What is credential stuffing and how to stop it? Credential stuffing is a type of cyberattack in which attackers use stolen usernames and passwords
TOTP vs. U2F: What’s the Difference?
The main difference between TOTP and U2F is that U2F is more secure and convenient to use than TOTP. U2F is more secure because it uses public-key
One-Time Password vs. One-Time Pad: What’s the Difference?
One-Time Pad is an encryption method that uses a random key of the same length as the message to encrypt each character or bit individually, whereas
What is Just-in-Time Access (JIT)?
Just-in-Time Access (JIT) is a security practice that grants users privileged access only for as long as they need it to complete a task. After users
How to Prevent Man-in-the-Middle (MITM) Attacks on Your Network
How can you prevent Man-in-the-Middle Attacks (MITM) attacks on your network? What are the best practices to protect your data and devices from these
Rublon Authentication Proxy Can Now Work as an LDAP(S) Proxy
We are excited to announce the release of Rublon Authentication Proxy 3.0.2, a significant update that makes the Auth Proxy work as an LDAP and LDAPS
What is Man-In-The-Browser Attack? How to Detect and Prevent It
What is a Man-In-The-Browser attack and how to detect and prevent it? Man-In-The-Browser Attack is a form of cyberattack that uses malicious software
MFA for AD FS: How to Enable It in Minutes
We’re thrilled to announce that we just released our MFA for AD FS (Multi-Factor Authentication for Active Directory Federation Services) connector.
Rublon Admin Console Receives Manual Security Tests Certificate
We are thrilled to announce that Rublon has achieved a significant milestone in our commitment to providing the highest level of security. We have