials.
Dec 17, 20249 min read
How does a hacker attack a company application, a customer portal, a user database or other protected areas; what methods does he use and what is hacking?
Dec 4, 20248 min read
Bifröst is an advanced open-source SSH server using OpenID Connect and allows automatic provisioning of user access.
Oct 29, 202414 min read
Which topics dominated the Cybersecurity and Data-Protection headlines in the third quarter of 2024?
Oct 28, 20243 min read
Password leaks have increased dramatically. This makes many people wonder if their chosen password is still secure.
Aug 8, 202417 min read
Which Cybersecurity and Data-Protection topics dominated the second quarter of 2024?
Jul 24, 20247 min read
The European Union has introduced the NIS-2 (Network and Information Security) Directive to ensure a greater IT-security within its member states
Jun 11, 202417 min read
What were the most important data protection topics in the first quarter of 2024 in the EU?
Mar 21, 20245 min read
Inhouse DIY Identity and Access Management, part or complete outsourcing? What are the challenges and pitfalls?
Mar 8, 20245 min read
IAM systems deserve much more attention – they may work under the hood, but they are the very key to all data and functionality of an online service.
Feb 28, 20244 min read
Good data protection makes for a reliable IT setup and protects personal data as well as algorithms and trade secrets.