Skip to main content

RESOURCES

Resource Hub

Expand your cybersecurity knowledge and find best practices to detect compromised passwords

Viewing All Resources

Fortune 500 Employee-Linked Account Exposure

Fortune 500 companies employ more than 31 million people. Over the past 3 years, more than three million employee-linked accounts became newly compromised.

Download the Report

Webcast: We need to talk about MFA

While MFA significantly reduces breach risks, not all MFA solutions are equally effective, and cyber threats continue to evolve. We’ll dive into recent research findings.

Watch Now

Prevent ATO Without Compromising User Experience

Read this paper to understand the risks and workings behind account takeover attacks and why additional steps that introduce user friction, like multi-factor authentication (MFA), don't completely solve the problem.

Download the E-Book

,

Osterman Research: We Need to Talk about MFA

Organizations should focus on strengthening how MFA is implemented, and it should reinforce security measures throughout the entire authentication process.

Download the Research

The Public Sector Compliance Playbook

A guide for government agencies and organizations operating in the public sector. Understand and navigate password and credential security within the regulatory landscape.

Download the E-Book

Navigating Compliance With a Security-First Approach

This e-book provides a practical guide to help companies understand the role of password and credential security within the regulatory landscape.

Download the E-Book

The Dual Nature of the Dark Web

This presentation explores the Dark Web's complex character, its practical implications for cybersecurity, and the importance of using this intelligence.

Watch Now

Exposed Password Monitoring

Enhance online user account security by implementing password or full credentials monitoring to prevent account takeover (ATO) and fraud.

Download the Use Case

Password Breach Monitoring

Password Breach Monitoring is a simple webhook that alerts you when an email or a domain associated with an email is exposed online.

Download the Use Case

Enzoic for Active Directory 3.6: Instant as-you-type Feedback

This one-pager highlights how Enzoic keeps unsafe username and password credentials out of Active Directory in real-time.

Download Now

CISO Guide to Password Security: NIST 800-63B

How to Implement and Automate the Key Elements of NIST 800-63B. This paper covers best practices for NIST-compliant password security and key benefits of automating password policies.

Download the Paper

A Guide to Mitigating Credential Stuffing Attacks

Out of the many reports circulating in the news today, many statistics revolve around the number of detected breaches. Review this paper to understand credential stuffing and how to defend against it.

Download the Paper