Oct 28, 202513 min read
The last part of our hacking series describes how we can best protect ourselves against hacker attacks and how we as users can reduce the risk of attack as much as possible.
Oct 14, 202516 min read
Engity's overview of the most discussed challenges in data protection and cybersecurity in the third quarter of 2025.
Oct 7, 202513 min read
As an open standard, OpenID Connect offers a secure and consistent way to verify user identities across different applications and services.
Sep 30, 202512 min read
A brushing attack is the unsolicited sending and leaving of packages in e-commerce retail.
Aug 5, 20254 min read
Password spraying is a method used by hackers to gain access to a large number of user accounts using a few simple but frequently used passwords.
Jul 15, 202517 min read
Engity's overview of the most important challenges in data protection and cybersecurity for the second quarter of 2025.
Jul 11, 202513 min read
A middleman unrecognizably interrupts, intercepts, decodes, monitors, reads or modifies communication between two entities.
Jul 1, 202512 min read
Exploitation of compromised and stolen login data to gain access to other user accounts.
Jun 13, 20258 min read
Comparison of open source Keycloak software and the best fully integrated and managed Keycloak alternatives.
May 13, 20255 min read
Keylogger are malicious monitoring programs that collect sensitive data.
May 6, 202511 min read
Easy-to-use checklist and tricks for managers to check the security standard of their own company login system.
May 2, 20257 min read
No more hassle with countless login credentials – We present the secure use of password managers and passphrases.