RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Active Directory, Credential Screening, Cybersecurity, Data Breaches, Password Security
Hackers frequently use password spraying and credential stuffing as attack methods. Are you prepared to take an active stance of defense?
Active Directory, Continuous Password Protection, Credential Screening, Password Security, Password Tips
Read just how big the problem of compromised credentials may be for a company like yours and to provide a benchmark based on Enzoic’s audit.
Account Takeover, Active Directory, Credential Screening
Take a look at the limitations of bot mitigation and read where compromised credential screening can be highly complementary.
Active Directory, Credential Screening
Compromised credentials can be quickly shared and utilized by various groups with malicious intent. Almost immediately following the release of the information, groups began using them to attempt to hack and harass organizations.
Active Directory, Credential Screening
Credential screening providers are partners who help mitigate the risks of cyberattacks. Choosing the right one can prevent exposure of additional risks.
Credential Screening, Cybersecurity, Data Breaches, Password Security
Credential stuffing & brute force attacks use very different methods to accomplish account takeover. This article outlines what they are, how they operate and how to handle them.
Account Takeover, Credential Screening, Regulation and Compliance
The FTC is sending a strong message that businesses will no longer be able to play the victim-card. Instead, they are responsible for protecting their customers from credential stuffing and account takeover.
Credential Screening, Cybersecurity
PasswordPing announces a new partnership providing LastPass customers with a quick and easy way to screen for individual and enterprise user credentials against a database of billions of compromised credentials. With PasswordPing, LastPass is able to identify high risk end users and put additional security measures in place, such as email alerts and real-time in-product notifications, to block account hijacking attempts and other fraudulent activities.
No Spam. Only sweet content and updates on our products and solutions.