May 6, 202511 min read
Easy-to-use checklist and tricks for managers to check the security standard of their own company login system.
May 2, 20257 min read
No more hassle with countless login credentials – We present the secure use of password managers and passphrases.
Apr 30, 20258 min read
Helping with best practices how to best manage hundreds of different passwords and various account accesses.
Apr 29, 20255 min read
Multi-Tenancy Architecture as a cost-effective, fully scalable alternative to Single-Tenancy Architecture.
Apr 22, 20259 min read
On our blog and on our website, we discuss all aspects of IAM - Identity and Access Management. Let's clarify some terms and highlight some important aspects.
Apr 22, 202513 min read
A middleman unrecognizably interrupts, intercepts, decodes, monitors, reads or modifies communication between two entities.
Apr 8, 202517 min read
Engity's overview of the data protection and cybersecurity challenges that dominated the news headlines in the first quarter of 2025.
Mar 25, 20259 min read
Myth & facts about a good password and the reasoning behind it.
Mar 11, 202517 min read
Fraudsters hide behind fake websites and messages to obtain users' data and to prompt users to make payments.
Feb 18, 20256 min read
Attackers try to hack user accounts by using conventional or special dictionaries.
Feb 10, 20255 min read
Damages and administrative fines for data protection violations are rising sharply. At the same time, authorities and courts are increasingly holding directors and managers of companies directly liable.
Jan 21, 202514 min read
Engity's overview of the top cybersecurity and privacy issues that dominated the headlines in the final quarter of 2024.