Unleash the power of transparency with Rublon’s new Audit Logs feature. In the ever-evolving cybersecurity landscape, staying ahead of potential
NIST Password Guidelines: How to Create and Manage Strong Passwords
Would you like to protect your online accounts and data from hackers and cyberattacks? Do you want to avoid the hassle and frustration of forgetting
Configuring the Rublon Authentication Proxy as an LDAP Proxy Server
Starting from version 3 of the Rublon Authentication Proxy, it can serve as an LDAP proxy server. However, as long as the configuration of the “plain”
Streamlining Admin Workflows With Enhanced User Export Feature
We are delighted to announce a significant enhancement to the existing Export Users to CSV feature in the Rublon Admin Console. This update is not
How to Set Default Authentication Method Policy?
We’re excited to announce a significant update to the Rublon Admin Console: the Default Authentication Method policy. This innovative feature is set
How Username Aliases Can Simplify Your User Management
We are excited to announce a new feature in Rublon that will make your user management easier and more efficient: Username Aliases. What Are
What is Adversary-In-The-Middle (AiTM) Phishing Attack?
Adversary-In-The-Middle (AiTM) phishing attack is a type of cyberattack that involves stealing session cookies to bypass authentication layers and
What is Privilege Creep and How to Avoid It?
Privilege creep is a term that describes the situation when users have more access rights than they need to perform their jobs. This can happen when
What is Pretexting? A Guide to This Social Engineering Attack
Pretexting is a type of social engineering attack that involves creating a fake scenario to trick victims into giving up their private information.