Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , , ,

Enhancing PAM Solutions with Enzoic

Get advanced integration of Dark Web intelligence and compromised credential data into PAM solutions to enhance security measures.

Read More

, , ,

Does the Mother Of All Breaches Matter?

The MOAB  includes records from thousands of well-organized and reindexed leaks, breaches, and privately sold databases.

Read More

, , ,

How to Mitigating Credential Stuffing Attacks

A single compromised credential can trigger a broader security disaster. Companies must prioritize defending against credential stuffing attacks.

Read More

, , , , ,

2024 Verizon DBIR: Key Thoughts

It remains clear: stolen credentials are a consistent and continuous threat to organizations. Here are details from the 2024 Verizon DBIR.

Read More

, ,

Guarding Education: The Impact of Compromised Credentials

The education sector has increasingly become a target for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive information.

Read More

, , ,

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after.

Read More

, , ,

Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity

Sports-related passwords are pretty common. With Super Bowl LVIII around the corner, check out the most common 49ers and Chiefs passwords.

Read More

, , ,

Survey Results: The Proof is in the Passwords

Read the password survey, in which cybersecurity professionals, across industry sectors, reveal the state of authentication security.

Read More

, , ,

Protect Active Directory Better

Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how.

Read More