Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

Lessons from the 23andMe Breach and NIST SP 800-63B

How credential stuffing led to 23andMe’s breach — and how NIST guidelines and real-time password monitoring can stop compromised credentials.

Read More

, , ,

Meeting CJIS v6.0 Password Security Requirements

How CJIS v6.0 enhances password security and how Enzoic helps law enforcement meet new requirements for banning and monitoring credentials.

Read More

,

Introducing Enzoic for Active Directory 3.6

Better Active Directory security with Enzoic 3.6: Real-time password feedback. CrowdStrike SIEM integration. Clearer credential risk insights.

Read More

, , ,

The Risk in Attack Surface Management

Credential exposure is the blind spot in attack surface management. Learn how integrating identity monitoring strengthens ASM.

Read More

, , ,

Credential-Based Threats Require Continuous Monitoring

Credential-based threats bypass traditional defenses. Why is continuous identity monitoring essential to stop modern credential attacks?

Read More

, , ,

Summer Cyberattacks

Cyberattacks spike in summer as IT teams scale back. Make sure you're protected against phishing, ransomware, and credential-based threats.

Read More

, ,

The ITDR Imperative: Securing Active Directory

Enhance ITDR with Active Directory by using real-time Dark Web intelligence and automated remediation to stop credential-based attacks.

Read More

, , ,

The Consequences of Password Reuse

A high-profile incident shows the widespread risk posed by password reuse, especially when the victims are high-privilege users.

Read More

, , , ,

The Verizon 2025 DBIR: Insights from Enzoic

The Verizon 2025 DBIR continues to be at the forefront of cybersecurity research analysis, and Enzoic is proud to be an official contributor.

Read More