Skip to main content

RESOURCES

Enzoic Blog

Research, views, and insights on cybersecurity, account takeover, fraud, and more

Viewing Active Directory

, , ,

Credential-Based Threats Require Continuous Monitoring

Credential-based threats bypass traditional defenses. Why is continuous identity monitoring essential to stop modern credential attacks?

Read More

, , ,

Summer Cyberattacks

Cyberattacks spike in summer as IT teams scale back. Make sure you're protected against phishing, ransomware, and credential-based threats.

Read More

, ,

The ITDR Imperative: Securing Active Directory

Enhance ITDR with Active Directory by using real-time Dark Web intelligence and automated remediation to stop credential-based attacks.

Read More

, , ,

The Consequences of Password Reuse

A high-profile incident shows the widespread risk posed by password reuse, especially when the victims are high-privilege users.

Read More

, , ,

Beyond Free Breach-Check Tools

Free lookup services have helped raise awareness around the dangers of compromised credentials, but they simply don’t go far enough.

Read More

, ,

Password Hashing: What Cyber Pros Need to Know

Password hashing is the process of converting a plain-text password into a fixed-length string of characters (called a hash) using a one-way cryptographic algorithm​. 

Read More

, , ,

Guidepoint Security & Enzoic: Taking on the Password Problem

Enzoic and GuidePoint Security partner to help organizations fight credential-based attacks with real-time password intelligence.

Read More

, , ,

Two-Factor Authentication (2FA) vs. Multi-Factor Authentication (MFA)

How authentication works, the difference between 2FA and MFA, and the various types of secondary authentication factors.

Read More

, ,

AD Lite Password Auditor Report: Key Insights and Data

Enzoic’s password auditor report highlights the ongoing risks associated with compromised credentials in Active Directory (AD) environments

Read More