User enumeration attacks: What you need to know
Malicious actors usually come prepared. Learn how User enumeration attacks are planned by bad actors in a cybersecurity attack.
Malicious actors usually come prepared. Learn how User enumeration attacks are planned by bad actors in a cybersecurity attack.
At this point, knowledge-based authentication (KBA), has been around for over two decades. It's time to learn about the pitfalls of KBA.
7 examples of risk-based authentication for sophisticated attack tactics such as credential stuffing, phishing and malware intrusions.
Part two of our blog series on how to migrate from Okta to OneLogin. Learn more how to streamline application migration with OneLogin.
Planning your migration from Okta to OneLogin? Learn top priorities and how to minimize disruption to your end users.
We recently published a blog titled Defending Your Organization Against Session Cookie Replay Attacks. This blog thoroughly examined the menace of session cookie replay attacks, shedding light on the potential risks and consequences they pose to online se
A session cookie replay attack is a cyber-attack that attempts to take over a particular user account. Learn how to combat this threat.
Explore Identity and Access (IAM) challenges in K-12 education and learn about solutions that focus on security, productivity and cost reduction.
Learn how to transition to passwordless and explore OneLogin options that can help you move to this more modern and secure authentication strategy.
Delivering a frictionless experience while protecting your business assets is possible with the right tools. Learn how advanced authentication can help.
Learn how FIDO2 and WebAuthn are strengthening digital authentication by introducing dynamic authentication and rendering conventional attacks ineffective.
Learn about best practices when deploying Advanced Authentication and how to overcome the most common deployment challenges.