Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing All Blogs

, , ,

3 Key Elements of the NIST Password Requirements

Why NIST Password Requirements Should Drive Your Password Strategy in 2020. Reduce user friction and improve password policy.

Read More

, , ,

What the NIST Privacy Framework Means for Password Policy

The new draft of the NIST Privacy Framework is ready for public privacy and security expert commentary. Send your feedback by the October 24 deadline.

Read More

CEO Views: Valuable Cybersecurity Solution Provider

Enzoic was selected because of it's innovative cybersecurity and fraud prevention products.

Read More

7 Password Problems Solved by Password Policy Enforcement

Organizations need password policy enforcement that screens for compromised passwords daily and follows NIST password guidelines. Here are some tips!

Read More

,

Protecting Loyalty Accounts and Rewards Programs

Many companies are lax in protecting loyalty accounts from account takeover attacks and fraud. And it hurts them financially. Here are some tips!

Read More

, ,

Are PSD2 SCA Options Too Narrow in Scope?

On 09/14, PSD2 SCA requirements were introduced in the EU. It will help protect customers but why did they not consider lower-customer-friction options?

Read More

,

New Jersey Data Breach Notification Law

As of Sept 1st, 2019, businesses based in New Jersey are now required to notify impacted users of online account information exposed in a data breach.

Read More

,

8 Ways to Mitigate Credential Stuffing Attacks

There is no one way to mitigate all credential stuffing attacks but a layered approach can reduce risk without negatively impacting the user experience.

Read More

Enzoic Continues to Grow

Enzoic, a leading provider of compromised credential screening solutions, recently announced that Kim Jacobson has joined as a Director of Marketing.

Read More