Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

How Weak Passwords Lead to Ransomware Attacks

Prevent ransomware attacks by building layers of defense into your cybersecurity strategy to mitigate the fallout of an infiltration.

Read More

Viewing All Blogs

, ,

Fortune 500 Employees’ Credentials Under Siege

1 in 10 Fortune 500 employees had their credentials exposed. Each compromised account was found an average of 5.7 times.

Read More

,

Five Must-Know Insights for Credential Monitoring

Password and credential monitoring are essential. Spot compromised accounts early and stop breaches before they happen.

Read More

,

ATO Attacks from a Threat Intel Perspective

The battle against ATO attacks is one of speed, scale, and sophistication and defenders are dealing with an overwhelming influx of data.

Read More

, , ,

Rethinking Credential Security

Whether you're a CISO or a security professional this Q&A is packed with credential security insights you can implement today.

Read More

, ,

CMMC Password Compliance 101

We’ll cover the basics of CMMC, who needs to comply, what happens if you don’t, how compliance is enforced, and how Enzoic helps address a critical CMMC requirement related to protecting against compromised passwords.

Read More

, ,

The OpenID Shared Signals Framework

This post will clarify what SSF is, describe its approach, explain the roles of the CAEP and RISC, and outline the ways to work together.

Read More

, , ,

A Dive Into Organizational Identity-Based Threats

Ten critical organizational identity-based threats tied to compromised credentials that organizations should be aware of and defend against.

Read More

, , ,

Reflecting on a Year of Compromised Data

The cybersecurity landscape over the past 12 months shows that It’s been a banner year of compromised credential data collection.

Read More

, , , ,

Achieving CyberSecure Canada Certification

CyberSecure Canada aims to help enterprises improve their security posture by implementing a baseline set of security controls.

Read More