Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

The Reality of Compromised Credentials

OWASP calls out “Credential Cracking” and "Credential Stuffing" as top-level terms related to credentials. Read to learn about the terms.

Read More

, ,

How The Current Threat Landscape Impacts Authentication Security

One of the biggest challenges: Installing security & privacy measures to mitigate the threats to new technologies & remote capabilities.

Read More

, , ,

Employee Password Security in the Healthcare Sector

The healthcare industry sector is increasingly the target of cybercriminals. Why is this happening, and what can we do to address it?

Read More

,

Cultivating a Cybersecure Culture at Work

A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO.

Read More

, ,

Think You’re Smarter than a Hacker?

Hackers aren’t sitting around guessing. They are using computing power, combined with lists of passwords and sets of compromised credentials.

Read More

Retail Me This

Credential stuffing is an urgent problem for retailers, and the industry needs to be part of the process in building defensive solutions.

Read More

, , ,

What Does It Take to Be Secure with Multi-Factor Authentication?

Passwords, nearly a universal factor in every MFA solution, need to be fortified against risks that come from password reuse & data breaches.

Read More

, , ,

What’s Missing from New FINRA Guidance

FINRA produced guidance for organizations to tighten their cybersecurity, but no advice was provided regarding the issue of password hygiene.

Read More

, , ,

Passwords Security: Past, Present, and Future

The State Password Security in the Enterprise reveals several essential findings for system administrators and security professionals alike.

Read More