Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

,

The New DIBBS Password Format Explained

This is a brief summary of the new DIBBS (DLA Internet Bid Board System) password format changes and the rationale behind some of these changes.

Read More

CISO Survival Guide: Balancing Digital Transformation and Security

Digital transformation is the largest driver of new technology projects. How do you balance digital transformation and security? Read these tips!

Read More

Hashing: What You Need to Know About Storing Passwords

Password hashing adds a layer of security making it more costly to the hacker who just compromised the server that holds user passwords.

Read More

, , ,

A Quick Summary of NIST Digital Identity Guidelines (SP 800-63B)

Take a closer look at the new recommendations and rationale behind the NIST SP 800-63b. The changes address findings related to the human factors.

Read More

,

Auditing for Compromised Passwords

A free password audit solution, Enzoic for Active Directory Lite, helps organizations quantify their risk from unsafe passwords in just a few minutes.

Read More

Time to Prioritize Passwords

Today is World Password Day and despite proclamations that passwords are going the way of the Dodo, they are still a fundamental part of our digital lives.

Read More

Solving the Compromised Credentials Conundrum

Today is World Password Day. Enterprises need to address the password problem & ensure that only strong, unique & uncompromised passwords are in use.

Read More

Identity and Access Management has a Password Problem

Identity and Access Management has a Password Problem. Read the blog and full report from EMA: Contextual Awareness: Advancing IAM to the Next Level.

Read More

,

PCI Password Requirements: Is It Enough?

The current PCI password requirements. Let's assess whether they are good enough, or whether more can be done to protect our systems and data.

Read More

, , ,

8 Scary Statistics about the Password Reuse Problem

Password reuse is fueling account takeovers. Learn 8 shocking stats, how hackers exploit reused credentials, and what you can do to stop it.

Read More

Gone Phishing: Coronavirus Scams in Action

Scammers are leveraging the COVID-19 pandemic to steal your money or your personal information. Here are some highlights of prominent examples.

Read More

, ,

Cybersecurity During a Pandemic – And What You Can Do To Keep Employees Safe

Educating employees on the threat the pandemic may pose to their personal data. Here are tips to help them keep this information safe.

Read More