Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

, , , ,

Insights from IBM’s 2024 Cost of a Data Breach Report

The cost of a data breach has reached alarming levels. The global average spiked to $4.88 million, a 10% increase over the previous year.

Read More

, , ,

Enzoic for Active Directory 3.5: Elevating Visibility Into Your Environment

Version 3.5 of Enzoic for Active Directory aims to provide greater visibility and control over your environment.

Read More

, ,

NYDFS Cybersecurity Regulation: Automated Blocking of Commonly Used Passwords

NYDFS introduced its 2nd amended Cybersecurity Regulation. One requirement is the automated blocking of commonly used passwords.

Read More

, , ,

Understanding Penetration Testing

What is a penetration test? How can I ensure there are no compromises after a pentest? Here are some common FAQs and answers.

Read More

, , ,

I Failed a Pentest: What do I Do?

Steps you should take after failing a pentest and focusing on addressing the vulnerabilities found and ensuring there are no compromises.

Read More

, , , , ,

2024 Verizon DBIR: Key Thoughts

It remains clear: stolen credentials are a consistent and continuous threat to organizations. Here are details from the 2024 Verizon DBIR.

Read More

, , , ,

The Role of Threat Intelligence in Financial Data Protection

How financial institutions can protect sensitive data for their customers by integrating threat intelligence into their security strategies.

Read More

, ,

Stale Accounts in Active Directory

Stale accounts are account that was created and forgotten or users who no longer works at your organization and was never deactivated.

Read More

, , , , ,

CISA Warns of Compromised Microsoft Accounts

The directive is known as Emergency Directive 24-02 addresses the risk of compromised Microsoft accounts for federal agencies & corporations.

Read More