Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Regulation and Compliance

, ,

FTC Creates De-Facto Legal Requirements for Credential Stuffing & Account Takeover

The FTC is sending a strong message that businesses will no longer be able to play the victim-card. Instead, they are responsible for protecting their customers from credential stuffing and account takeover.

Read More

, ,

What’s behind PCI’s New MFA Requirements?

Many have implemented MFA ahead of the new PCI requirement. Let's look at PCI's multi-factor implementation guidance that highlights some considerations, particularly around passwords that may otherwise be overlooked.

Read More

, ,

NIST SP 800-63B Final Guidelines: Digital Identity Explained

NIST SP 800-63 final guidelines explained: learn what the standard covers for digital identity and password security.

Read More

, ,

Why NIST Compromised Credential Checking Matters for Security

Learn why NIST requires compromised credential checking and how it improves password security under 800-63B.

Read More

, ,

Surprising NIST Password Guideline Changes in 800-63B

The US National Institute of Standards and Technology (NIST) just finalized new draft guidelines, completely reversing previous password security recommendations and upending many of the standards and best practices security professionals use when forming policies for their companies.

Read More