RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Account Takeover, Active Directory, Credential Screening, Cybersecurity
Credential-based threats bypass traditional defenses. Why is continuous identity monitoring essential to stop modern credential attacks?
Active Directory, Credential Screening, Cybersecurity, Password Security
Cyberattacks spike in summer as IT teams scale back. Make sure you're protected against phishing, ransomware, and credential-based threats.
Active Directory, Credential Screening, Cybersecurity
Enhance ITDR with Active Directory by using real-time Dark Web intelligence and automated remediation to stop credential-based attacks.
Account Takeover, Active Directory, Continuous Password Protection, Password Security
A high-profile incident shows the widespread risk posed by password reuse, especially when the victims are high-privilege users.
Account Takeover, Active Directory, Credential Screening, Password Security
Free lookup services have helped raise awareness around the dangers of compromised credentials, but they simply don’t go far enough.
Active Directory, Cracking Dictionaries, Password Security
Password hashing is the process of converting a plain-text password into a fixed-length string of characters (called a hash) using a one-way cryptographic algorithm.
Active Directory, Cybersecurity, Enzoic News, Password Security
Enzoic and GuidePoint Security partner to help organizations fight credential-based attacks with real-time password intelligence.
Active Directory, Credential Screening, Cybersecurity, Password Security
How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.
Active Directory, Credential Screening, Password Security
Enzoic’s password auditor report highlights the ongoing risks associated with compromised credentials in Active Directory (AD) environments
No Spam. Only sweet content and updates on our products and solutions.