Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Credential Screening

, , , , ,

2024 Verizon DBIR: Key Thoughts

It remains clear: stolen credentials are a consistent and continuous threat to organizations. Here are details from the 2024 Verizon DBIR.

Read More

, ,

Guarding Education: The Impact of Compromised Credentials

The education sector has increasingly become a target for cybercriminals seeking to exploit vulnerabilities and gain unauthorized access to sensitive information.

Read More

, , ,

Don’t Forget About Credential Security in Active Directory

Active Directory is a rich repository of data like financial information, addresses, and other PII. It is exactly what many cybercriminals are after.

Read More

, , ,

Super Bowl of Passwords: Chiefs vs. 49ers in the Battle of Cybersecurity

Sports-related passwords are pretty common. With Super Bowl LVIII around the corner, check out the most common 49ers and Chiefs passwords.

Read More

, , ,

Survey Results: The Proof is in the Passwords

Read the password survey, in which cybersecurity professionals, across industry sectors, reveal the state of authentication security.

Read More

, , ,

Protect Active Directory Better

Active Directory is a prime target for threat actors and companies must act now to eliminate it as a threat vector. Here’s why, and how.

Read More

, ,

3 Things Businesses Need to Know About Safely Employing Contractors

Many organizations are turning to consultants and external groups for help, but this approach can be risky for an organization's security. Here are 3 steps to mitigate risk.

Read More

, , , ,

Enzoic Expands Automated Credentials Monitoring in Active Directory

The solution now continuously screens for both unsafe passwords and compromised full credentials reducing the risk of a cyberattack.

Read More

, , , ,

Password Spraying and Credential Stuffing: Developing Active Defense

Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?

Read More